ALT-BU-2016-2576-1
Branch sisyphus update bulletin.
Closed bugs
VA-API support patch
Closed bugs
FR: нерабочий parole в зависимостях у xfce4-full
Closed vulnerabilities
BDU:2015-00125
Уязвимость программного обеспечения Cisco ACE, позволяющая злоумышленнику перехватить сессию
BDU:2015-00126
Уязвимость программного обеспечения Cisco ASA, позволяющая злоумышленнику перехватить сессию
BDU:2015-00127
Уязвимость программного обеспечения Cisco IPS, позволяющая злоумышленнику перехватить сессию
BDU:2015-00128
Уязвимость программного обеспечения Cisco Unified Communications Manager, позволяющая злоумышленнику перехватить сессию
BDU:2015-04312
Уязвимости операционной системы SUSE Linux Enterprise, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-04313
Уязвимости операционной системы SUSE Linux Enterprise, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-05844
Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-05845
Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-05846
Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-05847
Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-05848
Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-05849
Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-05850
Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-05851
Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-05852
Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-05853
Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-05854
Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-05855
Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-07477
Уязвимость операционной системы Red Hat Enterprise Linux, позволяющая удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-07482
Уязвимость операционной системы Red Hat Enterprise Linux, позволяющая удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-07483
Уязвимость операционной системы Red Hat Enterprise Linux, позволяющая удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-07485
Уязвимость операционной системы Red Hat Enterprise Linux, позволяющая удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-09698
Уязвимости операционной системы Gentoo Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2016-00297
Уязвимость операционной системы Fedora, позволяющая нарушителю повысить свои привилегии
BDU:2016-01653
Уязвимость библиотеки OpenSSL, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-04-11
CVE-2013-4450
The HTTP server in Node.js 0.10.x before 0.10.21 and 0.8.x before 0.8.26 allows remote attackers to cause a denial of service (memory and CPU consumption) by sending a large number of pipelined requests without reading the response.
- http://blog.nodejs.org/2013/10/18/node-v0-10-21-stable/
- http://blog.nodejs.org/2013/10/18/node-v0-8-26-maintenance/
- http://lists.opensuse.org/opensuse-updates/2013-12/msg00051.html
- http://rhn.redhat.com/errata/RHSA-2013-1842.html
- http://www.openwall.com/lists/oss-security/2013/10/20/1
- http://www.securityfocus.com/bid/63229
- https://github.com/joyent/node/issues/6214
- https://github.com/rapid7/metasploit-framework/pull/2548
- https://groups.google.com/forum/#%21topic/nodejs/NEbweYB0ei0
- https://kb.juniper.net/JSA10783
- http://blog.nodejs.org/2013/10/18/node-v0-10-21-stable/
- http://blog.nodejs.org/2013/10/18/node-v0-8-26-maintenance/
- http://lists.opensuse.org/opensuse-updates/2013-12/msg00051.html
- http://rhn.redhat.com/errata/RHSA-2013-1842.html
- http://www.openwall.com/lists/oss-security/2013/10/20/1
- http://www.securityfocus.com/bid/63229
- https://github.com/joyent/node/issues/6214
- https://github.com/rapid7/metasploit-framework/pull/2548
- https://groups.google.com/forum/#%21topic/nodejs/NEbweYB0ei0
- https://kb.juniper.net/JSA10783
Modified: 2025-04-12
CVE-2013-6668
Multiple unspecified vulnerabilities in Google V8 before 3.24.35.10, as used in Google Chrome before 33.0.1750.146, allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
- http://advisories.mageia.org/MGASA-2014-0516.html
- http://googlechromereleases.blogspot.com/2014/03/stable-channel-update.html
- http://secunia.com/advisories/61184
- http://www-01.ibm.com/support/docview.wss?uid=swg21683389
- http://www.debian.org/security/2014/dsa-2883
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:142
- http://www.securityfocus.com/bid/65930
- https://code.google.com/p/chromium/issues/detail?id=343964
- https://code.google.com/p/chromium/issues/detail?id=344186
- https://code.google.com/p/chromium/issues/detail?id=347909
- https://code.google.com/p/v8/source/detail?r=19475
- https://code.google.com/p/v8/source/detail?r=19553
- https://code.google.com/p/v8/source/detail?r=19599
- http://advisories.mageia.org/MGASA-2014-0516.html
- http://googlechromereleases.blogspot.com/2014/03/stable-channel-update.html
- http://secunia.com/advisories/61184
- http://www-01.ibm.com/support/docview.wss?uid=swg21683389
- http://www.debian.org/security/2014/dsa-2883
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:142
- http://www.securityfocus.com/bid/65930
- https://code.google.com/p/chromium/issues/detail?id=343964
- https://code.google.com/p/chromium/issues/detail?id=344186
- https://code.google.com/p/chromium/issues/detail?id=347909
- https://code.google.com/p/v8/source/detail?r=19475
- https://code.google.com/p/v8/source/detail?r=19553
- https://code.google.com/p/v8/source/detail?r=19599
Modified: 2025-04-20
CVE-2013-7452
The validator module before 1.1.0 for Node.js allows remote attackers to bypass the cross-site scripting (XSS) filter via a crafted javascript URI.
Modified: 2025-04-20
CVE-2013-7453
The validator module before 1.1.0 for Node.js allows remote attackers to bypass the cross-site scripting (XSS) filter via vectors related to UI redressing.
Modified: 2025-04-20
CVE-2013-7454
The validator module before 1.1.0 for Node.js allows remote attackers to bypass the cross-site scripting (XSS) filter via nested forbidden strings.
Modified: 2025-04-12
CVE-2014-0224
OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does not properly restrict processing of ChangeCipherSpec messages, which allows man-in-the-middle attackers to trigger use of a zero-length master key in certain OpenSSL-to-OpenSSL communications, and consequently hijack sessions or obtain sensitive information, via a crafted TLS handshake, aka the "CCS Injection" vulnerability.
- http://aix.software.ibm.com/aix/efixes/security/openssl_advisory9.asc
- http://ccsinjection.lepidum.co.jp
- http://dev.mysql.com/doc/relnotes/workbench/en/wb-news-6-1-7.html
- http://esupport.trendmicro.com/solution/en-US/1103813.aspx
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10629
- http://kb.juniper.net/InfoCenter/index?page=content&id=KB29195
- http://kb.juniper.net/InfoCenter/index?page=content&id=KB29217
- http://linux.oracle.com/errata/ELSA-2014-1053.html
- http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136470.html
- http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136473.html
- http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html
- http://lists.opensuse.org/opensuse-updates/2015-02/msg00030.html
- http://marc.info/?l=bugtraq&m=140266410314613&w=2
- http://marc.info/?l=bugtraq&m=140266410314613&w=2
- http://marc.info/?l=bugtraq&m=140317760000786&w=2
- http://marc.info/?l=bugtraq&m=140369637402535&w=2
- http://marc.info/?l=bugtraq&m=140386311427810&w=2
- http://marc.info/?l=bugtraq&m=140389274407904&w=2
- http://marc.info/?l=bugtraq&m=140389355508263&w=2
- http://marc.info/?l=bugtraq&m=140431828824371&w=2
- http://marc.info/?l=bugtraq&m=140448122410568&w=2
- http://marc.info/?l=bugtraq&m=140482916501310&w=2
- http://marc.info/?l=bugtraq&m=140491231331543&w=2
- http://marc.info/?l=bugtraq&m=140499864129699&w=2
- http://marc.info/?l=bugtraq&m=140544599631400&w=2
- http://marc.info/?l=bugtraq&m=140604261522465&w=2
- http://marc.info/?l=bugtraq&m=140621259019789&w=2
- http://marc.info/?l=bugtraq&m=140672208601650&w=2
- http://marc.info/?l=bugtraq&m=140752315422991&w=2
- http://marc.info/?l=bugtraq&m=140784085708882&w=2
- http://marc.info/?l=bugtraq&m=140794476212181&w=2
- http://marc.info/?l=bugtraq&m=140852757108392&w=2
- http://marc.info/?l=bugtraq&m=140852826008699&w=2
- http://marc.info/?l=bugtraq&m=140870499402361&w=2
- http://marc.info/?l=bugtraq&m=140904544427729&w=2
- http://marc.info/?l=bugtraq&m=140983229106599&w=2
- http://marc.info/?l=bugtraq&m=141025641601169&w=2
- http://marc.info/?l=bugtraq&m=141147110427269&w=2
- http://marc.info/?l=bugtraq&m=141164638606214&w=2
- http://marc.info/?l=bugtraq&m=141383410222440&w=2
- http://marc.info/?l=bugtraq&m=141383465822787&w=2
- http://marc.info/?l=bugtraq&m=141658880509699&w=2
- http://marc.info/?l=bugtraq&m=142350350616251&w=2
- http://marc.info/?l=bugtraq&m=142350350616251&w=2
- http://marc.info/?l=bugtraq&m=142546741516006&w=2
- http://marc.info/?l=bugtraq&m=142805027510172&w=2
- http://puppetlabs.com/security/cve/cve-2014-0224
- http://rhn.redhat.com/errata/RHSA-2014-0624.html
- http://rhn.redhat.com/errata/RHSA-2014-0626.html
- http://rhn.redhat.com/errata/RHSA-2014-0627.html
- http://rhn.redhat.com/errata/RHSA-2014-0630.html
- http://rhn.redhat.com/errata/RHSA-2014-0631.html
- http://rhn.redhat.com/errata/RHSA-2014-0632.html
- http://rhn.redhat.com/errata/RHSA-2014-0633.html
- http://rhn.redhat.com/errata/RHSA-2014-0680.html
- http://seclists.org/fulldisclosure/2014/Dec/23
- http://seclists.org/fulldisclosure/2014/Jun/38
- http://secunia.com/advisories/58128
- http://secunia.com/advisories/58337
- http://secunia.com/advisories/58385
- http://secunia.com/advisories/58433
- http://secunia.com/advisories/58492
- http://secunia.com/advisories/58579
- http://secunia.com/advisories/58615
- http://secunia.com/advisories/58639
- http://secunia.com/advisories/58660
- http://secunia.com/advisories/58667
- http://secunia.com/advisories/58713
- http://secunia.com/advisories/58714
- http://secunia.com/advisories/58716
- http://secunia.com/advisories/58719
- http://secunia.com/advisories/58742
- http://secunia.com/advisories/58743
- http://secunia.com/advisories/58745
- http://secunia.com/advisories/58759
- http://secunia.com/advisories/58930
- http://secunia.com/advisories/58939
- http://secunia.com/advisories/58945
- http://secunia.com/advisories/58977
- http://secunia.com/advisories/59004
- http://secunia.com/advisories/59012
- http://secunia.com/advisories/59040
- http://secunia.com/advisories/59043
- http://secunia.com/advisories/59055
- http://secunia.com/advisories/59063
- http://secunia.com/advisories/59093
- http://secunia.com/advisories/59101
- http://secunia.com/advisories/59120
- http://secunia.com/advisories/59126
- http://secunia.com/advisories/59132
- http://secunia.com/advisories/59135
- http://secunia.com/advisories/59142
- http://secunia.com/advisories/59162
- http://secunia.com/advisories/59163
- http://secunia.com/advisories/59167
- http://secunia.com/advisories/59175
- http://secunia.com/advisories/59186
- http://secunia.com/advisories/59188
- http://secunia.com/advisories/59189
- http://secunia.com/advisories/59190
- http://secunia.com/advisories/59191
- http://secunia.com/advisories/59192
- http://secunia.com/advisories/59202
- http://secunia.com/advisories/59211
- http://secunia.com/advisories/59214
- http://secunia.com/advisories/59215
- http://secunia.com/advisories/59223
- http://secunia.com/advisories/59231
- http://secunia.com/advisories/59264
- http://secunia.com/advisories/59282
- http://secunia.com/advisories/59284
- http://secunia.com/advisories/59287
- http://secunia.com/advisories/59300
- http://secunia.com/advisories/59301
- http://secunia.com/advisories/59305
- http://secunia.com/advisories/59306
- http://secunia.com/advisories/59310
- http://secunia.com/advisories/59325
- http://secunia.com/advisories/59338
- http://secunia.com/advisories/59342
- http://secunia.com/advisories/59347
- http://secunia.com/advisories/59354
- http://secunia.com/advisories/59362
- http://secunia.com/advisories/59364
- http://secunia.com/advisories/59365
- http://secunia.com/advisories/59368
- http://secunia.com/advisories/59370
- http://secunia.com/advisories/59374
- http://secunia.com/advisories/59375
- http://secunia.com/advisories/59380
- http://secunia.com/advisories/59383
- http://secunia.com/advisories/59389
- http://secunia.com/advisories/59413
- http://secunia.com/advisories/59429
- http://secunia.com/advisories/59435
- http://secunia.com/advisories/59437
- http://secunia.com/advisories/59438
- http://secunia.com/advisories/59440
- http://secunia.com/advisories/59441
- http://secunia.com/advisories/59442
- http://secunia.com/advisories/59444
- http://secunia.com/advisories/59445
- http://secunia.com/advisories/59446
- http://secunia.com/advisories/59447
- http://secunia.com/advisories/59448
- http://secunia.com/advisories/59449
- http://secunia.com/advisories/59450
- http://secunia.com/advisories/59451
- http://secunia.com/advisories/59454
- http://secunia.com/advisories/59459
- http://secunia.com/advisories/59460
- http://secunia.com/advisories/59483
- http://secunia.com/advisories/59490
- http://secunia.com/advisories/59491
- http://secunia.com/advisories/59495
- http://secunia.com/advisories/59502
- http://secunia.com/advisories/59506
- http://secunia.com/advisories/59514
- http://secunia.com/advisories/59518
- http://secunia.com/advisories/59525
- http://secunia.com/advisories/59528
- http://secunia.com/advisories/59529
- http://secunia.com/advisories/59530
- http://secunia.com/advisories/59589
- http://secunia.com/advisories/59602
- http://secunia.com/advisories/59655
- http://secunia.com/advisories/59659
- http://secunia.com/advisories/59661
- http://secunia.com/advisories/59666
- http://secunia.com/advisories/59669
- http://secunia.com/advisories/59677
- http://secunia.com/advisories/59721
- http://secunia.com/advisories/59784
- http://secunia.com/advisories/59824
- http://secunia.com/advisories/59827
- http://secunia.com/advisories/59878
- http://secunia.com/advisories/59885
- http://secunia.com/advisories/59894
- http://secunia.com/advisories/59916
- http://secunia.com/advisories/59990
- http://secunia.com/advisories/60049
- http://secunia.com/advisories/60066
- http://secunia.com/advisories/60176
- http://secunia.com/advisories/60522
- http://secunia.com/advisories/60567
- http://secunia.com/advisories/60571
- http://secunia.com/advisories/60577
- http://secunia.com/advisories/60819
- http://secunia.com/advisories/61254
- http://secunia.com/advisories/61815
- http://security.gentoo.org/glsa/glsa-201407-05.xml
- http://support.apple.com/kb/HT6443
- http://support.citrix.com/article/CTX140876
- http://support.f5.com/kb/en-us/solutions/public/15000/300/sol15325.html
- http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140605-openssl
- http://www-01.ibm.com/support/docview.wss?uid=isg400001841
- http://www-01.ibm.com/support/docview.wss?uid=isg400001843
- http://www-01.ibm.com/support/docview.wss?uid=nas8N1020163
- http://www-01.ibm.com/support/docview.wss?uid=nas8N1020172
- http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004690
- http://www-01.ibm.com/support/docview.wss?uid=swg1IV61506
- http://www-01.ibm.com/support/docview.wss?uid=swg21673137
- http://www-01.ibm.com/support/docview.wss?uid=swg21675626
- http://www-01.ibm.com/support/docview.wss?uid=swg21675821
- http://www-01.ibm.com/support/docview.wss?uid=swg21676035
- http://www-01.ibm.com/support/docview.wss?uid=swg21676062
- http://www-01.ibm.com/support/docview.wss?uid=swg21676071
- http://www-01.ibm.com/support/docview.wss?uid=swg21676333
- http://www-01.ibm.com/support/docview.wss?uid=swg21676334
- http://www-01.ibm.com/support/docview.wss?uid=swg21676419
- http://www-01.ibm.com/support/docview.wss?uid=swg21676478
- http://www-01.ibm.com/support/docview.wss?uid=swg21676496
- http://www-01.ibm.com/support/docview.wss?uid=swg21676501
- http://www-01.ibm.com/support/docview.wss?uid=swg21676529
- http://www-01.ibm.com/support/docview.wss?uid=swg21676536
- http://www-01.ibm.com/support/docview.wss?uid=swg21676615
- http://www-01.ibm.com/support/docview.wss?uid=swg21676644
- http://www-01.ibm.com/support/docview.wss?uid=swg21676655
- http://www-01.ibm.com/support/docview.wss?uid=swg21676786
- http://www-01.ibm.com/support/docview.wss?uid=swg21676833
- http://www-01.ibm.com/support/docview.wss?uid=swg21676845
- http://www-01.ibm.com/support/docview.wss?uid=swg21676879
- http://www-01.ibm.com/support/docview.wss?uid=swg21676889
- http://www-01.ibm.com/support/docview.wss?uid=swg21677080
- http://www-01.ibm.com/support/docview.wss?uid=swg21677131
- http://www-01.ibm.com/support/docview.wss?uid=swg21677390
- http://www-01.ibm.com/support/docview.wss?uid=swg21677527
- http://www-01.ibm.com/support/docview.wss?uid=swg21677567
- http://www-01.ibm.com/support/docview.wss?uid=swg21677695
- http://www-01.ibm.com/support/docview.wss?uid=swg21677828
- http://www-01.ibm.com/support/docview.wss?uid=swg21677836
- http://www-01.ibm.com/support/docview.wss?uid=swg21678167
- http://www-01.ibm.com/support/docview.wss?uid=swg21678233
- http://www-01.ibm.com/support/docview.wss?uid=swg21678289
- http://www-01.ibm.com/support/docview.wss?uid=swg21683332
- http://www-01.ibm.com/support/docview.wss?uid=swg24037727
- http://www-01.ibm.com/support/docview.wss?uid=swg24037729
- http://www-01.ibm.com/support/docview.wss?uid=swg24037730
- http://www-01.ibm.com/support/docview.wss?uid=swg24037731
- http://www-01.ibm.com/support/docview.wss?uid=swg24037732
- http://www-01.ibm.com/support/docview.wss?uid=swg24037761
- http://www-01.ibm.com/support/docview.wss?uid=swg24037870
- http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095740
- http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095754
- http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095755
- http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095756
- http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095757
- http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5095737
- http://www.blackberry.com/btsc/KB36051
- http://www.f-secure.com/en/web/labs_global/fsc-2014-6
- http://www.fortiguard.com/advisory/FG-IR-14-018/
- http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-345106.htm
- http://www.ibm.com/support/docview.wss?uid=isg3T1020948
- http://www.ibm.com/support/docview.wss?uid=ssg1S1004678
- http://www.ibm.com/support/docview.wss?uid=swg1IT02314
- http://www.ibm.com/support/docview.wss?uid=swg21676356
- http://www.ibm.com/support/docview.wss?uid=swg21676793
- http://www.ibm.com/support/docview.wss?uid=swg21676877
- http://www.ibm.com/support/docview.wss?uid=swg24037783
- http://www.innominate.com/data/downloads/manuals/mdm_1.5.2.1_Release_Notes.pdf
- http://www.kb.cert.org/vuls/id/978508
- http://www.kerio.com/support/kerio-control/release-history
- http://www.mandriva.com/security/advisories?name=MDVSA-2014:105
- http://www.mandriva.com/security/advisories?name=MDVSA-2014:106
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:062
- http://www.novell.com/support/kb/doc.php?id=7015264
- http://www.novell.com/support/kb/doc.php?id=7015300
- http://www.openssl.org/news/secadv_20140605.txt
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
- http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html
- http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html
- http://www.securityfocus.com/archive/1/534161/100/0/threaded
- http://www.securitytracker.com/id/1031032
- http://www.securitytracker.com/id/1031594
- http://www.splunk.com/view/SP-CAAAM2D
- http://www.tenable.com/blog/nessus-527-and-pvs-403-are-available-for-download
- http://www.vmware.com/security/advisories/VMSA-2014-0006.html
- http://www.vmware.com/security/advisories/VMSA-2014-0012.html
- http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0
- http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=6060&myns=phmc&mync=E
- http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=6061&myns=phmc&mync=E
- https://access.redhat.com/site/blogs/766093/posts/908133
- https://blogs.oracle.com/sunsecurity/entry/cve_2014_0224_cryptographic_issues
- https://blogs.oracle.com/sunsecurity/entry/cve_2014_0224_cryptographic_issues1
- https://bugzilla.redhat.com/show_bug.cgi?id=1103586
- https://cert-portal.siemens.com/productcert/pdf/ssa-234763.pdf
- https://discussions.nessus.org/thread/7517
- https://filezilla-project.org/versions.php?type=server
- https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=bc8923b1ec9c467755cd86f7848c50ee8812e441
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05301946
- https://kb.bluecoat.com/index?page=content&id=SA80
- https://kc.mcafee.com/corporate/index?page=content&id=SB10075
- https://www.arista.com/en/support/advisories-notices/security-advisories/941-security-advisory-0005
- https://www.ibm.com/support/docview.wss?uid=ssg1S1004670
- https://www.ibm.com/support/docview.wss?uid=ssg1S1004671
- https://www.imperialviolet.org/2014/06/05/earlyccs.html
- https://www.intersectalliance.com/wp-content/uploads/release_notes/ReleaseNotes_for_SNARE_for_MSSQL.pdf
- https://www.intersectalliance.com/wp-content/uploads/release_notes/ReleaseNotes_for_Snare_for_Windows.pdf
- https://www.novell.com/support/kb/doc.php?id=7015271
- http://aix.software.ibm.com/aix/efixes/security/openssl_advisory9.asc
- http://ccsinjection.lepidum.co.jp
- http://dev.mysql.com/doc/relnotes/workbench/en/wb-news-6-1-7.html
- http://esupport.trendmicro.com/solution/en-US/1103813.aspx
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10629
- http://kb.juniper.net/InfoCenter/index?page=content&id=KB29195
- http://kb.juniper.net/InfoCenter/index?page=content&id=KB29217
- http://linux.oracle.com/errata/ELSA-2014-1053.html
- http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136470.html
- http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136473.html
- http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html
- http://lists.opensuse.org/opensuse-updates/2015-02/msg00030.html
- http://marc.info/?l=bugtraq&m=140266410314613&w=2
- http://marc.info/?l=bugtraq&m=140266410314613&w=2
- http://marc.info/?l=bugtraq&m=140317760000786&w=2
- http://marc.info/?l=bugtraq&m=140369637402535&w=2
- http://marc.info/?l=bugtraq&m=140386311427810&w=2
- http://marc.info/?l=bugtraq&m=140389274407904&w=2
- http://marc.info/?l=bugtraq&m=140389355508263&w=2
- http://marc.info/?l=bugtraq&m=140431828824371&w=2
- http://marc.info/?l=bugtraq&m=140448122410568&w=2
- http://marc.info/?l=bugtraq&m=140482916501310&w=2
- http://marc.info/?l=bugtraq&m=140491231331543&w=2
- http://marc.info/?l=bugtraq&m=140499864129699&w=2
- http://marc.info/?l=bugtraq&m=140544599631400&w=2
- http://marc.info/?l=bugtraq&m=140604261522465&w=2
- http://marc.info/?l=bugtraq&m=140621259019789&w=2
- http://marc.info/?l=bugtraq&m=140672208601650&w=2
- http://marc.info/?l=bugtraq&m=140752315422991&w=2
- http://marc.info/?l=bugtraq&m=140784085708882&w=2
- http://marc.info/?l=bugtraq&m=140794476212181&w=2
- http://marc.info/?l=bugtraq&m=140852757108392&w=2
- http://marc.info/?l=bugtraq&m=140852826008699&w=2
- http://marc.info/?l=bugtraq&m=140870499402361&w=2
- http://marc.info/?l=bugtraq&m=140904544427729&w=2
- http://marc.info/?l=bugtraq&m=140983229106599&w=2
- http://marc.info/?l=bugtraq&m=141025641601169&w=2
- http://marc.info/?l=bugtraq&m=141147110427269&w=2
- http://marc.info/?l=bugtraq&m=141164638606214&w=2
- http://marc.info/?l=bugtraq&m=141383410222440&w=2
- http://marc.info/?l=bugtraq&m=141383465822787&w=2
- http://marc.info/?l=bugtraq&m=141658880509699&w=2
- http://marc.info/?l=bugtraq&m=142350350616251&w=2
- http://marc.info/?l=bugtraq&m=142350350616251&w=2
- http://marc.info/?l=bugtraq&m=142546741516006&w=2
- http://marc.info/?l=bugtraq&m=142805027510172&w=2
- http://puppetlabs.com/security/cve/cve-2014-0224
- http://rhn.redhat.com/errata/RHSA-2014-0624.html
- http://rhn.redhat.com/errata/RHSA-2014-0626.html
- http://rhn.redhat.com/errata/RHSA-2014-0627.html
- http://rhn.redhat.com/errata/RHSA-2014-0630.html
- http://rhn.redhat.com/errata/RHSA-2014-0631.html
- http://rhn.redhat.com/errata/RHSA-2014-0632.html
- http://rhn.redhat.com/errata/RHSA-2014-0633.html
- http://rhn.redhat.com/errata/RHSA-2014-0680.html
- http://seclists.org/fulldisclosure/2014/Dec/23
- http://seclists.org/fulldisclosure/2014/Jun/38
- http://secunia.com/advisories/58128
- http://secunia.com/advisories/58337
- http://secunia.com/advisories/58385
- http://secunia.com/advisories/58433
- http://secunia.com/advisories/58492
- http://secunia.com/advisories/58579
- http://secunia.com/advisories/58615
- http://secunia.com/advisories/58639
- http://secunia.com/advisories/58660
- http://secunia.com/advisories/58667
- http://secunia.com/advisories/58713
- http://secunia.com/advisories/58714
- http://secunia.com/advisories/58716
- http://secunia.com/advisories/58719
- http://secunia.com/advisories/58742
- http://secunia.com/advisories/58743
- http://secunia.com/advisories/58745
- http://secunia.com/advisories/58759
- http://secunia.com/advisories/58930
- http://secunia.com/advisories/58939
- http://secunia.com/advisories/58945
- http://secunia.com/advisories/58977
- http://secunia.com/advisories/59004
- http://secunia.com/advisories/59012
- http://secunia.com/advisories/59040
- http://secunia.com/advisories/59043
- http://secunia.com/advisories/59055
- http://secunia.com/advisories/59063
- http://secunia.com/advisories/59093
- http://secunia.com/advisories/59101
- http://secunia.com/advisories/59120
- http://secunia.com/advisories/59126
- http://secunia.com/advisories/59132
- http://secunia.com/advisories/59135
- http://secunia.com/advisories/59142
- http://secunia.com/advisories/59162
- http://secunia.com/advisories/59163
- http://secunia.com/advisories/59167
- http://secunia.com/advisories/59175
- http://secunia.com/advisories/59186
- http://secunia.com/advisories/59188
- http://secunia.com/advisories/59189
- http://secunia.com/advisories/59190
- http://secunia.com/advisories/59191
- http://secunia.com/advisories/59192
- http://secunia.com/advisories/59202
- http://secunia.com/advisories/59211
- http://secunia.com/advisories/59214
- http://secunia.com/advisories/59215
- http://secunia.com/advisories/59223
- http://secunia.com/advisories/59231
- http://secunia.com/advisories/59264
- http://secunia.com/advisories/59282
- http://secunia.com/advisories/59284
- http://secunia.com/advisories/59287
- http://secunia.com/advisories/59300
- http://secunia.com/advisories/59301
- http://secunia.com/advisories/59305
- http://secunia.com/advisories/59306
- http://secunia.com/advisories/59310
- http://secunia.com/advisories/59325
- http://secunia.com/advisories/59338
- http://secunia.com/advisories/59342
- http://secunia.com/advisories/59347
- http://secunia.com/advisories/59354
- http://secunia.com/advisories/59362
- http://secunia.com/advisories/59364
- http://secunia.com/advisories/59365
- http://secunia.com/advisories/59368
- http://secunia.com/advisories/59370
- http://secunia.com/advisories/59374
- http://secunia.com/advisories/59375
- http://secunia.com/advisories/59380
- http://secunia.com/advisories/59383
- http://secunia.com/advisories/59389
- http://secunia.com/advisories/59413
- http://secunia.com/advisories/59429
- http://secunia.com/advisories/59435
- http://secunia.com/advisories/59437
- http://secunia.com/advisories/59438
- http://secunia.com/advisories/59440
- http://secunia.com/advisories/59441
- http://secunia.com/advisories/59442
- http://secunia.com/advisories/59444
- http://secunia.com/advisories/59445
- http://secunia.com/advisories/59446
- http://secunia.com/advisories/59447
- http://secunia.com/advisories/59448
- http://secunia.com/advisories/59449
- http://secunia.com/advisories/59450
- http://secunia.com/advisories/59451
- http://secunia.com/advisories/59454
- http://secunia.com/advisories/59459
- http://secunia.com/advisories/59460
- http://secunia.com/advisories/59483
- http://secunia.com/advisories/59490
- http://secunia.com/advisories/59491
- http://secunia.com/advisories/59495
- http://secunia.com/advisories/59502
- http://secunia.com/advisories/59506
- http://secunia.com/advisories/59514
- http://secunia.com/advisories/59518
- http://secunia.com/advisories/59525
- http://secunia.com/advisories/59528
- http://secunia.com/advisories/59529
- http://secunia.com/advisories/59530
- http://secunia.com/advisories/59589
- http://secunia.com/advisories/59602
- http://secunia.com/advisories/59655
- http://secunia.com/advisories/59659
- http://secunia.com/advisories/59661
- http://secunia.com/advisories/59666
- http://secunia.com/advisories/59669
- http://secunia.com/advisories/59677
- http://secunia.com/advisories/59721
- http://secunia.com/advisories/59784
- http://secunia.com/advisories/59824
- http://secunia.com/advisories/59827
- http://secunia.com/advisories/59878
- http://secunia.com/advisories/59885
- http://secunia.com/advisories/59894
- http://secunia.com/advisories/59916
- http://secunia.com/advisories/59990
- http://secunia.com/advisories/60049
- http://secunia.com/advisories/60066
- http://secunia.com/advisories/60176
- http://secunia.com/advisories/60522
- http://secunia.com/advisories/60567
- http://secunia.com/advisories/60571
- http://secunia.com/advisories/60577
- http://secunia.com/advisories/60819
- http://secunia.com/advisories/61254
- http://secunia.com/advisories/61815
- http://security.gentoo.org/glsa/glsa-201407-05.xml
- http://support.apple.com/kb/HT6443
- http://support.citrix.com/article/CTX140876
- http://support.f5.com/kb/en-us/solutions/public/15000/300/sol15325.html
- http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140605-openssl
- http://www-01.ibm.com/support/docview.wss?uid=isg400001841
- http://www-01.ibm.com/support/docview.wss?uid=isg400001843
- http://www-01.ibm.com/support/docview.wss?uid=nas8N1020163
- http://www-01.ibm.com/support/docview.wss?uid=nas8N1020172
- http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004690
- http://www-01.ibm.com/support/docview.wss?uid=swg1IV61506
- http://www-01.ibm.com/support/docview.wss?uid=swg21673137
- http://www-01.ibm.com/support/docview.wss?uid=swg21675626
- http://www-01.ibm.com/support/docview.wss?uid=swg21675821
- http://www-01.ibm.com/support/docview.wss?uid=swg21676035
- http://www-01.ibm.com/support/docview.wss?uid=swg21676062
- http://www-01.ibm.com/support/docview.wss?uid=swg21676071
- http://www-01.ibm.com/support/docview.wss?uid=swg21676333
- http://www-01.ibm.com/support/docview.wss?uid=swg21676334
- http://www-01.ibm.com/support/docview.wss?uid=swg21676419
- http://www-01.ibm.com/support/docview.wss?uid=swg21676478
- http://www-01.ibm.com/support/docview.wss?uid=swg21676496
- http://www-01.ibm.com/support/docview.wss?uid=swg21676501
- http://www-01.ibm.com/support/docview.wss?uid=swg21676529
- http://www-01.ibm.com/support/docview.wss?uid=swg21676536
- http://www-01.ibm.com/support/docview.wss?uid=swg21676615
- http://www-01.ibm.com/support/docview.wss?uid=swg21676644
- http://www-01.ibm.com/support/docview.wss?uid=swg21676655
- http://www-01.ibm.com/support/docview.wss?uid=swg21676786
- http://www-01.ibm.com/support/docview.wss?uid=swg21676833
- http://www-01.ibm.com/support/docview.wss?uid=swg21676845
- http://www-01.ibm.com/support/docview.wss?uid=swg21676879
- http://www-01.ibm.com/support/docview.wss?uid=swg21676889
- http://www-01.ibm.com/support/docview.wss?uid=swg21677080
- http://www-01.ibm.com/support/docview.wss?uid=swg21677131
- http://www-01.ibm.com/support/docview.wss?uid=swg21677390
- http://www-01.ibm.com/support/docview.wss?uid=swg21677527
- http://www-01.ibm.com/support/docview.wss?uid=swg21677567
- http://www-01.ibm.com/support/docview.wss?uid=swg21677695
- http://www-01.ibm.com/support/docview.wss?uid=swg21677828
- http://www-01.ibm.com/support/docview.wss?uid=swg21677836
- http://www-01.ibm.com/support/docview.wss?uid=swg21678167
- http://www-01.ibm.com/support/docview.wss?uid=swg21678233
- http://www-01.ibm.com/support/docview.wss?uid=swg21678289
- http://www-01.ibm.com/support/docview.wss?uid=swg21683332
- http://www-01.ibm.com/support/docview.wss?uid=swg24037727
- http://www-01.ibm.com/support/docview.wss?uid=swg24037729
- http://www-01.ibm.com/support/docview.wss?uid=swg24037730
- http://www-01.ibm.com/support/docview.wss?uid=swg24037731
- http://www-01.ibm.com/support/docview.wss?uid=swg24037732
- http://www-01.ibm.com/support/docview.wss?uid=swg24037761
- http://www-01.ibm.com/support/docview.wss?uid=swg24037870
- http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095740
- http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095754
- http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095755
- http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095756
- http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095757
- http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5095737
- http://www.blackberry.com/btsc/KB36051
- http://www.f-secure.com/en/web/labs_global/fsc-2014-6
- http://www.fortiguard.com/advisory/FG-IR-14-018/
- http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-345106.htm
- http://www.ibm.com/support/docview.wss?uid=isg3T1020948
- http://www.ibm.com/support/docview.wss?uid=ssg1S1004678
- http://www.ibm.com/support/docview.wss?uid=swg1IT02314
- http://www.ibm.com/support/docview.wss?uid=swg21676356
- http://www.ibm.com/support/docview.wss?uid=swg21676793
- http://www.ibm.com/support/docview.wss?uid=swg21676877
- http://www.ibm.com/support/docview.wss?uid=swg24037783
- http://www.innominate.com/data/downloads/manuals/mdm_1.5.2.1_Release_Notes.pdf
- http://www.kb.cert.org/vuls/id/978508
- http://www.kerio.com/support/kerio-control/release-history
- http://www.mandriva.com/security/advisories?name=MDVSA-2014:105
- http://www.mandriva.com/security/advisories?name=MDVSA-2014:106
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:062
- http://www.novell.com/support/kb/doc.php?id=7015264
- http://www.novell.com/support/kb/doc.php?id=7015300
- http://www.openssl.org/news/secadv_20140605.txt
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
- http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html
- http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html
- http://www.securityfocus.com/archive/1/534161/100/0/threaded
- http://www.securitytracker.com/id/1031032
- http://www.securitytracker.com/id/1031594
- http://www.splunk.com/view/SP-CAAAM2D
- http://www.tenable.com/blog/nessus-527-and-pvs-403-are-available-for-download
- http://www.vmware.com/security/advisories/VMSA-2014-0006.html
- http://www.vmware.com/security/advisories/VMSA-2014-0012.html
- http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0
- http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=6060&myns=phmc&mync=E
- http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=6061&myns=phmc&mync=E
- https://access.redhat.com/site/blogs/766093/posts/908133
- https://blogs.oracle.com/sunsecurity/entry/cve_2014_0224_cryptographic_issues
- https://blogs.oracle.com/sunsecurity/entry/cve_2014_0224_cryptographic_issues1
- https://bugzilla.redhat.com/show_bug.cgi?id=1103586
- https://cert-portal.siemens.com/productcert/pdf/ssa-234763.pdf
- https://discussions.nessus.org/thread/7517
- https://filezilla-project.org/versions.php?type=server
- https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=bc8923b1ec9c467755cd86f7848c50ee8812e441
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05301946
- https://kb.bluecoat.com/index?page=content&id=SA80
- https://kc.mcafee.com/corporate/index?page=content&id=SB10075
- https://www.arista.com/en/support/advisories-notices/security-advisories/941-security-advisory-0005
- https://www.ibm.com/support/docview.wss?uid=ssg1S1004670
- https://www.ibm.com/support/docview.wss?uid=ssg1S1004671
- https://www.imperialviolet.org/2014/06/05/earlyccs.html
- https://www.intersectalliance.com/wp-content/uploads/release_notes/ReleaseNotes_for_SNARE_for_MSSQL.pdf
- https://www.intersectalliance.com/wp-content/uploads/release_notes/ReleaseNotes_for_Snare_for_Windows.pdf
- https://www.novell.com/support/kb/doc.php?id=7015271
Modified: 2025-04-12
CVE-2014-5256
Node.js 0.8 before 0.8.28 and 0.10 before 0.10.30 does not consider the possibility of recursive processing that triggers V8 garbage collection in conjunction with a V8 interrupt, which allows remote attackers to cause a denial of service (memory corruption and application crash) via deep JSON objects whose parsing lets this interrupt mask an overflow of the program stack.
- http://advisories.mageia.org/MGASA-2014-0516.html
- http://blog.nodejs.org/2014/07/31/v8-memory-corruption-stack-overflow/
- http://secunia.com/advisories/61260
- http://www-01.ibm.com/support/docview.wss?uid=swg21684769
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:142
- https://github.com/joyent/node/commit/530af9cb8e700e7596b3ec812bad123c9fa06356
- http://advisories.mageia.org/MGASA-2014-0516.html
- http://blog.nodejs.org/2014/07/31/v8-memory-corruption-stack-overflow/
- http://secunia.com/advisories/61260
- http://www-01.ibm.com/support/docview.wss?uid=swg21684769
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:142
- https://github.com/joyent/node/commit/530af9cb8e700e7596b3ec812bad123c9fa06356
Modified: 2024-11-21
CVE-2014-9748
The uv_rwlock_t fallback implementation for Windows XP and Server 2003 in libuv before 1.7.4 does not properly prevent threads from releasing the locks of other threads, which allows attackers to cause a denial of service (deadlock) or possibly have unspecified other impact by leveraging a race condition.
- https://github.com/libuv/libuv/issues/515
- https://github.com/libuv/libuv/pull/516
- https://github.com/nodejs/node/pull/2723
- https://groups.google.com/forum/#%21msg/libuv/KyNnGEXR0OA/NWb605ev2LUJ
- https://groups.google.com/forum/#%21topic/libuv/WO2cl9zasN8
- https://github.com/libuv/libuv/issues/515
- https://github.com/libuv/libuv/pull/516
- https://github.com/nodejs/node/pull/2723
- https://groups.google.com/forum/#%21msg/libuv/KyNnGEXR0OA/NWb605ev2LUJ
- https://groups.google.com/forum/#%21topic/libuv/WO2cl9zasN8
Modified: 2025-04-20
CVE-2014-9772
The validator package before 2.0.0 for Node.js allows remote attackers to bypass the cross-site scripting (XSS) filter via hex-encoded characters.
Modified: 2025-04-12
CVE-2015-0278
libuv before 0.10.34 does not properly drop group privileges, which allows context-dependent attackers to gain privileges via unspecified vectors.
- http://advisories.mageia.org/MGASA-2015-0186.html
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:228
- https://github.com/libuv/libuv/commit/66ab38918c911bcff025562cf06237d7fedaba0c
- https://github.com/libuv/libuv/pull/215
- https://groups.google.com/forum/#%21msg/libuv/0JZxwLMtsMI/jraczskYWWQJ
- https://lists.fedoraproject.org/pipermail/package-announce/2015-February/150526.html
- https://security.gentoo.org/glsa/201611-10
- http://advisories.mageia.org/MGASA-2015-0186.html
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:228
- https://github.com/libuv/libuv/commit/66ab38918c911bcff025562cf06237d7fedaba0c
- https://github.com/libuv/libuv/pull/215
- https://groups.google.com/forum/#%21msg/libuv/0JZxwLMtsMI/jraczskYWWQJ
- https://lists.fedoraproject.org/pipermail/package-announce/2015-February/150526.html
- https://security.gentoo.org/glsa/201611-10
Modified: 2025-04-12
CVE-2015-3194
crypto/rsa/rsa_ameth.c in OpenSSL 1.0.1 before 1.0.1q and 1.0.2 before 1.0.2e allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an RSA PSS ASN.1 signature that lacks a mask generation function parameter.
- http://fortiguard.com/advisory/openssl-advisory-december-2015
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10761
- http://lists.fedoraproject.org/pipermail/package-announce/2015-December/173801.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00009.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
- http://lists.opensuse.org/opensuse-updates/2015-12/msg00070.html
- http://lists.opensuse.org/opensuse-updates/2015-12/msg00071.html
- http://lists.opensuse.org/opensuse-updates/2015-12/msg00087.html
- http://marc.info/?l=bugtraq&m=145382583417444&w=2
- http://openssl.org/news/secadv/20151203.txt
- http://rhn.redhat.com/errata/RHSA-2015-2617.html
- http://rhn.redhat.com/errata/RHSA-2016-2957.html
- http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151204-openssl
- http://www.debian.org/security/2015/dsa-3413
- http://www.fortiguard.com/advisory/openssl-advisory-december-2015
- http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.securityfocus.com/bid/78623
- http://www.securityfocus.com/bid/91787
- http://www.securitytracker.com/id/1034294
- http://www.slackware.com/security/viewer.php?l=slackware-security&y=2015&m=slackware-security.754583
- http://www.ubuntu.com/usn/USN-2830-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1288320
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
- https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=c394a488942387246653833359a5c94b5832674e
- https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=d8541d7e9e63bf5f343af24644046c8d96498c17
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04944173
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05111017
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05131085
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05157667
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05398322
- https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40100
- http://fortiguard.com/advisory/openssl-advisory-december-2015
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10761
- http://lists.fedoraproject.org/pipermail/package-announce/2015-December/173801.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00009.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
- http://lists.opensuse.org/opensuse-updates/2015-12/msg00070.html
- http://lists.opensuse.org/opensuse-updates/2015-12/msg00071.html
- http://lists.opensuse.org/opensuse-updates/2015-12/msg00087.html
- http://marc.info/?l=bugtraq&m=145382583417444&w=2
- http://openssl.org/news/secadv/20151203.txt
- http://rhn.redhat.com/errata/RHSA-2015-2617.html
- http://rhn.redhat.com/errata/RHSA-2016-2957.html
- http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151204-openssl
- http://www.debian.org/security/2015/dsa-3413
- http://www.fortiguard.com/advisory/openssl-advisory-december-2015
- http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.securityfocus.com/bid/78623
- http://www.securityfocus.com/bid/91787
- http://www.securitytracker.com/id/1034294
- http://www.slackware.com/security/viewer.php?l=slackware-security&y=2015&m=slackware-security.754583
- http://www.ubuntu.com/usn/USN-2830-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1288320
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
- https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=c394a488942387246653833359a5c94b5832674e
- https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=d8541d7e9e63bf5f343af24644046c8d96498c17
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04944173
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05111017
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05131085
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05157667
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05398322
- https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40100
Modified: 2025-04-12
CVE-2015-5380
The Utf8DecoderBase::WriteUtf16Slow function in unicode-decoder.cc in Google V8, as used in Node.js before 0.12.6, io.js before 1.8.3 and 2.x before 2.3.3, and other products, does not verify that there is memory available for a UTF-16 surrogate pair, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a crafted byte sequence.
- http://blog.nodejs.org/2015/07/03/node-v0-12-6-stable/
- http://www.securityfocus.com/bid/75556
- https://codereview.chromium.org/1226493003
- https://github.com/joyent/node/issues/25583
- https://medium.com/%40iojs/important-security-upgrades-for-node-js-and-io-js-8ac14ece5852
- http://blog.nodejs.org/2015/07/03/node-v0-12-6-stable/
- http://www.securityfocus.com/bid/75556
- https://codereview.chromium.org/1226493003
- https://github.com/joyent/node/issues/25583
- https://medium.com/%40iojs/important-security-upgrades-for-node-js-and-io-js-8ac14ece5852
Modified: 2025-04-20
CVE-2015-8856
Cross-site scripting (XSS) vulnerability in the serve-index package before 1.6.3 for Node.js allows remote attackers to inject arbitrary web script or HTML via a crafted file or directory name.
Modified: 2025-04-20
CVE-2015-8859
The send package before 0.11.1 for Node.js allows attackers to obtain the root path via unspecified vectors.
Modified: 2025-04-20
CVE-2015-8860
The tar package before 2.0.0 for Node.js allows remote attackers to write to arbitrary files via a symlink attack in an archive.
Modified: 2024-11-21
CVE-2017-16024
The sync-exec module is used to simulate child_process.execSync in node versions <0.11.9. Sync-exec uses tmp directories as a buffer before returning values. Other users on the server have read access to the tmp directory, possibly allowing an attacker on the server to obtain confidential information from the buffer/tmp file, while it exists.
- https://cwe.mitre.org/data/definitions/377.html
- https://github.com/gvarsanyi/sync-exec/issues/17
- https://nodesecurity.io/advisories/310
- https://www.owasp.org/index.php/Insecure_Temporary_File
- https://cwe.mitre.org/data/definitions/377.html
- https://github.com/gvarsanyi/sync-exec/issues/17
- https://nodesecurity.io/advisories/310
- https://www.owasp.org/index.php/Insecure_Temporary_File
Closed bugs
Собрать версию 4.2.6 LTS
Closed vulnerabilities
Modified: 2025-04-12
CVE-2015-7511
Libgcrypt before 1.6.5 does not properly perform elliptic-point curve multiplication during decryption, which makes it easier for physically proximate attackers to extract ECDH keys by measuring electromagnetic emanations.
- http://lists.opensuse.org/opensuse-updates/2016-05/msg00027.html
- http://www.cs.tau.ac.IL/~tromer/ecdh/
- http://www.debian.org/security/2016/dsa-3474
- http://www.debian.org/security/2016/dsa-3478
- http://www.securityfocus.com/bid/83253
- http://www.ubuntu.com/usn/USN-2896-1
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W2IL4PAEICHGA2XMQYRY3MIWHM4GMPAG/
- https://lists.gnupg.org/pipermail/gnupg-announce/2016q1/000384.html
- https://security.gentoo.org/glsa/201610-04
- http://lists.opensuse.org/opensuse-updates/2016-05/msg00027.html
- http://www.cs.tau.ac.IL/~tromer/ecdh/
- http://www.debian.org/security/2016/dsa-3474
- http://www.debian.org/security/2016/dsa-3478
- http://www.securityfocus.com/bid/83253
- http://www.ubuntu.com/usn/USN-2896-1
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W2IL4PAEICHGA2XMQYRY3MIWHM4GMPAG/
- https://lists.gnupg.org/pipermail/gnupg-announce/2016q1/000384.html
- https://security.gentoo.org/glsa/201610-04
Package adobe-flash-player updated to version 11-alt59 for branch sisyphus in task 158591.
Closed vulnerabilities
BDU:2016-00414
Уязвимость программных платформ Adobe Integrated Runtime и Flash Player, позволяющая нарушителю выполнить произвольный код
BDU:2016-00457
Уязвимость программных платформ Adobe Integrated Runtime и Flash Player, позволяющая нарушителю выполнить произвольный код
BDU:2016-00458
Уязвимость программных платформ Adobe Integrated Runtime и Flash Player, позволяющая нарушителю выполнить произвольный код
BDU:2016-00459
Уязвимость программных платформ Adobe Integrated Runtime и Flash Player, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код
BDU:2016-00460
Уязвимость программных платформ Adobe Integrated Runtime и Flash Player, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код
BDU:2016-00461
Уязвимость программных платформ Adobe Integrated Runtime и Flash Player, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код
BDU:2016-00462
Уязвимость программных платформ Adobe Integrated Runtime и Flash Player, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код
BDU:2016-00463
Уязвимость программных платформ Adobe Integrated Runtime и Flash Player, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код
BDU:2016-00464
Уязвимость программных платформ Adobe Integrated Runtime и Flash Player, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код
BDU:2016-00465
Уязвимость программных платформ Adobe Integrated Runtime и Flash Player, позволяющая нарушителю выполнить произвольный код
BDU:2016-00466
Уязвимость программных платформ Adobe Integrated Runtime и Flash Player, позволяющая нарушителю выполнить произвольный код
BDU:2016-00467
Уязвимость программных платформ Adobe Integrated Runtime и Flash Player, позволяющая нарушителю выполнить произвольный код
BDU:2016-00468
Уязвимость программных платформ Adobe Integrated Runtime и Flash Player, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код
BDU:2016-00469
Уязвимость программных платформ Adobe Integrated Runtime и Flash Player, позволяющая нарушителю выполнить произвольный код
BDU:2016-00470
Уязвимость программных платформ Adobe Integrated Runtime и Flash Player, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код
BDU:2016-00471
Уязвимость программных платформ Adobe Integrated Runtime и Flash Player, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код
BDU:2016-00472
Уязвимость программных платформ Adobe Integrated Runtime и Flash Player, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код
BDU:2016-00473
Уязвимость программных платформ Adobe Integrated Runtime и Flash Player, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код
BDU:2016-00474
Уязвимость программных платформ Adobe Integrated Runtime и Flash Player, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код
BDU:2016-00475
Уязвимость программных платформ Adobe Integrated Runtime и Flash Player, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код
BDU:2016-00476
Уязвимость программных платформ Adobe Integrated Runtime и Flash Player, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код
BDU:2016-00537
Уязвимость программных платформ Adobe Integrated Runtime и Flash Player, позволяющая нарушителю выполнить произвольный код
Modified: 2025-04-12
CVE-2016-0964
Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and OS X and before 11.2.202.569 on Linux, Adobe AIR before 20.0.0.260, Adobe AIR SDK before 20.0.0.260, and Adobe AIR SDK & Compiler before 20.0.0.260 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-0965, CVE-2016-0966, CVE-2016-0967, CVE-2016-0968, CVE-2016-0969, CVE-2016-0970, CVE-2016-0972, CVE-2016-0976, CVE-2016-0977, CVE-2016-0978, CVE-2016-0979, CVE-2016-0980, and CVE-2016-0981.
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00025.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00027.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00029.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00030.html
- http://rhn.redhat.com/errata/RHSA-2016-0166.html
- http://www.securitytracker.com/id/1034970
- https://helpx.adobe.com/security/products/flash-player/apsb16-04.html
- https://security.gentoo.org/glsa/201603-07
- https://www.exploit-db.com/exploits/39467/
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00025.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00027.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00029.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00030.html
- http://rhn.redhat.com/errata/RHSA-2016-0166.html
- http://www.securitytracker.com/id/1034970
- https://helpx.adobe.com/security/products/flash-player/apsb16-04.html
- https://security.gentoo.org/glsa/201603-07
- https://www.exploit-db.com/exploits/39467/
Modified: 2025-04-12
CVE-2016-0965
Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and OS X and before 11.2.202.569 on Linux, Adobe AIR before 20.0.0.260, Adobe AIR SDK before 20.0.0.260, and Adobe AIR SDK & Compiler before 20.0.0.260 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-0964, CVE-2016-0966, CVE-2016-0967, CVE-2016-0968, CVE-2016-0969, CVE-2016-0970, CVE-2016-0972, CVE-2016-0976, CVE-2016-0977, CVE-2016-0978, CVE-2016-0979, CVE-2016-0980, and CVE-2016-0981.
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00025.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00027.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00029.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00030.html
- http://rhn.redhat.com/errata/RHSA-2016-0166.html
- http://www.securitytracker.com/id/1034970
- https://helpx.adobe.com/security/products/flash-player/apsb16-04.html
- https://security.gentoo.org/glsa/201603-07
- https://www.exploit-db.com/exploits/39460/
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00025.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00027.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00029.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00030.html
- http://rhn.redhat.com/errata/RHSA-2016-0166.html
- http://www.securitytracker.com/id/1034970
- https://helpx.adobe.com/security/products/flash-player/apsb16-04.html
- https://security.gentoo.org/glsa/201603-07
- https://www.exploit-db.com/exploits/39460/
Modified: 2025-04-12
CVE-2016-0966
Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and OS X and before 11.2.202.569 on Linux, Adobe AIR before 20.0.0.260, Adobe AIR SDK before 20.0.0.260, and Adobe AIR SDK & Compiler before 20.0.0.260 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-0964, CVE-2016-0965, CVE-2016-0967, CVE-2016-0968, CVE-2016-0969, CVE-2016-0970, CVE-2016-0972, CVE-2016-0976, CVE-2016-0977, CVE-2016-0978, CVE-2016-0979, CVE-2016-0980, and CVE-2016-0981.
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00025.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00027.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00029.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00030.html
- http://rhn.redhat.com/errata/RHSA-2016-0166.html
- http://www.securitytracker.com/id/1034970
- https://helpx.adobe.com/security/products/flash-player/apsb16-04.html
- https://security.gentoo.org/glsa/201603-07
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00025.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00027.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00029.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00030.html
- http://rhn.redhat.com/errata/RHSA-2016-0166.html
- http://www.securitytracker.com/id/1034970
- https://helpx.adobe.com/security/products/flash-player/apsb16-04.html
- https://security.gentoo.org/glsa/201603-07
Modified: 2025-04-12
CVE-2016-0967
Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and OS X and before 11.2.202.569 on Linux, Adobe AIR before 20.0.0.260, Adobe AIR SDK before 20.0.0.260, and Adobe AIR SDK & Compiler before 20.0.0.260 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-0964, CVE-2016-0965, CVE-2016-0966, CVE-2016-0968, CVE-2016-0969, CVE-2016-0970, CVE-2016-0972, CVE-2016-0976, CVE-2016-0977, CVE-2016-0978, CVE-2016-0979, CVE-2016-0980, and CVE-2016-0981.
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00025.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00027.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00029.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00030.html
- http://rhn.redhat.com/errata/RHSA-2016-0166.html
- http://www.securitytracker.com/id/1034970
- https://helpx.adobe.com/security/products/flash-player/apsb16-04.html
- https://security.gentoo.org/glsa/201603-07
- https://www.exploit-db.com/exploits/39466/
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00025.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00027.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00029.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00030.html
- http://rhn.redhat.com/errata/RHSA-2016-0166.html
- http://www.securitytracker.com/id/1034970
- https://helpx.adobe.com/security/products/flash-player/apsb16-04.html
- https://security.gentoo.org/glsa/201603-07
- https://www.exploit-db.com/exploits/39466/
Modified: 2025-04-12
CVE-2016-0968
Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and OS X and before 11.2.202.569 on Linux, Adobe AIR before 20.0.0.260, Adobe AIR SDK before 20.0.0.260, and Adobe AIR SDK & Compiler before 20.0.0.260 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-0964, CVE-2016-0965, CVE-2016-0966, CVE-2016-0967, CVE-2016-0969, CVE-2016-0970, CVE-2016-0972, CVE-2016-0976, CVE-2016-0977, CVE-2016-0978, CVE-2016-0979, CVE-2016-0980, and CVE-2016-0981.
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00025.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00027.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00029.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00030.html
- http://rhn.redhat.com/errata/RHSA-2016-0166.html
- http://www.securitytracker.com/id/1034970
- https://helpx.adobe.com/security/products/flash-player/apsb16-04.html
- https://security.gentoo.org/glsa/201603-07
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00025.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00027.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00029.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00030.html
- http://rhn.redhat.com/errata/RHSA-2016-0166.html
- http://www.securitytracker.com/id/1034970
- https://helpx.adobe.com/security/products/flash-player/apsb16-04.html
- https://security.gentoo.org/glsa/201603-07
Modified: 2025-04-12
CVE-2016-0969
Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and OS X and before 11.2.202.569 on Linux, Adobe AIR before 20.0.0.260, Adobe AIR SDK before 20.0.0.260, and Adobe AIR SDK & Compiler before 20.0.0.260 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-0964, CVE-2016-0965, CVE-2016-0966, CVE-2016-0967, CVE-2016-0968, CVE-2016-0970, CVE-2016-0972, CVE-2016-0976, CVE-2016-0977, CVE-2016-0978, CVE-2016-0979, CVE-2016-0980, and CVE-2016-0981.
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00025.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00027.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00029.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00030.html
- http://rhn.redhat.com/errata/RHSA-2016-0166.html
- http://www.securitytracker.com/id/1034970
- https://helpx.adobe.com/security/products/flash-player/apsb16-04.html
- https://security.gentoo.org/glsa/201603-07
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00025.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00027.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00029.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00030.html
- http://rhn.redhat.com/errata/RHSA-2016-0166.html
- http://www.securitytracker.com/id/1034970
- https://helpx.adobe.com/security/products/flash-player/apsb16-04.html
- https://security.gentoo.org/glsa/201603-07
Modified: 2025-04-12
CVE-2016-0970
Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and OS X and before 11.2.202.569 on Linux, Adobe AIR before 20.0.0.260, Adobe AIR SDK before 20.0.0.260, and Adobe AIR SDK & Compiler before 20.0.0.260 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-0964, CVE-2016-0965, CVE-2016-0966, CVE-2016-0967, CVE-2016-0968, CVE-2016-0969, CVE-2016-0972, CVE-2016-0976, CVE-2016-0977, CVE-2016-0978, CVE-2016-0979, CVE-2016-0980, and CVE-2016-0981.
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00025.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00027.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00029.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00030.html
- http://rhn.redhat.com/errata/RHSA-2016-0166.html
- http://www.securitytracker.com/id/1034970
- https://helpx.adobe.com/security/products/flash-player/apsb16-04.html
- https://security.gentoo.org/glsa/201603-07
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00025.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00027.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00029.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00030.html
- http://rhn.redhat.com/errata/RHSA-2016-0166.html
- http://www.securitytracker.com/id/1034970
- https://helpx.adobe.com/security/products/flash-player/apsb16-04.html
- https://security.gentoo.org/glsa/201603-07
Modified: 2025-04-12
CVE-2016-0971
Heap-based buffer overflow in Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and OS X and before 11.2.202.569 on Linux, Adobe AIR before 20.0.0.260, Adobe AIR SDK before 20.0.0.260, and Adobe AIR SDK & Compiler before 20.0.0.260 allows attackers to execute arbitrary code via unspecified vectors.
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00025.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00027.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00029.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00030.html
- http://rhn.redhat.com/errata/RHSA-2016-0166.html
- http://www.securitytracker.com/id/1034970
- https://helpx.adobe.com/security/products/flash-player/apsb16-04.html
- https://security.gentoo.org/glsa/201603-07
- https://www.exploit-db.com/exploits/39465/
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00025.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00027.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00029.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00030.html
- http://rhn.redhat.com/errata/RHSA-2016-0166.html
- http://www.securitytracker.com/id/1034970
- https://helpx.adobe.com/security/products/flash-player/apsb16-04.html
- https://security.gentoo.org/glsa/201603-07
- https://www.exploit-db.com/exploits/39465/
Modified: 2025-04-12
CVE-2016-0972
Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and OS X and before 11.2.202.569 on Linux, Adobe AIR before 20.0.0.260, Adobe AIR SDK before 20.0.0.260, and Adobe AIR SDK & Compiler before 20.0.0.260 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-0964, CVE-2016-0965, CVE-2016-0966, CVE-2016-0967, CVE-2016-0968, CVE-2016-0969, CVE-2016-0970, CVE-2016-0976, CVE-2016-0977, CVE-2016-0978, CVE-2016-0979, CVE-2016-0980, and CVE-2016-0981.
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00025.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00027.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00029.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00030.html
- http://rhn.redhat.com/errata/RHSA-2016-0166.html
- http://www.securitytracker.com/id/1034970
- https://helpx.adobe.com/security/products/flash-player/apsb16-04.html
- https://security.gentoo.org/glsa/201603-07
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00025.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00027.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00029.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00030.html
- http://rhn.redhat.com/errata/RHSA-2016-0166.html
- http://www.securitytracker.com/id/1034970
- https://helpx.adobe.com/security/products/flash-player/apsb16-04.html
- https://security.gentoo.org/glsa/201603-07
Modified: 2025-04-12
CVE-2016-0973
Use-after-free vulnerability in the URLRequest object implementation in Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and OS X and before 11.2.202.569 on Linux, Adobe AIR before 20.0.0.260, Adobe AIR SDK before 20.0.0.260, and Adobe AIR SDK & Compiler before 20.0.0.260 allows attackers to execute arbitrary code via a URLLoader.load call, a different vulnerability than CVE-2016-0974, CVE-2016-0975, CVE-2016-0982, CVE-2016-0983, and CVE-2016-0984.
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00025.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00027.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00029.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00030.html
- http://rhn.redhat.com/errata/RHSA-2016-0166.html
- http://www.securitytracker.com/id/1034970
- http://zerodayinitiative.com/advisories/ZDI-16-161/
- https://helpx.adobe.com/security/products/flash-player/apsb16-04.html
- https://security.gentoo.org/glsa/201603-07
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00025.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00027.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00029.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00030.html
- http://rhn.redhat.com/errata/RHSA-2016-0166.html
- http://www.securitytracker.com/id/1034970
- http://zerodayinitiative.com/advisories/ZDI-16-161/
- https://helpx.adobe.com/security/products/flash-player/apsb16-04.html
- https://security.gentoo.org/glsa/201603-07
Modified: 2025-04-12
CVE-2016-0974
Use-after-free vulnerability in Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and OS X and before 11.2.202.569 on Linux, Adobe AIR before 20.0.0.260, Adobe AIR SDK before 20.0.0.260, and Adobe AIR SDK & Compiler before 20.0.0.260 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-0973, CVE-2016-0975, CVE-2016-0982, CVE-2016-0983, and CVE-2016-0984.
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00025.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00027.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00029.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00030.html
- http://rhn.redhat.com/errata/RHSA-2016-0166.html
- http://www.securitytracker.com/id/1034970
- https://helpx.adobe.com/security/products/flash-player/apsb16-04.html
- https://security.gentoo.org/glsa/201603-07
- https://www.exploit-db.com/exploits/39463/
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00025.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00027.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00029.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00030.html
- http://rhn.redhat.com/errata/RHSA-2016-0166.html
- http://www.securitytracker.com/id/1034970
- https://helpx.adobe.com/security/products/flash-player/apsb16-04.html
- https://security.gentoo.org/glsa/201603-07
- https://www.exploit-db.com/exploits/39463/
Modified: 2025-04-12
CVE-2016-0975
Use-after-free vulnerability in the instanceof function in Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and OS X and before 11.2.202.569 on Linux, Adobe AIR before 20.0.0.260, Adobe AIR SDK before 20.0.0.260, and Adobe AIR SDK & Compiler before 20.0.0.260 allows attackers to execute arbitrary code by leveraging improper reference handling, a different vulnerability than CVE-2016-0973, CVE-2016-0974, CVE-2016-0982, CVE-2016-0983, and CVE-2016-0984.
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00025.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00027.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00029.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00030.html
- http://rhn.redhat.com/errata/RHSA-2016-0166.html
- http://www.securitytracker.com/id/1034970
- http://zerodayinitiative.com/advisories/ZDI-16-160/
- https://helpx.adobe.com/security/products/flash-player/apsb16-04.html
- https://security.gentoo.org/glsa/201603-07
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00025.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00027.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00029.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00030.html
- http://rhn.redhat.com/errata/RHSA-2016-0166.html
- http://www.securitytracker.com/id/1034970
- http://zerodayinitiative.com/advisories/ZDI-16-160/
- https://helpx.adobe.com/security/products/flash-player/apsb16-04.html
- https://security.gentoo.org/glsa/201603-07
Modified: 2025-04-12
CVE-2016-0976
Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and OS X and before 11.2.202.569 on Linux, Adobe AIR before 20.0.0.260, Adobe AIR SDK before 20.0.0.260, and Adobe AIR SDK & Compiler before 20.0.0.260 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-0964, CVE-2016-0965, CVE-2016-0966, CVE-2016-0967, CVE-2016-0968, CVE-2016-0969, CVE-2016-0970, CVE-2016-0972, CVE-2016-0977, CVE-2016-0978, CVE-2016-0979, CVE-2016-0980, and CVE-2016-0981.
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00025.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00027.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00029.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00030.html
- http://rhn.redhat.com/errata/RHSA-2016-0166.html
- http://www.securitytracker.com/id/1034970
- https://helpx.adobe.com/security/products/flash-player/apsb16-04.html
- https://security.gentoo.org/glsa/201603-07
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00025.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00027.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00029.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00030.html
- http://rhn.redhat.com/errata/RHSA-2016-0166.html
- http://www.securitytracker.com/id/1034970
- https://helpx.adobe.com/security/products/flash-player/apsb16-04.html
- https://security.gentoo.org/glsa/201603-07
Modified: 2025-04-12
CVE-2016-0977
Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and OS X and before 11.2.202.569 on Linux, Adobe AIR before 20.0.0.260, Adobe AIR SDK before 20.0.0.260, and Adobe AIR SDK & Compiler before 20.0.0.260 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-0964, CVE-2016-0965, CVE-2016-0966, CVE-2016-0967, CVE-2016-0968, CVE-2016-0969, CVE-2016-0970, CVE-2016-0972, CVE-2016-0976, CVE-2016-0978, CVE-2016-0979, CVE-2016-0980, and CVE-2016-0981.
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00025.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00027.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00029.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00030.html
- http://rhn.redhat.com/errata/RHSA-2016-0166.html
- http://www.securitytracker.com/id/1034970
- https://helpx.adobe.com/security/products/flash-player/apsb16-04.html
- https://security.gentoo.org/glsa/201603-07
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00025.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00027.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00029.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00030.html
- http://rhn.redhat.com/errata/RHSA-2016-0166.html
- http://www.securitytracker.com/id/1034970
- https://helpx.adobe.com/security/products/flash-player/apsb16-04.html
- https://security.gentoo.org/glsa/201603-07
Modified: 2025-04-12
CVE-2016-0978
Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and OS X and before 11.2.202.569 on Linux, Adobe AIR before 20.0.0.260, Adobe AIR SDK before 20.0.0.260, and Adobe AIR SDK & Compiler before 20.0.0.260 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-0964, CVE-2016-0965, CVE-2016-0966, CVE-2016-0967, CVE-2016-0968, CVE-2016-0969, CVE-2016-0970, CVE-2016-0972, CVE-2016-0976, CVE-2016-0977, CVE-2016-0979, CVE-2016-0980, and CVE-2016-0981.
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00025.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00027.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00029.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00030.html
- http://rhn.redhat.com/errata/RHSA-2016-0166.html
- http://www.securitytracker.com/id/1034970
- https://helpx.adobe.com/security/products/flash-player/apsb16-04.html
- https://security.gentoo.org/glsa/201603-07
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00025.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00027.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00029.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00030.html
- http://rhn.redhat.com/errata/RHSA-2016-0166.html
- http://www.securitytracker.com/id/1034970
- https://helpx.adobe.com/security/products/flash-player/apsb16-04.html
- https://security.gentoo.org/glsa/201603-07
Modified: 2025-04-12
CVE-2016-0979
Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and OS X and before 11.2.202.569 on Linux, Adobe AIR before 20.0.0.260, Adobe AIR SDK before 20.0.0.260, and Adobe AIR SDK & Compiler before 20.0.0.260 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-0964, CVE-2016-0965, CVE-2016-0966, CVE-2016-0967, CVE-2016-0968, CVE-2016-0969, CVE-2016-0970, CVE-2016-0972, CVE-2016-0976, CVE-2016-0977, CVE-2016-0978, CVE-2016-0980, and CVE-2016-0981.
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00025.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00027.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00029.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00030.html
- http://rhn.redhat.com/errata/RHSA-2016-0166.html
- http://www.securitytracker.com/id/1034970
- https://helpx.adobe.com/security/products/flash-player/apsb16-04.html
- https://security.gentoo.org/glsa/201603-07
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00025.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00027.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00029.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00030.html
- http://rhn.redhat.com/errata/RHSA-2016-0166.html
- http://www.securitytracker.com/id/1034970
- https://helpx.adobe.com/security/products/flash-player/apsb16-04.html
- https://security.gentoo.org/glsa/201603-07
Modified: 2025-04-12
CVE-2016-0980
Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and OS X and before 11.2.202.569 on Linux, Adobe AIR before 20.0.0.260, Adobe AIR SDK before 20.0.0.260, and Adobe AIR SDK & Compiler before 20.0.0.260 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-0964, CVE-2016-0965, CVE-2016-0966, CVE-2016-0967, CVE-2016-0968, CVE-2016-0969, CVE-2016-0970, CVE-2016-0972, CVE-2016-0976, CVE-2016-0977, CVE-2016-0978, CVE-2016-0979, and CVE-2016-0981.
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00025.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00027.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00029.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00030.html
- http://rhn.redhat.com/errata/RHSA-2016-0166.html
- http://www.securitytracker.com/id/1034970
- https://helpx.adobe.com/security/products/flash-player/apsb16-04.html
- https://security.gentoo.org/glsa/201603-07
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00025.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00027.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00029.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00030.html
- http://rhn.redhat.com/errata/RHSA-2016-0166.html
- http://www.securitytracker.com/id/1034970
- https://helpx.adobe.com/security/products/flash-player/apsb16-04.html
- https://security.gentoo.org/glsa/201603-07
Modified: 2025-04-12
CVE-2016-0981
Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and OS X and before 11.2.202.569 on Linux, Adobe AIR before 20.0.0.260, Adobe AIR SDK before 20.0.0.260, and Adobe AIR SDK & Compiler before 20.0.0.260 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-0964, CVE-2016-0965, CVE-2016-0966, CVE-2016-0967, CVE-2016-0968, CVE-2016-0969, CVE-2016-0970, CVE-2016-0972, CVE-2016-0976, CVE-2016-0977, CVE-2016-0978, CVE-2016-0979, and CVE-2016-0980.
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00025.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00027.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00029.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00030.html
- http://rhn.redhat.com/errata/RHSA-2016-0166.html
- http://www.securitytracker.com/id/1034970
- https://helpx.adobe.com/security/products/flash-player/apsb16-04.html
- https://security.gentoo.org/glsa/201603-07
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00025.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00027.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00029.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00030.html
- http://rhn.redhat.com/errata/RHSA-2016-0166.html
- http://www.securitytracker.com/id/1034970
- https://helpx.adobe.com/security/products/flash-player/apsb16-04.html
- https://security.gentoo.org/glsa/201603-07
Modified: 2025-04-12
CVE-2016-0982
Use-after-free vulnerability in Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and OS X and before 11.2.202.569 on Linux, Adobe AIR before 20.0.0.260, Adobe AIR SDK before 20.0.0.260, and Adobe AIR SDK & Compiler before 20.0.0.260 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-0973, CVE-2016-0974, CVE-2016-0975, CVE-2016-0983, and CVE-2016-0984.
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00025.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00027.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00029.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00030.html
- http://rhn.redhat.com/errata/RHSA-2016-0166.html
- http://www.securitytracker.com/id/1034970
- https://helpx.adobe.com/security/products/flash-player/apsb16-04.html
- https://security.gentoo.org/glsa/201603-07
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00025.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00027.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00029.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00030.html
- http://rhn.redhat.com/errata/RHSA-2016-0166.html
- http://www.securitytracker.com/id/1034970
- https://helpx.adobe.com/security/products/flash-player/apsb16-04.html
- https://security.gentoo.org/glsa/201603-07
Modified: 2025-04-12
CVE-2016-0983
Use-after-free vulnerability in Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and OS X and before 11.2.202.569 on Linux, Adobe AIR before 20.0.0.260, Adobe AIR SDK before 20.0.0.260, and Adobe AIR SDK & Compiler before 20.0.0.260 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-0973, CVE-2016-0974, CVE-2016-0975, CVE-2016-0982, and CVE-2016-0984.
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00025.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00027.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00029.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00030.html
- http://rhn.redhat.com/errata/RHSA-2016-0166.html
- http://www.securitytracker.com/id/1034970
- https://helpx.adobe.com/security/products/flash-player/apsb16-04.html
- https://security.gentoo.org/glsa/201603-07
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00025.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00027.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00029.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00030.html
- http://rhn.redhat.com/errata/RHSA-2016-0166.html
- http://www.securitytracker.com/id/1034970
- https://helpx.adobe.com/security/products/flash-player/apsb16-04.html
- https://security.gentoo.org/glsa/201603-07
Modified: 2025-04-12
CVE-2016-0984
Use-after-free vulnerability in Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and OS X and before 11.2.202.569 on Linux, Adobe AIR before 20.0.0.260, Adobe AIR SDK before 20.0.0.260, and Adobe AIR SDK & Compiler before 20.0.0.260 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-0973, CVE-2016-0974, CVE-2016-0975, CVE-2016-0982, and CVE-2016-0983.
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00025.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00027.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00029.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00030.html
- http://rhn.redhat.com/errata/RHSA-2016-0166.html
- http://www.securitytracker.com/id/1034970
- https://helpx.adobe.com/security/products/flash-player/apsb16-04.html
- https://security.gentoo.org/glsa/201603-07
- https://www.exploit-db.com/exploits/39462/
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00025.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00027.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00029.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00030.html
- http://rhn.redhat.com/errata/RHSA-2016-0166.html
- http://www.securitytracker.com/id/1034970
- https://helpx.adobe.com/security/products/flash-player/apsb16-04.html
- https://security.gentoo.org/glsa/201603-07
- https://www.exploit-db.com/exploits/39462/
Modified: 2025-04-12
CVE-2016-0985
Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and OS X and before 11.2.202.569 on Linux, Adobe AIR before 20.0.0.260, Adobe AIR SDK before 20.0.0.260, and Adobe AIR SDK & Compiler before 20.0.0.260 allow attackers to execute arbitrary code by leveraging an unspecified "type confusion."
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00025.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00027.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00029.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00030.html
- http://rhn.redhat.com/errata/RHSA-2016-0166.html
- http://www.securitytracker.com/id/1034970
- https://helpx.adobe.com/security/products/flash-player/apsb16-04.html
- https://security.gentoo.org/glsa/201603-07
- https://www.exploit-db.com/exploits/39461/
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00025.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00027.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00029.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00030.html
- http://rhn.redhat.com/errata/RHSA-2016-0166.html
- http://www.securitytracker.com/id/1034970
- https://helpx.adobe.com/security/products/flash-player/apsb16-04.html
- https://security.gentoo.org/glsa/201603-07
- https://www.exploit-db.com/exploits/39461/