Adobe Flash Player 21.0.0.226 and earlier allows remote attackers to execute arbitrary code via unspecified vectors, as exploited in the wild in May 2016.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
21 Nov 2024, 02:51
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00044.html - Mailing List, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00045.html - Mailing List, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00046.html - Mailing List, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00047.html - Mailing List, Third Party Advisory | |
References | () http://rhn.redhat.com/errata/RHSA-2016-1079.html - Third Party Advisory | |
References | () http://www.securityfocus.com/bid/90505 - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://www.securitytracker.com/id/1035826 - Broken Link, Third Party Advisory, VDB Entry | |
References | () https://helpx.adobe.com/security/products/flash-player/apsa16-02.html - Broken Link, Vendor Advisory | |
References | () https://helpx.adobe.com/security/products/flash-player/apsb16-15.html - Broken Link | |
References | () https://security.gentoo.org/glsa/201606-08 - Third Party Advisory | |
References | () https://www.exploit-db.com/exploits/46339/ - Exploit, Third Party Advisory, VDB Entry |
16 Jul 2024, 17:34
Type | Values Removed | Values Added |
---|---|---|
First Time |
Suse linux Enterprise Desktop
Suse Opensuse opensuse Redhat enterprise Linux Desktop Redhat enterprise Linux Server Opensuse evergreen Redhat Redhat enterprise Linux Server From Rhui Suse linux Enterprise Workstation Extension Redhat enterprise Linux Workstation Opensuse |
|
References | () http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00044.html - Mailing List, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00045.html - Mailing List, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00046.html - Mailing List, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00047.html - Mailing List, Third Party Advisory | |
References | () http://rhn.redhat.com/errata/RHSA-2016-1079.html - Third Party Advisory | |
References | () http://www.securityfocus.com/bid/90505 - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://www.securitytracker.com/id/1035826 - Broken Link, Third Party Advisory, VDB Entry | |
References | () https://helpx.adobe.com/security/products/flash-player/apsa16-02.html - Broken Link, Vendor Advisory | |
References | () https://helpx.adobe.com/security/products/flash-player/apsb16-15.html - Broken Link | |
References | () https://security.gentoo.org/glsa/201606-08 - Third Party Advisory | |
References | () https://www.exploit-db.com/exploits/46339/ - Exploit, Third Party Advisory, VDB Entry | |
CPE | cpe:2.3:o:google:chrome_os:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:* |
cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_from_rhui:6.0:*:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise_workstation_extension:12:sp1:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_from_rhui:5.0:*:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:* cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:* cpe:2.3:o:opensuse:evergreen:11.4:*:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise_workstation_extension:12:-:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:* cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:* |
Information
Published : 2016-05-11 01:59
Updated : 2024-11-21 02:51
NVD link : CVE-2016-4117
Mitre link : CVE-2016-4117
CVE.ORG link : CVE-2016-4117
JSON object : View
Products Affected
opensuse
- evergreen
- opensuse
redhat
- enterprise_linux_server_from_rhui
- enterprise_linux_workstation
- enterprise_linux_server
- enterprise_linux_desktop
suse
- linux_enterprise_desktop
- linux_enterprise_workstation_extension
adobe
- flash_player
CWE