CVE-2014-4671

CVSS V2 Medium 4.3 CVSS V3 None
Description
Adobe Flash Player before 13.0.0.231 and 14.x before 14.0.0.145 on Windows and OS X and before 11.2.202.394 on Linux, Adobe AIR before 14.0.0.137 on Android, Adobe AIR SDK before 14.0.0.137, and Adobe AIR SDK & Compiler before 14.0.0.137 do not properly restrict the SWF file format, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks against JSONP endpoints, and obtain sensitive information, via a crafted OBJECT element with SWF content satisfying the character-set requirements of a callback API.
Overview
  • CVE ID
  • CVE-2014-4671
  • Assigner
  • cve@mitre.org
  • Vulnerability Status
  • Analyzed
  • Published Version
  • 2014-07-09T05:04:24
  • Last Modified Date
  • 2015-09-22T18:47:40
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
AND
cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:* 1 OR 11.2.202.378
cpe:2.3:a:adobe:flash_player:11.2.202.223:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:adobe:flash_player:11.2.202.228:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:adobe:flash_player:11.2.202.233:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:adobe:flash_player:11.2.202.235:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:adobe:flash_player:11.2.202.236:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:adobe:flash_player:11.2.202.238:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:adobe:flash_player:11.2.202.243:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:adobe:flash_player:11.2.202.251:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:adobe:flash_player:11.2.202.258:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:adobe:flash_player:11.2.202.261:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:adobe:flash_player:11.2.202.262:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:adobe:flash_player:11.2.202.270:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:adobe:flash_player:11.2.202.273:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:adobe:flash_player:11.2.202.275:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:adobe:flash_player:11.2.202.280:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:adobe:flash_player:11.2.202.285:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:adobe:flash_player:11.2.202.291:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:adobe:flash_player:11.2.202.297:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:adobe:flash_player:11.2.202.310:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:adobe:flash_player:11.2.202.332:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:adobe:flash_player:11.2.202.335:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:adobe:flash_player:11.2.202.336:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:adobe:flash_player:11.2.202.341:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:adobe:flash_player:11.2.202.346:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:adobe:flash_player:11.2.202.350:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:adobe:flash_player:11.2.202.356:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:adobe:flash_player:11.2.202.359:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:a:adobe:adobe_air:*:*:*:*:*:*:*:* 1 OR 14.0.0.110
cpe:2.3:a:adobe:adobe_air:13.0.0.83:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:adobe:adobe_air:13.0.0.111:*:*:*:*:*:*:* 1 OR
AND
cpe:2.3:a:adobe:adobe_air_sdk:*:*:*:*:*:*:*:* 1 OR 14.0.0.110
cpe:2.3:a:adobe:adobe_air_sdk:13.0.0.83:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:adobe:adobe_air_sdk:13.0.0.111:*:*:*:*:*:*:* 1 OR
AND
cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:* 1 OR 13.0.0.223
cpe:2.3:a:adobe:flash_player:13.0.0.182:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:adobe:flash_player:13.0.0.201:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:adobe:flash_player:13.0.0.206:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:adobe:flash_player:13.0.0.214:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:adobe:flash_player:14.0.0.125:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:* 0 OR
cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:* 0 OR
CVSS Version 2
  • Version
  • 2.0
  • Vector String
  • AV:N/AC:M/Au:N/C:P/I:N/A:N
  • Access Vector
  • NETWORK
  • Access Compatibility
  • MEDIUM
  • Authentication
  • NONE
  • Confidentiality Impact
  • PARTIAL
  • Integrity Impact
  • NONE
  • Availability Impact
  • NONE
  • Base Score
  • 4.3
  • Severity
  • MEDIUM
  • Exploitability Score
  • 8.6
  • Impact Score
  • 2.9
History
Created Old Value New Value Data Type Notes
2022-05-10 10:20:38 Added to TrackCVE
2022-12-01 23:49:36 2014-07-09T05:04Z 2014-07-09T05:04:24 CVE Published Date updated
2022-12-01 23:49:36 2015-09-22T18:47:40 CVE Modified Date updated
2022-12-01 23:49:36 Analyzed Vulnerability Status updated