VYPR
Unrated severityNVD Advisory· Published Dec 10, 2015· Updated May 6, 2026

CVE-2015-8062

CVE-2015-8062

Description

Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK & Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Use-after-free in Adobe Flash Player before 20.0.0.228 allows remote code execution via unspecified vectors.

Vulnerability

A use-after-free vulnerability exists in Adobe Flash Player versions before 18.0.0.268, 19.x and 20.x before 20.0.0.228 on Windows and macOS, and before 11.2.202.554 on Linux, as well as in Adobe AIR before 20.0.0.204 and related SDKs. The bug occurs when handling certain SWF content, leading to unsafe memory operations. The exact code path is not disclosed but is triggered by unspecified vectors [1].

Exploitation

An attacker can exploit this vulnerability by convincing a user to open a maliciously crafted SWF file, typically via a web page, email, or embedded content. No special authentication or network position is required beyond the ability to serve the crafted file to the victim. The exploit triggers a use-after-free condition in the Flash Player process [1].

Impact

Successful exploitation allows remote attackers to execute arbitrary code in the context of the user running the Flash Player. This can lead to full compromise of the affected system, including data theft, installation of malware, or further privilege escalation. The vulnerability is one of many in the same update batch, all leading to arbitrary code execution [1].

Mitigation

Adobe released official updates: Flash Player 20.0.0.228 (and 11.2.202.554 on Linux), AIR 20.0.0.204, and corresponding SDK versions on 2015-12-08. Users should upgrade immediately. There is no known workaround. Gentoo Linux provides updated packages as part of GLSA 201601-03 [1]. This CVE is not listed on CISA's KEV.

AI Insight generated on May 23, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

17

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

7

News mentions

0

No linked articles in our index yet.