VYPR
Unrated severityNVD Advisory· Published Aug 14, 2015· Updated May 6, 2026

CVE-2015-5561

CVE-2015-5561

Description

Use-after-free vulnerability in Adobe Flash Player before 18.0.0.232 on Windows and OS X and before 11.2.202.508 on Linux, Adobe AIR before 18.0.0.199, Adobe AIR SDK before 18.0.0.199, and Adobe AIR SDK & Compiler before 18.0.0.199 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-5127, CVE-2015-5130, CVE-2015-5134, CVE-2015-5539, CVE-2015-5540, CVE-2015-5550, CVE-2015-5551, CVE-2015-5556, CVE-2015-5557, CVE-2015-5559, CVE-2015-5563, CVE-2015-5564, and CVE-2015-5565.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Adobe Flash Player use-after-free vulnerability allows arbitrary code execution; fixed in versions 18.0.0.232 (Windows/OS X) and 11.2.202.508 (Linux).

Vulnerability

A use-after-free vulnerability exists in Adobe Flash Player before 18.0.0.232 on Windows and OS X, before 11.2.202.508 on Linux, Adobe AIR before 18.0.0.199, Adobe AIR SDK before 18.0.0.199, and Adobe AIR SDK & Compiler before 18.0.0.199 [1][2]. The bug is triggered via unspecified vectors, allowing an attacker to reference freed memory in the Flash rendering engine.

Exploitation

An attacker can exploit this remotely by enticing a user to visit a malicious web page or open a crafted SWF file. No authentication or special network position is required; the victim's browser or application must have an affected Flash Player version installed [1][2]. The exploit sequence involves supplying a malformed Flash object that triggers the use-after-free condition.

Impact

Successful exploitation allows arbitrary code execution in the context of the affected Flash Player process. The attacker could gain full control of the user's system, including reading sensitive information, modifying data, or installing malware [1][2].

Mitigation

Adobe released fixed versions: Flash Player 18.0.0.232 (Windows/OS X) and 11.2.202.508 (Linux) alongside AIR 18.0.0.199 [1]. Red Hat and Gentoo advisories confirm these updates are available [1][2]. Users should update immediately; no workaround is known [2].

AI Insight generated on May 23, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

10

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

9

News mentions

0

No linked articles in our index yet.