VYPR
Unrated severityNVD Advisory· Published Dec 10, 2015· Updated May 6, 2026

CVE-2015-8455

CVE-2015-8455

Description

Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK & Compiler before 20.0.0.204 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-8045, CVE-2015-8047, CVE-2015-8060, CVE-2015-8408, CVE-2015-8416, CVE-2015-8417, CVE-2015-8418, CVE-2015-8419, CVE-2015-8443, CVE-2015-8444, and CVE-2015-8451.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Heap memory corruption in Adobe Flash Player before 20.0.0.228 allows remote attackers to execute arbitrary code or cause a denial of service.

Vulnerability

A heap memory corruption vulnerability exists in Adobe Flash Player versions before 18.0.0.268, 19.x and 20.x before 20.0.0.228 on Windows and OS X, and before 11.2.202.554 on Linux. The same flaw affects Adobe AIR before 20.0.0.204 and its SDK components. The exact vector is unspecified, but the corruption can be triggered by processing specially crafted SWF content [1].

Exploitation

An attacker can deliver the malicious SWF file through a web page or other means, and the user must open the file or visit the page in a browser that has the vulnerable Flash player installed. No authentication or special network position is required beyond standard web access [1].

Impact

Successful exploitation can lead to arbitrary code execution with the privileges of the affected process, or a denial of service (application crash). The full impact includes potential information disclosure and security restriction bypass [1].

Mitigation

Adobe released fixed versions on 8 December 2015 (Flash Player 20.0.0.228, AIR 20.0.0.204, and corresponding SDKs). Gentoo advises upgrading to >=www-plugins/adobe-flash-11.2.202.559. No workaround exists [1].

AI Insight generated on May 23, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

17

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

10

News mentions

0

No linked articles in our index yet.