VYPR
High severity8.8NVD Advisory· Published Dec 28, 2015· Updated May 6, 2026

CVE-2015-8640

CVE-2015-8640

Description

Use-after-free vulnerability in Adobe Flash Player before 18.0.0.324 and 19.x and 20.x before 20.0.0.267 on Windows and OS X and before 11.2.202.559 on Linux, Adobe AIR before 20.0.0.233, Adobe AIR SDK before 20.0.0.233, and Adobe AIR SDK & Compiler before 20.0.0.233 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8634, CVE-2015-8635, CVE-2015-8638, CVE-2015-8639, CVE-2015-8641, CVE-2015-8642, CVE-2015-8643, CVE-2015-8646, CVE-2015-8647, CVE-2015-8648, CVE-2015-8649, and CVE-2015-8650.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Use-after-free in Adobe Flash Player before 20.0.0.267 allows remote attackers to execute arbitrary code via unspecified vectors.

Vulnerability

A use-after-free vulnerability exists in Adobe Flash Player versions before 18.0.0.324, 19.x and 20.x before 20.0.0.267 on Windows and OS X, and before 11.2.202.559 on Linux. It also affects Adobe AIR before 20.0.0.233, Adobe AIR SDK before 20.0.0.233, and Adobe AIR SDK & Compiler before 20.0.0.233. The flaw is triggered via unspecified vectors, leading to memory corruption. [1][2]

Exploitation

An attacker can exploit this vulnerability by convincing a user to open a specially crafted Flash file, typically delivered through a web page or email attachment. No authentication is required, and the attack can be performed remotely. The use-after-free condition occurs during memory handling, allowing the attacker to control execution flow. [1][2]

Impact

Successful exploitation allows arbitrary code execution in the context of the affected application. This can lead to full system compromise, including the ability to install programs, view, change, or delete data, or create new accounts with full user rights. [1][2]

Mitigation

Adobe released updates to address this vulnerability: Flash Player 20.0.0.267 (Windows and OS X), 11.2.202.559 (Linux), and AIR 20.0.0.233. Red Hat and Gentoo advisories recommend updating to these patched versions. [1][2] No workaround is available.

AI Insight generated on May 23, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

20

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

12

News mentions

0

No linked articles in our index yet.