VYPR
Unrated severityNVD Advisory· Published Dec 10, 2015· Updated May 6, 2026

CVE-2015-8432

CVE-2015-8432

Description

Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK & Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Use-after-free in Flash Player before 18.0.0.268/20.0.0.228 before allows remote code execution via unspecified vectors.

Vulnerability

A use-after-free vulnerability exists in Adobe Flash Player before version 18.0.0.268 and 20.x before 20.0.0.228 on Windows and OS X, before 11.2.202.554 on Linux, and in Adobe AIR before 20.0.0.204, AIR SDK before 20.0.0.204, and AIR SDK & Compiler before 20.0.0.204 [1]. The flaw is triggered via unspecified vectors, indicating a memory corruption issue where an object is accessed after it has been freed, leading to potential attacker control of program flow.

Exploitation

An attacker can exploit this vulnerability by crafting a malicious SWF file or content that, when processed by an affected Flash Player instance, triggers the use-after-free condition. No special authentication or local access is required; the attack can be delivered remotely through a web page or other means that loads the malicious Flash content [1]. The exploitation does not require user interaction beyond visiting the hostile page or opening the malicious file.

Impact

Successful exploitation allows an attacker to execute arbitrary code with the privileges of the user running Flash Player. This can lead to full compromise of the affected system, including installation of programs, viewing, changing, or deleting data, and creating new accounts with full user rights [1]. The vulnerability is rated with a high CVSS score due to the potential for remote code execution.

Mitigation

Adobe has released patched versions: Flash Player 18.0.0.268 and 20.0.0.228 (and 11.2.202.554 on Linux) along with corresponding AIR updates [1]. Users should upgrade immediately. Gentoo Linux provides updated packages via >=www-plugins/adobe-flash-11.2.202.559. No workaround is known at this time [1]. The vulnerability is not listed in CISA's Known Exploited Vulnerabilities (KEV) catalog.

AI Insight generated on May 23, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

16

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

10

News mentions

0

No linked articles in our index yet.