var-201609-0460
Vulnerability from variot
Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4274, CVE-2016-4275, CVE-2016-4276, CVE-2016-4280, CVE-2016-4282, CVE-2016-4283, CVE-2016-4284, CVE-2016-4285, CVE-2016-6922, and CVE-2016-6924. Attackers can exploit these issues to execute arbitrary code in the context of the user running the affected applications. Failed exploit attempts will likely cause a denial-of-service condition. The product enables viewing of applications, content and video across screens and browsers. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
===================================================================== Red Hat Security Advisory
Synopsis: Critical: flash-plugin security update Advisory ID: RHSA-2016:1865-01 Product: Red Hat Enterprise Linux Supplementary Advisory URL: https://rhn.redhat.com/errata/RHSA-2016-1865.html Issue date: 2016-09-14 CVE Names: CVE-2016-4271 CVE-2016-4272 CVE-2016-4274 CVE-2016-4275 CVE-2016-4276 CVE-2016-4277 CVE-2016-4278 CVE-2016-4279 CVE-2016-4280 CVE-2016-4281 CVE-2016-4282 CVE-2016-4283 CVE-2016-4284 CVE-2016-4285 CVE-2016-4287 CVE-2016-6921 CVE-2016-6922 CVE-2016-6923 CVE-2016-6924 CVE-2016-6925 CVE-2016-6926 CVE-2016-6927 CVE-2016-6929 CVE-2016-6930 CVE-2016-6931 CVE-2016-6932 =====================================================================
- Summary:
An update for flash-plugin is now available for Red Hat Enterprise Linux 5 Supplementary and Red Hat Enterprise Linux 6 Supplementary.
Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
- Relevant releases/architectures:
Red Hat Enterprise Linux Desktop Supplementary (v. 5) - i386, x86_64 Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64 Red Hat Enterprise Linux Server Supplementary (v. 5) - i386, x86_64 Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64
- Description:
The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash Player web browser plug-in.
This update upgrades Flash Player to version 11.2.202.635. These vulnerabilities, detailed in the Adobe Security Bulletin listed in the References section, could allow an attacker to create a specially crafted SWF file that would cause flash-plugin to crash, execute arbitrary code, or disclose sensitive information when the victim loaded a page containing the malicious SWF content. (CVE-2016-4271, CVE-2016-4272, CVE-2016-4274, CVE-2016-4275, CVE-2016-4276, CVE-2016-4277, CVE-2016-4278, CVE-2016-4279, CVE-2016-4280, CVE-2016-4281, CVE-2016-4282, CVE-2016-4283, CVE-2016-4284, CVE-2016-4285, CVE-2016-4287, CVE-2016-6921, CVE-2016-6922, CVE-2016-6923, CVE-2016-6924, CVE-2016-6925, CVE-2016-6926, CVE-2016-6927, CVE-2016-6929, CVE-2016-6930, CVE-2016-6931, CVE-2016-6932)
- Solution:
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
- Bugs fixed (https://bugzilla.redhat.com/):
1375725 - flash-plugin: multiple code execution issues fixed in APSB16-29
- Package List:
Red Hat Enterprise Linux Desktop Supplementary (v. 5):
i386: flash-plugin-11.2.202.635-1.el5_11.i386.rpm
x86_64: flash-plugin-11.2.202.635-1.el5_11.i386.rpm
Red Hat Enterprise Linux Server Supplementary (v. 5):
i386: flash-plugin-11.2.202.635-1.el5_11.i386.rpm
x86_64: flash-plugin-11.2.202.635-1.el5_11.i386.rpm
Red Hat Enterprise Linux Desktop Supplementary (v. 6):
i386: flash-plugin-11.2.202.635-1.el6_8.i686.rpm
x86_64: flash-plugin-11.2.202.635-1.el6_8.i686.rpm
Red Hat Enterprise Linux Server Supplementary (v. 6):
i386: flash-plugin-11.2.202.635-1.el6_8.i686.rpm
x86_64: flash-plugin-11.2.202.635-1.el6_8.i686.rpm
Red Hat Enterprise Linux Workstation Supplementary (v. 6):
i386: flash-plugin-11.2.202.635-1.el6_8.i686.rpm
x86_64: flash-plugin-11.2.202.635-1.el6_8.i686.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/
- References:
https://access.redhat.com/security/cve/CVE-2016-4271 https://access.redhat.com/security/cve/CVE-2016-4272 https://access.redhat.com/security/cve/CVE-2016-4274 https://access.redhat.com/security/cve/CVE-2016-4275 https://access.redhat.com/security/cve/CVE-2016-4276 https://access.redhat.com/security/cve/CVE-2016-4277 https://access.redhat.com/security/cve/CVE-2016-4278 https://access.redhat.com/security/cve/CVE-2016-4279 https://access.redhat.com/security/cve/CVE-2016-4280 https://access.redhat.com/security/cve/CVE-2016-4281 https://access.redhat.com/security/cve/CVE-2016-4282 https://access.redhat.com/security/cve/CVE-2016-4283 https://access.redhat.com/security/cve/CVE-2016-4284 https://access.redhat.com/security/cve/CVE-2016-4285 https://access.redhat.com/security/cve/CVE-2016-4287 https://access.redhat.com/security/cve/CVE-2016-6921 https://access.redhat.com/security/cve/CVE-2016-6922 https://access.redhat.com/security/cve/CVE-2016-6923 https://access.redhat.com/security/cve/CVE-2016-6924 https://access.redhat.com/security/cve/CVE-2016-6925 https://access.redhat.com/security/cve/CVE-2016-6926 https://access.redhat.com/security/cve/CVE-2016-6927 https://access.redhat.com/security/cve/CVE-2016-6929 https://access.redhat.com/security/cve/CVE-2016-6930 https://access.redhat.com/security/cve/CVE-2016-6931 https://access.redhat.com/security/cve/CVE-2016-6932 https://access.redhat.com/security/updates/classification/#critical https://helpx.adobe.com/security/products/flash-player/apsb16-29.html
- Contact:
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/
Copyright 2016 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iD8DBQFX2Pp+XlSAg2UNWIIRAp1iAKCmfmh77bYTg10K3b0b6aJuxtLEgACfZlyh ynwsnFlRoTlOLVQLiobHvps= =1fXO -----END PGP SIGNATURE-----
-- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce .
Background
The Adobe Flash Player is a renderer for the SWF file format, which is commonly used to provide interactive websites. Please review the CVE identifiers referenced below for details.
Workaround
There is no known workaround at this time.
Resolution
All Adobe Flash Player 23.x users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot -v ">=www-plugins/adobe-flash-23.0.0.205"
All Adobe Flash Player 11.x users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot -v ">=www-plugins/adobe-flash-11.2.202.635"
References
[ 1 ] CVE-2016-4182 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4182 [ 2 ] CVE-2016-4271 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4271 [ 3 ] CVE-2016-4272 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4272 [ 4 ] CVE-2016-4273 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4273 [ 5 ] CVE-2016-4274 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4274 [ 6 ] CVE-2016-4275 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4275 [ 7 ] CVE-2016-4276 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4276 [ 8 ] CVE-2016-4277 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4277 [ 9 ] CVE-2016-4278 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4278 [ 10 ] CVE-2016-4279 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4279 [ 11 ] CVE-2016-4280 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4280 [ 12 ] CVE-2016-4281 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4281 [ 13 ] CVE-2016-4282 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4282 [ 14 ] CVE-2016-4283 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4283 [ 15 ] CVE-2016-4284 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4284 [ 16 ] CVE-2016-4285 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4285 [ 17 ] CVE-2016-4286 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4286 [ 18 ] CVE-2016-4287 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4287 [ 19 ] CVE-2016-6921 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6921 [ 20 ] CVE-2016-6922 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6922 [ 21 ] CVE-2016-6923 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6923 [ 22 ] CVE-2016-6924 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6924 [ 23 ] CVE-2016-6925 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6925 [ 24 ] CVE-2016-6926 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6926 [ 25 ] CVE-2016-6927 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6927 [ 26 ] CVE-2016-6929 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6929 [ 27 ] CVE-2016-6930 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6930 [ 28 ] CVE-2016-6931 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6931 [ 29 ] CVE-2016-6932 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6932 [ 30 ] CVE-2016-6981 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6981 [ 31 ] CVE-2016-6982 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6982 [ 32 ] CVE-2016-6983 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6983 [ 33 ] CVE-2016-6984 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6984 [ 34 ] CVE-2016-6985 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6985 [ 35 ] CVE-2016-6986 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6986 [ 36 ] CVE-2016-6987 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6987 [ 37 ] CVE-2016-6989 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6989 [ 38 ] CVE-2016-6990 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6990 [ 39 ] CVE-2016-6992 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6992 [ 40 ] CVE-2016-7855 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7855
Availability
This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
https://security.gentoo.org/glsa/201610-10
Concerns?
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.
License
Copyright 2016 Gentoo Foundation, Inc; referenced text belongs to its owner(s).
The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201609-0460", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "flash player", "scope": "lte", "trust": 1.0, "vendor": "adobe", "version": "18.0.0.366" }, { "model": "flash player", "scope": "lte", "trust": 1.0, "vendor": "adobe", "version": "22.0.0.211" }, { "model": "flash player desktop runtime", "scope": "lte", "trust": 1.0, "vendor": "adobe", "version": "22.0.0.211" }, { "model": "flash player", "scope": "lte", "trust": 1.0, "vendor": "adobe", "version": "11.2.202.632" }, { "model": "flash player", "scope": "eq", "trust": 0.9, "vendor": "adobe", "version": "22.0.0.211" }, { "model": "chrome", "scope": null, "trust": 0.8, "vendor": "google", "version": null }, { "model": "flash player", "scope": "lt", "trust": 0.8, "vendor": "adobe", "version": "11.2.202.635 (linux)" }, { "model": "flash player", "scope": "lt", "trust": 0.8, "vendor": "adobe", "version": "23.0.0.162 (windows 10/8.1 edition microsoft edge/internet explorer 11)" }, { "model": "flash player", "scope": "lt", "trust": 0.8, "vendor": "adobe", "version": "23.0.0.162 (windows/macintosh/linux/chromeos edition chrome)" }, { "model": "flash player", "scope": "lt", "trust": 0.8, "vendor": "adobe", "version": "desktop runtime 23.0.0.162 (windows/macintosh)" }, { "model": "flash player", "scope": "lt", "trust": 0.8, "vendor": "adobe", "version": "continuous support release 18.0.0.375 (windows/macintosh)" }, { "model": "windows 10", "scope": "eq", "trust": 0.8, "vendor": "microsoft", "version": "for 32-bit systems" }, { "model": "windows 10", "scope": "eq", "trust": 0.8, "vendor": "microsoft", "version": "for x64-based systems" }, { "model": "windows 10", "scope": "eq", "trust": 0.8, "vendor": "microsoft", "version": "version 1511 for 32-bit systems" }, { "model": "windows 10", "scope": "eq", "trust": 0.8, "vendor": "microsoft", "version": "version 1511 for x64-based systems" }, { "model": "windows 10", "scope": "eq", "trust": 0.8, "vendor": "microsoft", "version": "version 1607 for 32-bit systems" }, { "model": "windows 10", "scope": "eq", "trust": 0.8, "vendor": "microsoft", "version": "version 1607 for x64-based systems" }, { "model": "windows 8.1", "scope": "eq", "trust": 0.8, "vendor": "microsoft", "version": "for 32-bit systems" }, { "model": "windows 8.1", "scope": "eq", "trust": 0.8, "vendor": "microsoft", "version": "for x64-based systems" }, { "model": "windows rt 8.1", "scope": null, "trust": 0.8, "vendor": "microsoft", "version": null }, { "model": "windows server 2012", "scope": "eq", "trust": 0.8, "vendor": "microsoft", "version": "none" }, { "model": "windows server 2012", "scope": "eq", "trust": 0.8, "vendor": "microsoft", "version": "r2" }, { "model": "internet explorer", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "11" }, { "model": "edge", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "0" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "16.0235" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "14.0179" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "14.0177" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "14.0176" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "13.0259" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "13.0252" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "13.0214" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "13.0182" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "12.070" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.7.700275" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.7.700232" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.7.700169" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.6.602105" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.5.502131" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.5.502124" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.5.502118" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.5.50080" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.4.400231" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.3.300271" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.3.300270" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.3.300268" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.3.300265" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.3.300262" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.3.300257" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.3.300250" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.3.300231" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.3.300214" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.20295" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202425" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202418" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202400" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202359" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202350" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202346" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202341" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202297" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202280" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202238" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202236" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202221" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202197" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202160" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.1.11569" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.1.11554" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.1.11164" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.1.11150" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.0.198" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.0.160" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.0.1129" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.1.53.64" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.1.51.66" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.0.452" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.0.3218" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.0.22.87" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.0.15.3" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.0.12.36" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.0.12.35" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9.0.262" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9.0.2460" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9.0.152.0" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9.0.151.0" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9.0.124.0" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9.0.9.0" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9.0.8.0" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9.0.48.0" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9.0.47.0" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9.0.45.0" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9.0.31.0" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9.0.289.0" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9.0.283.0" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9.0.280" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9.0.28.0" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9.0.277.0" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9.0.262.0" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9.0.260.0" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9.0.246.0" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9.0.159.0" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9.0.155.0" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9.0.115.0" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "8.0.35.0" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "8.0.34.0" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "8" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "7.0.73.0" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "7.0.70.0" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "7.0.69.0" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "7.0.68.0" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "7.0.67.0" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "7.0.66.0" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "7.0.61.0" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "7.0.60.0" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "7.0.53.0" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "7.0.24.0" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "7.0.19.0" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "7.0.14.0" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "7" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "4" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "3" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "22.0.0.209" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "22.0.0.192" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "21.0.0.242" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "21.0.0.241" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "21.0.0.226" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "21.0.0.216" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "21.0.0.213" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "21.0.0.197" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "21.0.0.182" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "21.0" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "20.0.0.306" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "20.0.0.286" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "20.0.0.272" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "20.0.0.267" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "20.0.0.235" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "20.0.0.228" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "2" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "19.0.0.245" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "19.0.0.226" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "19.0.0.207" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "19.0.0.185" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "18.0.0.366" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "18.0.0.360" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "18.0.0.352" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "18.0.0.343" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "18.0.0.333" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "18.0.0.329" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "18.0.0.326" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "18.0.0.324" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "18.0.0.268" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "18.0.0.261" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "18.0.0.255" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "18.0.0.252" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "18.0.0.241" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "18.0.0.233" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "18.0.0.232" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "18.0.0.209" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "18.0.0.204" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "18.0.0.203" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "18.0.0.194" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "18.0.0.161" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "18.0.0.160" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "18.0.0.143" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "17.0.0.188" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "17.0.0.169" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "17.0.0.134" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "16.0.0.305" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "16.0.0.296" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "16.0.0.291" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "16.0.0.287" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "16.0.0.257" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "16.0.0.234" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "15.0.0.246" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "15.0.0.242" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "15.0.0.239" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "15.0.0.223" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "15.0.0.189" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "15.0.0.152" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "14.0.0.145" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "14.0.0.125" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "13.0.0.309" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "13.0.0.302" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "13.0.0.296" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "13.0.0.292" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "13.0.0.289" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "13.0.0.281" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "13.0.0.277" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "13.0.0.269" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "13.0.0.264" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "13.0.0.262" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "13.0.0.260" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "13.0.0.258" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "13.0.0.250" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "13.0.0.244" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "13.0.0.241" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "13.0.0.231" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "13.0.0.223" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "13.0.0.206" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "13.0.0.201" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "12.0.0.77" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "12.0.0.44" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "12.0.0.43" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "12.0.0.41" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "12.0.0.38" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "12" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.9.900.170" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.9.900.152" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.9.900.117" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.8.800.97" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.8.800.94" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.8.800.170" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.8.800.168" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.7.700.279" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.7.700.272" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.7.700.269" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.7.700.261" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.7.700.260" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.7.700.257" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.7.700.252" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.7.700.242" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.7.700.225" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.7.700.224" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.7.700.203" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.7.700.202" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.6.602.180" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.6.602.171" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.6.602.168" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.6.602.167" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.5.502.149" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.5.502.146" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.5.502.136" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.5.502.135" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.5.502.110" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.4.402.287" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.4.402.278" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.4.402.265" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.3.378.5" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.3.31.230" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.3.300.273" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202.632" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202.626" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202.621" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202.616" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202.577" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202.569" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202.559" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202.554" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202.548" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202.540" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202.535" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202.521" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202.508" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202.491" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202.481" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202.468" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202.466" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202.460" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202.457" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202.451" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202.442" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202.440" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202.438" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202.429" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202.424" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202.411" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202.406" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202.394" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202.378" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202.356" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202.336" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202.335" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202.332" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202.327" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202.310" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202.291" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202.285" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202.275" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202.273" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202.270" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202.262" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202.261" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202.258" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202.251" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202.243" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202.238" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202.235" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202.233" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202.229" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202.228" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202.223" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.1.115.81" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.1.115.8" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.1.115.7" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.1.115.63" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.1.115.6" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.1.115.59" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.1.115.58" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.1.115.48" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.1.115.34" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.1.115.11" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.1.112.61" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.1.111.9" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.1.111.8" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.1.111.73" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.1.111.7" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.1.111.6" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.1.111.54" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.1.111.5" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.1.111.44" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.1.111.10" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.1.102.63" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.1.102.62" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.1.102.59" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.1.102.55" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.1.102.228" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.1" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.0.1.153" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.0.1.152" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.0" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.3.186.7" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.3.186.6" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.3.186.3" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.3.186.2" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.3.185.25" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.3.185.24" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.3.185.23" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.3.185.22" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.3.185.21" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.3.183.86" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.3.183.75" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.3.183.7" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.3.183.68" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.3.183.67" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.3.183.63" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.3.183.61" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.3.183.51" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.3.183.50" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.3.183.5" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.3.183.48" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.3.183.43" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.3.183.4" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.3.183.29" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.3.183.25" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.3.183.23" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.3.183.20" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.3.183.19" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.3.183.18" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.3.183.16" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.3.183.15" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.3.183.11" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.3.183.10" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.3.181.34" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.3.181.26" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.3.181.23" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.3.181.22" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.3.181.16" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.3.181.14" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.2.159.1" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.2.157.51" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.2.156.12" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.2.154.28" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.2.154.27" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.2.154.25" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.2.154.24" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.2.154.18" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.2.154.13" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.2.153.1" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.2.152.33" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.2.152.32" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.2.152.26" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.2.152.21" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.2.152" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.1.95.2" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.1.95.1" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.1.92.8" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.1.92.10" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.1.85.3" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.1.82.76" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.1.52.15" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.1.52.14.1" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.1.52.14" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.1.106.17" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.1.106.16" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.1.105.6" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.1.102.65" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.1.102.64" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.1" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.0.42.34" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.0.32.18" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.0.2.54" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10" }, { "model": "flash player", "scope": "ne", "trust": 0.3, "vendor": "adobe", "version": "23.0.0.162" }, { "model": "flash player", "scope": "ne", "trust": 0.3, "vendor": "adobe", "version": "18.0.0.375" }, { "model": "flash player", "scope": "ne", "trust": 0.3, "vendor": "adobe", "version": "11.2.202.635" } ], "sources": [ { "db": "BID", "id": "92930" }, { "db": "JVNDB", "id": "JVNDB-2016-004741" }, { "db": "NVD", "id": "CVE-2016-4281" }, { "db": "CNNVD", "id": "CNNVD-201609-295" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "11.2.202.632", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:edge:*:*", "cpe_name": [], "versionEndIncluding": "22.0.0.211", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:internet_explorer:*:*", "cpe_name": [], "versionEndIncluding": "22.0.0.211", "vulnerable": true } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:adobe:flash_player_desktop_runtime:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "22.0.0.211", "vulnerable": true } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:*:*:*:*:esr:*:*:*", "cpe_name": [], "versionEndIncluding": "18.0.0.366", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:chrome:*:*", "cpe_name": [], "versionEndIncluding": "22.0.0.211", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:google:chrome_os:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2016-4281" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Mateusz Jurczyk and Natalie Silvanovich of Google Project Zero, b0nd@garage4hackers working with Trend Micro\u0027s Zero Day Initiative, Weizhong Qian of ART\u0026UESTC\u0027s Neklab, Tao Yan (@Ga1ois) of Palo Alto Networks, Yuki Chen of Qihoo 360 Vulcan Team and willJ o", "sources": [ { "db": "BID", "id": "92930" } ], "trust": 0.3 }, "cve": "CVE-2016-4281", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.6, "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": true, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 10.0, "confidentialityImpact": "Complete", "exploitabilityScore": null, "id": "CVE-2016-4281", "impactScore": null, "integrityImpact": "Complete", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "VHN-93100", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULMON", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.6, "id": "CVE-2016-4281", "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "HIGH", "trust": 0.1, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.8, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2016-4281", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2016-4281", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2016-4281", "trust": 0.8, "value": "Critical" }, { "author": "CNNVD", "id": "CNNVD-201609-295", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-93100", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2016-4281", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-93100" }, { "db": "VULMON", "id": "CVE-2016-4281" }, { "db": "JVNDB", "id": "JVNDB-2016-004741" }, { "db": "NVD", "id": "CVE-2016-4281" }, { "db": "CNNVD", "id": "CNNVD-201609-295" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4274, CVE-2016-4275, CVE-2016-4276, CVE-2016-4280, CVE-2016-4282, CVE-2016-4283, CVE-2016-4284, CVE-2016-4285, CVE-2016-6922, and CVE-2016-6924. \nAttackers can exploit these issues to execute arbitrary code in the context of the user running the affected applications. Failed exploit attempts will likely cause a denial-of-service condition. The product enables viewing of applications, content and video across screens and browsers. \n-----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n=====================================================================\n Red Hat Security Advisory\n\nSynopsis: Critical: flash-plugin security update\nAdvisory ID: RHSA-2016:1865-01\nProduct: Red Hat Enterprise Linux Supplementary\nAdvisory URL: https://rhn.redhat.com/errata/RHSA-2016-1865.html\nIssue date: 2016-09-14\nCVE Names: CVE-2016-4271 CVE-2016-4272 CVE-2016-4274 \n CVE-2016-4275 CVE-2016-4276 CVE-2016-4277 \n CVE-2016-4278 CVE-2016-4279 CVE-2016-4280 \n CVE-2016-4281 CVE-2016-4282 CVE-2016-4283 \n CVE-2016-4284 CVE-2016-4285 CVE-2016-4287 \n CVE-2016-6921 CVE-2016-6922 CVE-2016-6923 \n CVE-2016-6924 CVE-2016-6925 CVE-2016-6926 \n CVE-2016-6927 CVE-2016-6929 CVE-2016-6930 \n CVE-2016-6931 CVE-2016-6932 \n=====================================================================\n\n1. Summary:\n\nAn update for flash-plugin is now available for Red Hat Enterprise Linux 5\nSupplementary and Red Hat Enterprise Linux 6 Supplementary. \n\nRed Hat Product Security has rated this update as having a security impact\nof Critical. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available for each vulnerability from\nthe CVE link(s) in the References section. \n\n2. Relevant releases/architectures:\n\nRed Hat Enterprise Linux Desktop Supplementary (v. 5) - i386, x86_64\nRed Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64\nRed Hat Enterprise Linux Server Supplementary (v. 5) - i386, x86_64\nRed Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64\nRed Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64\n\n3. Description:\n\nThe flash-plugin package contains a Mozilla Firefox compatible Adobe Flash\nPlayer web browser plug-in. \n\nThis update upgrades Flash Player to version 11.2.202.635. These\nvulnerabilities, detailed in the Adobe Security Bulletin listed in the\nReferences section, could allow an attacker to create a specially crafted\nSWF file that would cause flash-plugin to crash, execute arbitrary code, or\ndisclose sensitive information when the victim loaded a page containing the\nmalicious SWF content. (CVE-2016-4271, CVE-2016-4272, CVE-2016-4274,\nCVE-2016-4275, CVE-2016-4276, CVE-2016-4277, CVE-2016-4278, CVE-2016-4279,\nCVE-2016-4280, CVE-2016-4281, CVE-2016-4282, CVE-2016-4283, CVE-2016-4284,\nCVE-2016-4285, CVE-2016-4287, CVE-2016-6921, CVE-2016-6922, CVE-2016-6923,\nCVE-2016-6924, CVE-2016-6925, CVE-2016-6926, CVE-2016-6927, CVE-2016-6929,\nCVE-2016-6930, CVE-2016-6931, CVE-2016-6932)\n\n4. Solution:\n\nFor details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\n5. Bugs fixed (https://bugzilla.redhat.com/):\n\n1375725 - flash-plugin: multiple code execution issues fixed in APSB16-29\n\n6. Package List:\n\nRed Hat Enterprise Linux Desktop Supplementary (v. 5):\n\ni386:\nflash-plugin-11.2.202.635-1.el5_11.i386.rpm\n\nx86_64:\nflash-plugin-11.2.202.635-1.el5_11.i386.rpm\n\nRed Hat Enterprise Linux Server Supplementary (v. 5):\n\ni386:\nflash-plugin-11.2.202.635-1.el5_11.i386.rpm\n\nx86_64:\nflash-plugin-11.2.202.635-1.el5_11.i386.rpm\n\nRed Hat Enterprise Linux Desktop Supplementary (v. 6):\n\ni386:\nflash-plugin-11.2.202.635-1.el6_8.i686.rpm\n\nx86_64:\nflash-plugin-11.2.202.635-1.el6_8.i686.rpm\n\nRed Hat Enterprise Linux Server Supplementary (v. 6):\n\ni386:\nflash-plugin-11.2.202.635-1.el6_8.i686.rpm\n\nx86_64:\nflash-plugin-11.2.202.635-1.el6_8.i686.rpm\n\nRed Hat Enterprise Linux Workstation Supplementary (v. 6):\n\ni386:\nflash-plugin-11.2.202.635-1.el6_8.i686.rpm\n\nx86_64:\nflash-plugin-11.2.202.635-1.el6_8.i686.rpm\n\nThese packages are GPG signed by Red Hat for security. Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/\n\n7. References:\n\nhttps://access.redhat.com/security/cve/CVE-2016-4271\nhttps://access.redhat.com/security/cve/CVE-2016-4272\nhttps://access.redhat.com/security/cve/CVE-2016-4274\nhttps://access.redhat.com/security/cve/CVE-2016-4275\nhttps://access.redhat.com/security/cve/CVE-2016-4276\nhttps://access.redhat.com/security/cve/CVE-2016-4277\nhttps://access.redhat.com/security/cve/CVE-2016-4278\nhttps://access.redhat.com/security/cve/CVE-2016-4279\nhttps://access.redhat.com/security/cve/CVE-2016-4280\nhttps://access.redhat.com/security/cve/CVE-2016-4281\nhttps://access.redhat.com/security/cve/CVE-2016-4282\nhttps://access.redhat.com/security/cve/CVE-2016-4283\nhttps://access.redhat.com/security/cve/CVE-2016-4284\nhttps://access.redhat.com/security/cve/CVE-2016-4285\nhttps://access.redhat.com/security/cve/CVE-2016-4287\nhttps://access.redhat.com/security/cve/CVE-2016-6921\nhttps://access.redhat.com/security/cve/CVE-2016-6922\nhttps://access.redhat.com/security/cve/CVE-2016-6923\nhttps://access.redhat.com/security/cve/CVE-2016-6924\nhttps://access.redhat.com/security/cve/CVE-2016-6925\nhttps://access.redhat.com/security/cve/CVE-2016-6926\nhttps://access.redhat.com/security/cve/CVE-2016-6927\nhttps://access.redhat.com/security/cve/CVE-2016-6929\nhttps://access.redhat.com/security/cve/CVE-2016-6930\nhttps://access.redhat.com/security/cve/CVE-2016-6931\nhttps://access.redhat.com/security/cve/CVE-2016-6932\nhttps://access.redhat.com/security/updates/classification/#critical\nhttps://helpx.adobe.com/security/products/flash-player/apsb16-29.html\n\n8. Contact:\n\nThe Red Hat security contact is \u003csecalert@redhat.com\u003e. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2016 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n\niD8DBQFX2Pp+XlSAg2UNWIIRAp1iAKCmfmh77bYTg10K3b0b6aJuxtLEgACfZlyh\nynwsnFlRoTlOLVQLiobHvps=\n=1fXO\n-----END PGP SIGNATURE-----\n\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://www.redhat.com/mailman/listinfo/rhsa-announce\n. \n\nBackground\n==========\n\nThe Adobe Flash Player is a renderer for the SWF file format, which is\ncommonly used to provide interactive websites. \nPlease review the CVE identifiers referenced below for details. \n\nWorkaround\n==========\n\nThere is no known workaround at this time. \n\nResolution\n==========\n\nAll Adobe Flash Player 23.x users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot -v \"\u003e=www-plugins/adobe-flash-23.0.0.205\"\n\nAll Adobe Flash Player 11.x users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot -v \"\u003e=www-plugins/adobe-flash-11.2.202.635\"\n\nReferences\n==========\n\n[ 1 ] CVE-2016-4182\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4182\n[ 2 ] CVE-2016-4271\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4271\n[ 3 ] CVE-2016-4272\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4272\n[ 4 ] CVE-2016-4273\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4273\n[ 5 ] CVE-2016-4274\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4274\n[ 6 ] CVE-2016-4275\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4275\n[ 7 ] CVE-2016-4276\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4276\n[ 8 ] CVE-2016-4277\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4277\n[ 9 ] CVE-2016-4278\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4278\n[ 10 ] CVE-2016-4279\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4279\n[ 11 ] CVE-2016-4280\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4280\n[ 12 ] CVE-2016-4281\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4281\n[ 13 ] CVE-2016-4282\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4282\n[ 14 ] CVE-2016-4283\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4283\n[ 15 ] CVE-2016-4284\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4284\n[ 16 ] CVE-2016-4285\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4285\n[ 17 ] CVE-2016-4286\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4286\n[ 18 ] CVE-2016-4287\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4287\n[ 19 ] CVE-2016-6921\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6921\n[ 20 ] CVE-2016-6922\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6922\n[ 21 ] CVE-2016-6923\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6923\n[ 22 ] CVE-2016-6924\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6924\n[ 23 ] CVE-2016-6925\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6925\n[ 24 ] CVE-2016-6926\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6926\n[ 25 ] CVE-2016-6927\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6927\n[ 26 ] CVE-2016-6929\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6929\n[ 27 ] CVE-2016-6930\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6930\n[ 28 ] CVE-2016-6931\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6931\n[ 29 ] CVE-2016-6932\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6932\n[ 30 ] CVE-2016-6981\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6981\n[ 31 ] CVE-2016-6982\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6982\n[ 32 ] CVE-2016-6983\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6983\n[ 33 ] CVE-2016-6984\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6984\n[ 34 ] CVE-2016-6985\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6985\n[ 35 ] CVE-2016-6986\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6986\n[ 36 ] CVE-2016-6987\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6987\n[ 37 ] CVE-2016-6989\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6989\n[ 38 ] CVE-2016-6990\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6990\n[ 39 ] CVE-2016-6992\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6992\n[ 40 ] CVE-2016-7855\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7855\n\nAvailability\n============\n\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n https://security.gentoo.org/glsa/201610-10\n\nConcerns?\n=========\n\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users\u0027 machines is of utmost\nimportance to us. Any security concerns should be addressed to\nsecurity@gentoo.org or alternatively, you may file a bug at\nhttps://bugs.gentoo.org. \n\nLicense\n=======\n\nCopyright 2016 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttp://creativecommons.org/licenses/by-sa/2.5\n\n\n", "sources": [ { "db": "NVD", "id": "CVE-2016-4281" }, { "db": "JVNDB", "id": "JVNDB-2016-004741" }, { "db": "BID", "id": "92930" }, { "db": "VULHUB", "id": "VHN-93100" }, { "db": "VULMON", "id": "CVE-2016-4281" }, { "db": "PACKETSTORM", "id": "138714" }, { "db": "PACKETSTORM", "id": "139424" } ], "trust": 2.25 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2016-4281", "trust": 3.1 }, { "db": "BID", "id": "92930", "trust": 2.1 }, { "db": "SECTRACK", "id": "1036791", "trust": 1.8 }, { "db": "JVNDB", "id": "JVNDB-2016-004741", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201609-295", "trust": 0.7 }, { "db": "ZDI", "id": "ZDI-16-516", "trust": 0.3 }, { "db": "VULHUB", "id": "VHN-93100", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2016-4281", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "138714", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "139424", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-93100" }, { "db": "VULMON", "id": "CVE-2016-4281" }, { "db": "BID", "id": "92930" }, { "db": "JVNDB", "id": "JVNDB-2016-004741" }, { "db": "PACKETSTORM", "id": "138714" }, { "db": "PACKETSTORM", "id": "139424" }, { "db": "NVD", "id": "CVE-2016-4281" }, { "db": "CNNVD", "id": "CNNVD-201609-295" } ] }, "id": "VAR-201609-0460", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-93100" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:05:27.858000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "APSB16-29", "trust": 0.8, "url": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html" }, { "title": "APSB16-29", "trust": 0.8, "url": "https://helpx.adobe.com/jp/security/products/flash-player/apsb16-29.html" }, { "title": "Google Chrome \u3092\u66f4\u65b0\u3059\u308b", "trust": 0.8, "url": "https://support.google.com/chrome/answer/95414?hl=ja" }, { "title": "Google Chrome", "trust": 0.8, "url": "https://www.google.com/intl/ja/chrome/browser/features.html" }, { "title": "Chrome Releases", "trust": 0.8, "url": "http://googlechromereleases.blogspot.jp/" }, { "title": "MS16-117", "trust": 0.8, "url": "https://technet.microsoft.com/en-us/library/security/ms16-117.aspx" }, { "title": "MS16-117", "trust": 0.8, "url": "https://technet.microsoft.com/ja-jp/library/security/ms16-117.aspx" }, { "title": "\u30a2\u30c9\u30d3 \u30b7\u30b9\u30c6\u30e0\u30ba\u793e Adobe Flash Player \u306e\u8106\u5f31\u6027\u306b\u95a2\u3059\u308b\u304a\u77e5\u3089\u305b", "trust": 0.8, "url": "http://www.fmworld.net/biz/common/adobe/20160915f.html" }, { "title": "Adobe Flash Player Repair measures for memory corruption vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=64110" }, { "title": "Red Hat: CVE-2016-4281", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database\u0026qid=cve-2016-4281" }, { "title": "CVE-Study", "trust": 0.1, "url": "https://github.com/thdusdl1219/cve-study " }, { "title": "BleepingComputer", "trust": 0.1, "url": "https://www.bleepingcomputer.com/news/security/adobe-releases-updates-that-resolve-35-security-vulnerabilities/" } ], "sources": [ { "db": "VULMON", "id": "CVE-2016-4281" }, { "db": "JVNDB", "id": "JVNDB-2016-004741" }, { "db": "CNNVD", "id": "CNNVD-201609-295" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.0 }, { "problemtype": "CWE-119", "trust": 0.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-93100" }, { "db": "JVNDB", "id": "JVNDB-2016-004741" }, { "db": "NVD", "id": "CVE-2016-4281" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.2, "url": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html" }, { "trust": 1.9, "url": "https://security.gentoo.org/glsa/201610-10" }, { "trust": 1.9, "url": "http://rhn.redhat.com/errata/rhsa-2016-1865.html" }, { "trust": 1.8, "url": "http://www.securityfocus.com/bid/92930" }, { "trust": 1.8, "url": "http://www.securitytracker.com/id/1036791" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-4281" }, { "trust": 0.8, "url": "https://www.ipa.go.jp/security/ciadr/vul/20160914-adobeflashplayer.html" }, { "trust": 0.8, "url": "http://www.jpcert.or.jp/at/2016/at160034.html" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-4281" }, { "trust": 0.3, "url": "https://www.adobe.com/software/flash/about/" }, { "trust": 0.3, "url": "http://www.zerodayinitiative.com/advisories/zdi-16-516/" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-4278" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-4287" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-4271" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-4280" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-4281" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-4277" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-4285" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-6926" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-6921" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-6927" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-4276" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-6930" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-6923" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-6929" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-4282" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-4283" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-6922" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-6924" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-6931" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-4274" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-4279" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-4284" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-6925" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-4272" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-4275" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/787.html" }, { "trust": 0.1, "url": "http://tools.cisco.com/security/center/viewalert.x?alertid=48997" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-4284" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-6924" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-4278" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-4279" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-4271" }, { "trust": 0.1, "url": "https://access.redhat.com/security/updates/classification/#critical" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-4272" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-4275" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-6931" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-4277" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-4276" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-6922" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-6932" }, { "trust": 0.1, "url": "https://access.redhat.com/articles/11258" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-4287" }, { "trust": 0.1, "url": "https://access.redhat.com/security/team/contact/" }, { "trust": 0.1, "url": "https://www.redhat.com/mailman/listinfo/rhsa-announce" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-6932" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-4283" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-4281" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-6921" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-6925" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-6930" }, { "trust": 0.1, "url": "https://bugzilla.redhat.com/):" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-4280" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-4274" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-6927" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-6926" }, { "trust": 0.1, "url": "https://access.redhat.com/security/team/key/" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-6923" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-4285" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-6929" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-4282" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-4279" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-4284" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-4182" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-6921" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-4282" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-4276" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-6987" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-6931" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-6985" }, { "trust": 0.1, "url": "https://security.gentoo.org/" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-6930" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-6925" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-6989" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-4286" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-4286" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-6984" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-4281" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-6923" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-6992" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-7855" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-6986" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-4275" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-6982" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-6981" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-4274" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-6924" }, { "trust": 0.1, "url": "http://creativecommons.org/licenses/by-sa/2.5" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-4278" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-6932" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-6990" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-4271" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-6926" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-4280" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-4283" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-6983" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-4285" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-4273" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-4273" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-4287" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-4182" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-6929" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-6922" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-6927" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-4272" }, { "trust": 0.1, "url": "https://bugs.gentoo.org." }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-4277" } ], "sources": [ { "db": "VULHUB", "id": "VHN-93100" }, { "db": "VULMON", "id": "CVE-2016-4281" }, { "db": "BID", "id": "92930" }, { "db": "JVNDB", "id": "JVNDB-2016-004741" }, { "db": "PACKETSTORM", "id": "138714" }, { "db": "PACKETSTORM", "id": "139424" }, { "db": "NVD", "id": "CVE-2016-4281" }, { "db": "CNNVD", "id": "CNNVD-201609-295" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-93100" }, { "db": "VULMON", "id": "CVE-2016-4281" }, { "db": "BID", "id": "92930" }, { "db": "JVNDB", "id": "JVNDB-2016-004741" }, { "db": "PACKETSTORM", "id": "138714" }, { "db": "PACKETSTORM", "id": "139424" }, { "db": "NVD", "id": "CVE-2016-4281" }, { "db": "CNNVD", "id": "CNNVD-201609-295" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-09-14T00:00:00", "db": "VULHUB", "id": "VHN-93100" }, { "date": "2016-09-14T00:00:00", "db": "VULMON", "id": "CVE-2016-4281" }, { "date": "2016-09-13T00:00:00", "db": "BID", "id": "92930" }, { "date": "2016-09-16T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-004741" }, { "date": "2016-09-14T16:51:57", "db": "PACKETSTORM", "id": "138714" }, { "date": "2016-10-30T22:14:44", "db": "PACKETSTORM", "id": "139424" }, { "date": "2016-09-14T18:59:11.217000", "db": "NVD", "id": "CVE-2016-4281" }, { "date": "2016-09-18T00:00:00", "db": "CNNVD", "id": "CNNVD-201609-295" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-01-05T00:00:00", "db": "VULHUB", "id": "VHN-93100" }, { "date": "2022-11-10T00:00:00", "db": "VULMON", "id": "CVE-2016-4281" }, { "date": "2016-09-13T00:00:00", "db": "BID", "id": "92930" }, { "date": "2016-09-16T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-004741" }, { "date": "2022-11-10T20:26:50.797000", "db": "NVD", "id": "CVE-2016-4281" }, { "date": "2022-11-14T00:00:00", "db": "CNNVD", "id": "CNNVD-201609-295" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "PACKETSTORM", "id": "139424" }, { "db": "CNNVD", "id": "CNNVD-201609-295" } ], "trust": 0.7 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Adobe Flash Player Vulnerable to arbitrary code execution", "sources": [ { "db": "JVNDB", "id": "JVNDB-2016-004741" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201609-295" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.