VYPR
Unrated severityNVD Advisory· Published Oct 15, 2015· Updated May 6, 2026

CVE-2015-7633

CVE-2015-7633

Description

Adobe Flash Player before 18.0.0.252 and 19.x before 19.0.0.207 on Windows and OS X and before 11.2.202.535 on Linux, Adobe AIR before 19.0.0.213, Adobe AIR SDK before 19.0.0.213, and Adobe AIR SDK & Compiler before 19.0.0.213 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-7625, CVE-2015-7626, CVE-2015-7627, CVE-2015-7630, and CVE-2015-7634.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Attackers can execute arbitrary code or cause denial of service via memory corruption in Adobe Flash Player before 18.0.0.252/19.0.0.207 or 11.2.202.535.

Vulnerability

CVE-2015-7633 is a memory corruption vulnerability in Adobe Flash Player that can lead to arbitrary code execution or a denial of service. The affected versions are Adobe Flash Player before 18.0.0.252 and 19.x before 19.0.0.207 on Windows and OS X, and before 11.2.202.535 on Linux, as well as Adobe AIR before 19.0.0.213, Adobe AIR SDK before 19.0.0.213, and Adobe AIR SDK & Compiler before 19.0.0.213 [1]. The flaw is triggered via unspecified vectors, requiring that a user loads a specially crafted SWF file [2].

Exploitation

An attacker can exploit this vulnerability by convincing a victim to open a malicious SWF file, typically by hosting it on a website or embedding it in an email or other document. No special authentication or network position beyond delivering the SWF is required – the victim’s browser or application that handles Flash content will automatically parse the malicious file, leading to memory corruption [2].

Impact

Successful exploitation results in arbitrary code execution in the context of the affected user or process, or a denial of service (crash) [2]. The attacker gains full control of the victim’s system at the privilege level of the Flash process, enabling actions such as data theft, malware installation, or system disruption.

Mitigation

Adobe released updated versions to fix this vulnerability: Flash Player 18.0.0.252, 19.0.0.207, and 11.2.202.548 (Linux), along with corresponding AIR updates (19.0.0.213) [1]. Red Hat provided an updated flash-plugin package (version 11.2.202.548) for Red Hat Enterprise Linux 5 and 6 Supplementary [2]. Gentoo also updated www-plugins/adobe-flash to version 11.2.202.548 [3]. Users and administrators should apply the latest updates immediately; no effective workaround is known beyond disabling or removing Flash Player [3].

AI Insight generated on May 23, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

12

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

10

News mentions

0

No linked articles in our index yet.