[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2014-5333Date: (C)2014-08-19   (M)2023-12-22


Adobe Flash Player before 13.0.0.241 and 14.x before 14.0.0.176 on Windows and OS X and before 11.2.202.400 on Linux, Adobe AIR before 14.0.0.178 on Windows and OS X and before 14.0.0.179 on Android, Adobe AIR SDK before 14.0.0.178, and Adobe AIR SDK & Compiler before 14.0.0.178 do not properly restrict the SWF file format, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks against JSONP endpoints, and obtain sensitive information, via a crafted OBJECT element with SWF content satisfying the character-set requirements of a callback API, in conjunction with a manipulation involving a '$' (dollar sign) or '(' (open parenthesis) character. NOTE: this issue exists because of an incomplete fix for CVE-2014-4671.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 4.3
Exploit Score: 8.6
Impact Score: 2.9
 
CVSS V2 Metrics:
Access Vector: NETWORK
Access Complexity: MEDIUM
Authentication: NONE
Confidentiality: PARTIAL
Integrity: NONE
Availability: NONE
  
Reference:
adobe-cve20145333-csrf(95418)
http://helpx.adobe.com/security/products/flash-player/apsb14-18.html
http://miki.it/blog/2014/8/15/adobe-really-fixed-rosetta-flash-today/

CPE    45
cpe:/a:adobe:flash_player:11.2.202.223
cpe:/a:adobe:adobe_air_sdk:13.0.0.83
cpe:/a:adobe:flash_player:11.2.202.346
cpe:/a:adobe:flash_player:11.2.202.228
...
CWE    1
CWE-352
OVAL    9
oval:org.secpod.oval:def:505486
oval:org.secpod.oval:def:20912
oval:org.secpod.oval:def:20905
oval:org.secpod.oval:def:20902
...

© SecPod Technologies