VYPR
Unrated severityNVD Advisory· Published Aug 14, 2015· Updated May 6, 2026

CVE-2015-5130

CVE-2015-5130

Description

Use-after-free vulnerability in Adobe Flash Player before 18.0.0.232 on Windows and OS X and before 11.2.202.508 on Linux, Adobe AIR before 18.0.0.199, Adobe AIR SDK before 18.0.0.199, and Adobe AIR SDK & Compiler before 18.0.0.199 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-5127, CVE-2015-5134, CVE-2015-5539, CVE-2015-5540, CVE-2015-5550, CVE-2015-5551, CVE-2015-5556, CVE-2015-5557, CVE-2015-5559, CVE-2015-5561, CVE-2015-5563, CVE-2015-5564, and CVE-2015-5565.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A use-after-free vulnerability in Adobe Flash Player allowing remote code execution when setting the scrollRect of a MovieClip.

Vulnerability

CVE-2015-5130 is a use-after-free vulnerability in Adobe Flash Player before 18.0.0.232 on Windows and OS X, and before 11.2.202.508 on Linux, as well as Adobe AIR before 18.0.0.199 and related SDKs [1][3]. The bug occurs when setting the scrollRect attribute of a MovieClip in ActionScript 2 (AS2) with a custom Rectangle, causing the MovieClip to be freed while a reference remains on the stack [2].

Exploitation

An attacker can exploit this by crafting a malicious SWF file that triggers the use-after-free. No authentication is required; the user must only open the file or visit a web page hosting the SWF. The exploitation sequence involves setting the scrollRect to a custom rectangle and then creating a TextField at the same depth as the targeted MovieClip, which overwrites the freed memory and can lead to code execution [2].

Impact

Successful exploitation allows remote attackers to execute arbitrary code in the context of the Flash Player process, potentially leading to full system compromise [1][3].

Mitigation

Adobe has released patched versions: Flash Player 18.0.0.232 (Windows/OS X) and 11.2.202.508 (Linux), and AIR 18.0.0.199. Red Hat and Gentoo have also released updated packages [1][3]. There is no known workaround; users should upgrade immediately.

AI Insight generated on May 23, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

11

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

10

News mentions

0

No linked articles in our index yet.