Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier allows remote attackers to execute arbitrary code via unknown vectors, as exploited in the wild in June 2016.
References
Link | Resource |
---|---|
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00031.html | Mailing List Third Party Advisory |
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00035.html | Mailing List Third Party Advisory |
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00038.html | Mailing List Third Party Advisory |
http://www.securityfocus.com/bid/91184 | Third Party Advisory VDB Entry |
http://www.securitytracker.com/id/1036094 | Third Party Advisory VDB Entry |
https://access.redhat.com/errata/RHSA-2016:1238 | Third Party Advisory |
https://helpx.adobe.com/security/products/flash-player/apsa16-03.html | Vendor Advisory |
https://helpx.adobe.com/security/products/flash-player/apsb16-18.html | Vendor Advisory |
https://security.gentoo.org/glsa/201606-08 | Third Party Advisory |
https://www.kb.cert.org/vuls/id/748992 | Third Party Advisory US Government Resource |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
Configuration 7 (hide)
|
Configuration 8 (hide)
|
History
26 Nov 2021, 15:05
Type | Values Removed | Values Added |
---|---|---|
References | (SECTRACK) http://www.securitytracker.com/id/1036094 - Third Party Advisory, VDB Entry | |
References | (GENTOO) https://security.gentoo.org/glsa/201606-08 - Third Party Advisory | |
References | (BID) http://www.securityfocus.com/bid/91184 - Third Party Advisory, VDB Entry | |
References | (SUSE) http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00035.html - Mailing List, Third Party Advisory | |
References | (SUSE) http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00038.html - Mailing List, Third Party Advisory | |
References | (CERT-VN) https://www.kb.cert.org/vuls/id/748992 - Third Party Advisory, US Government Resource | |
References | (SUSE) http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00031.html - Mailing List, Third Party Advisory | |
CPE | cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise_workstation_extension:12:*:*:*:*:*:*:* cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:* cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise_workstation_extension:12:sp1:*:*:*:*:*:* |
22 Sep 2021, 14:24
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:* |
Information
Published : 2016-06-16 14:59
Updated : 2024-02-04 18:53
NVD link : CVE-2016-4171
Mitre link : CVE-2016-4171
CVE.ORG link : CVE-2016-4171
JSON object : View
Products Affected
apple
- macos
- mac_os_x
microsoft
- windows
- windows_8.1
- windows_10
- chrome_os
opensuse
- opensuse
redhat
- enterprise_linux_desktop
- enterprise_linux_workstation
- enterprise_linux_server
suse
- linux_enterprise_workstation_extension
- linux_enterprise_desktop
linux
- linux_kernel
adobe
- flash_player
- flash_player_for_linux
CWE