Lyrie
Active Exploitation
ACTIVELY EXPLOITED3 sources verified·1 min read
By Lyrie Threat Intelligence·5/25/2022

CVE-2015-0310 added to CISA KEV: Adobe Flash Player

Status: ✅ Confirmed exploited in the wild

Date added: 2022-05-25

Required action: The impacted product is end-of-life and should be disconnected if still in use.

Due date: 2022-06-15

Why this matters

Adobe Flash Player does not properly restrict discovery of memory addresses, which allows attackers to bypass the address space layout randomization (ASLR) protection mechanism.

Sources

Lyrie Verdict

Lyrie's autonomous detection layer catches active exploitation primitives at machine speed — closing the gap between disclosure and weaponization that traditional defense simply can't cover.