Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier allows remote attackers to execute arbitrary code via unknown vectors, as exploited in the wild in June 2016.
References
Configurations
Configuration 1 (hide)
| AND |
|
Configuration 2 (hide)
| AND |
|
Configuration 3 (hide)
| AND |
|
Configuration 4 (hide)
| AND |
|
Configuration 5 (hide)
| AND |
|
Configuration 6 (hide)
| AND |
|
Configuration 7 (hide)
|
Configuration 8 (hide)
|
History
22 Oct 2025, 00:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
21 Oct 2025, 20:16
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
21 Oct 2025, 19:16
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
14 Feb 2025, 16:12
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:* |
21 Nov 2024, 02:51
| Type | Values Removed | Values Added |
|---|---|---|
| References | () http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00031.html - Mailing List, Third Party Advisory | |
| References | () http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00035.html - Mailing List, Third Party Advisory | |
| References | () http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00038.html - Mailing List, Third Party Advisory | |
| References | () http://www.securityfocus.com/bid/91184 - Third Party Advisory, VDB Entry | |
| References | () http://www.securitytracker.com/id/1036094 - Third Party Advisory, VDB Entry | |
| References | () https://access.redhat.com/errata/RHSA-2016:1238 - Third Party Advisory | |
| References | () https://helpx.adobe.com/security/products/flash-player/apsa16-03.html - Vendor Advisory | |
| References | () https://helpx.adobe.com/security/products/flash-player/apsb16-18.html - Vendor Advisory | |
| References | () https://security.gentoo.org/glsa/201606-08 - Third Party Advisory | |
| References | () https://www.kb.cert.org/vuls/id/748992 - Third Party Advisory, US Government Resource |
26 Nov 2021, 15:05
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise_workstation_extension:12:*:*:*:*:*:*:* cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:* cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise_workstation_extension:12:sp1:*:*:*:*:*:* |
|
| References | (SECTRACK) http://www.securitytracker.com/id/1036094 - Third Party Advisory, VDB Entry | |
| References | (GENTOO) https://security.gentoo.org/glsa/201606-08 - Third Party Advisory | |
| References | (BID) http://www.securityfocus.com/bid/91184 - Third Party Advisory, VDB Entry | |
| References | (SUSE) http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00035.html - Mailing List, Third Party Advisory | |
| References | (SUSE) http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00038.html - Mailing List, Third Party Advisory | |
| References | (CERT-VN) https://www.kb.cert.org/vuls/id/748992 - Third Party Advisory, US Government Resource | |
| References | (SUSE) http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00031.html - Mailing List, Third Party Advisory |
22 Sep 2021, 14:24
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:* |
Information
Published : 2016-06-16 14:59
Updated : 2025-10-22 00:15
NVD link : CVE-2016-4171
Mitre link : CVE-2016-4171
CVE.ORG link : CVE-2016-4171
JSON object : View
Products Affected
microsoft
- windows_10
- windows_8.1
- windows
apple
- mac_os_x
- macos
redhat
- enterprise_linux_desktop
- enterprise_linux_workstation
- enterprise_linux_server
- chrome_os
adobe
- flash_player
opensuse
- opensuse
suse
- linux_enterprise_desktop
- linux_enterprise_workstation_extension
linux
- linux_kernel
CWE
