ALT-BU-2016-2576-1
Branch sisyphus update bulletin.
Closed bugs
VA-API support patch
Closed bugs
FR: нерабочий parole в зависимостях у xfce4-full
Closed vulnerabilities
BDU:2015-00125
Уязвимость программного обеспечения Cisco ACE, позволяющая злоумышленнику перехватить сессию
BDU:2015-00126
Уязвимость программного обеспечения Cisco ASA, позволяющая злоумышленнику перехватить сессию
BDU:2015-00127
Уязвимость программного обеспечения Cisco IPS, позволяющая злоумышленнику перехватить сессию
BDU:2015-00128
Уязвимость программного обеспечения Cisco Unified Communications Manager, позволяющая злоумышленнику перехватить сессию
BDU:2015-04312
Уязвимости операционной системы SUSE Linux Enterprise, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-04313
Уязвимости операционной системы SUSE Linux Enterprise, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-05844
Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-05845
Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-05846
Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-05847
Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-05848
Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-05849
Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-05850
Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-05851
Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-05852
Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-05853
Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-05854
Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-05855
Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-07477
Уязвимость операционной системы Red Hat Enterprise Linux, позволяющая удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-07482
Уязвимость операционной системы Red Hat Enterprise Linux, позволяющая удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-07483
Уязвимость операционной системы Red Hat Enterprise Linux, позволяющая удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-07485
Уязвимость операционной системы Red Hat Enterprise Linux, позволяющая удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-09698
Уязвимости операционной системы Gentoo Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2016-00297
Уязвимость операционной системы Fedora, позволяющая нарушителю повысить свои привилегии
BDU:2016-01653
Уязвимость библиотеки OpenSSL, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2013-4450
The HTTP server in Node.js 0.10.x before 0.10.21 and 0.8.x before 0.8.26 allows remote attackers to cause a denial of service (memory and CPU consumption) by sending a large number of pipelined requests without reading the response.
- http://blog.nodejs.org/2013/10/18/node-v0-10-21-stable/
- http://blog.nodejs.org/2013/10/18/node-v0-10-21-stable/
- http://blog.nodejs.org/2013/10/18/node-v0-8-26-maintenance/
- http://blog.nodejs.org/2013/10/18/node-v0-8-26-maintenance/
- openSUSE-SU-2013:1863
- openSUSE-SU-2013:1863
- RHSA-2013:1842
- RHSA-2013:1842
- [oss-security] 20131019 Re: CVE Request: Node.js HTTP Pipelining DoS
- [oss-security] 20131019 Re: CVE Request: Node.js HTTP Pipelining DoS
- 63229
- 63229
- https://github.com/joyent/node/issues/6214
- https://github.com/joyent/node/issues/6214
- https://github.com/rapid7/metasploit-framework/pull/2548
- https://github.com/rapid7/metasploit-framework/pull/2548
- https://groups.google.com/forum/#%21topic/nodejs/NEbweYB0ei0
- https://groups.google.com/forum/#%21topic/nodejs/NEbweYB0ei0
- https://kb.juniper.net/JSA10783
- https://kb.juniper.net/JSA10783
Modified: 2024-11-21
CVE-2013-6668
Multiple unspecified vulnerabilities in Google V8 before 3.24.35.10, as used in Google Chrome before 33.0.1750.146, allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
- http://advisories.mageia.org/MGASA-2014-0516.html
- http://advisories.mageia.org/MGASA-2014-0516.html
- http://googlechromereleases.blogspot.com/2014/03/stable-channel-update.html
- http://googlechromereleases.blogspot.com/2014/03/stable-channel-update.html
- 61184
- 61184
- DSA-2883
- DSA-2883
- MDVSA-2015:142
- MDVSA-2015:142
- 65930
- 65930
- http://www-01.ibm.com/support/docview.wss?uid=swg21683389
- http://www-01.ibm.com/support/docview.wss?uid=swg21683389
- https://code.google.com/p/chromium/issues/detail?id=343964
- https://code.google.com/p/chromium/issues/detail?id=343964
- https://code.google.com/p/chromium/issues/detail?id=344186
- https://code.google.com/p/chromium/issues/detail?id=344186
- https://code.google.com/p/chromium/issues/detail?id=347909
- https://code.google.com/p/chromium/issues/detail?id=347909
- https://code.google.com/p/v8/source/detail?r=19475
- https://code.google.com/p/v8/source/detail?r=19475
- https://code.google.com/p/v8/source/detail?r=19553
- https://code.google.com/p/v8/source/detail?r=19553
- https://code.google.com/p/v8/source/detail?r=19599
- https://code.google.com/p/v8/source/detail?r=19599
Modified: 2024-11-21
CVE-2013-7452
The validator module before 1.1.0 for Node.js allows remote attackers to bypass the cross-site scripting (XSS) filter via a crafted javascript URI.
Modified: 2024-11-21
CVE-2013-7453
The validator module before 1.1.0 for Node.js allows remote attackers to bypass the cross-site scripting (XSS) filter via vectors related to UI redressing.
Modified: 2024-11-21
CVE-2013-7454
The validator module before 1.1.0 for Node.js allows remote attackers to bypass the cross-site scripting (XSS) filter via nested forbidden strings.
Modified: 2024-11-21
CVE-2014-0224
OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does not properly restrict processing of ChangeCipherSpec messages, which allows man-in-the-middle attackers to trigger use of a zero-length master key in certain OpenSSL-to-OpenSSL communications, and consequently hijack sessions or obtain sensitive information, via a crafted TLS handshake, aka the "CCS Injection" vulnerability.
- http://aix.software.ibm.com/aix/efixes/security/openssl_advisory9.asc
- http://aix.software.ibm.com/aix/efixes/security/openssl_advisory9.asc
- http://ccsinjection.lepidum.co.jp
- http://ccsinjection.lepidum.co.jp
- http://dev.mysql.com/doc/relnotes/workbench/en/wb-news-6-1-7.html
- http://dev.mysql.com/doc/relnotes/workbench/en/wb-news-6-1-7.html
- http://esupport.trendmicro.com/solution/en-US/1103813.aspx
- http://esupport.trendmicro.com/solution/en-US/1103813.aspx
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10629
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10629
- http://kb.juniper.net/InfoCenter/index?page=content&id=KB29195
- http://kb.juniper.net/InfoCenter/index?page=content&id=KB29195
- http://kb.juniper.net/InfoCenter/index?page=content&id=KB29217
- http://kb.juniper.net/InfoCenter/index?page=content&id=KB29217
- http://linux.oracle.com/errata/ELSA-2014-1053.html
- http://linux.oracle.com/errata/ELSA-2014-1053.html
- FEDORA-2014-9301
- FEDORA-2014-9301
- FEDORA-2014-9308
- FEDORA-2014-9308
- SUSE-SU-2015:0578
- SUSE-SU-2015:0578
- SUSE-SU-2015:0743
- SUSE-SU-2015:0743
- openSUSE-SU-2016:0640
- openSUSE-SU-2016:0640
- openSUSE-SU-2015:0229
- openSUSE-SU-2015:0229
- HPSBUX03046
- HPSBUX03046
- SSRT101590
- SSRT101590
- HPSBOV03047
- HPSBOV03047
- HPSBMU03053
- HPSBMU03053
- HPSBMU03058
- HPSBMU03058
- HPSBMU03057
- HPSBMU03057
- HPSBMU03056
- HPSBMU03056
- HPSBMU03055
- HPSBMU03055
- HPSBMU03051
- HPSBMU03051
- HPSBGN03050
- HPSBGN03050
- HPSBMU03065
- HPSBMU03065
- HPSBMU03070
- HPSBMU03070
- HPSBGN03068
- HPSBGN03068
- HPSBMU03071
- HPSBMU03071
- HPSBMU03074
- HPSBMU03074
- HPSBMU03078
- HPSBMU03078
- HPSBMU03062
- HPSBMU03062
- HPSBMU03089
- HPSBMU03089
- HPSBHF03088
- HPSBHF03088
- HPSBMU03094
- HPSBMU03094
- HPSBMU03101
- HPSBMU03101
- HPSBST03098
- HPSBST03098
- HPSBMU03076
- HPSBMU03076
- HPSBMU03083
- HPSBMU03083
- HPSBST03106
- HPSBST03106
- HPSBPI03107
- HPSBPI03107
- HPSBST03103
- HPSBST03103
- HPSBST03097
- HPSBST03097
- HPSBHF03145
- HPSBHF03145
- HPSBHF03052
- HPSBHF03052
- HPSBMU03216
- HPSBMU03216
- SSRT101818
- SSRT101818
- HPSBST03265
- HPSBST03265
- HPSBST03195
- HPSBST03195
- http://puppetlabs.com/security/cve/cve-2014-0224
- http://puppetlabs.com/security/cve/cve-2014-0224
- RHSA-2014:0624
- RHSA-2014:0624
- RHSA-2014:0626
- RHSA-2014:0626
- RHSA-2014:0627
- RHSA-2014:0627
- RHSA-2014:0630
- RHSA-2014:0630
- RHSA-2014:0631
- RHSA-2014:0631
- RHSA-2014:0632
- RHSA-2014:0632
- RHSA-2014:0633
- RHSA-2014:0633
- RHSA-2014:0680
- RHSA-2014:0680
- 20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities
- 20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities
- 20140607 Re: More OpenSSL issues
- 20140607 Re: More OpenSSL issues
- 58128
- 58128
- 58337
- 58337
- 58385
- 58385
- 58433
- 58433
- 58492
- 58492
- 58579
- 58579
- 58615
- 58615
- 58639
- 58639
- 58660
- 58660
- 58667
- 58667
- 58713
- 58713
- 58714
- 58714
- 58716
- 58716
- 58719
- 58719
- 58742
- 58742
- 58743
- 58743
- 58745
- 58745
- 58759
- 58759
- 58930
- 58930
- 58939
- 58939
- 58945
- 58945
- 58977
- 58977
- 59004
- 59004
- 59012
- 59012
- 59040
- 59040
- 59043
- 59043
- 59055
- 59055
- 59063
- 59063
- 59093
- 59093
- 59101
- 59101
- 59120
- 59120
- 59126
- 59126
- 59132
- 59132
- 59135
- 59135
- 59142
- 59142
- 59162
- 59162
- 59163
- 59163
- 59167
- 59167
- 59175
- 59175
- 59186
- 59186
- 59188
- 59188
- 59189
- 59189
- 59190
- 59190
- 59191
- 59191
- 59192
- 59192
- 59202
- 59202
- 59211
- 59211
- 59214
- 59214
- 59215
- 59215
- 59223
- 59223
- 59231
- 59231
- 59264
- 59264
- 59282
- 59282
- 59284
- 59284
- 59287
- 59287
- 59300
- 59300
- 59301
- 59301
- 59305
- 59305
- 59306
- 59306
- 59310
- 59310
- 59325
- 59325
- 59338
- 59338
- 59342
- 59342
- 59347
- 59347
- 59354
- 59354
- 59362
- 59362
- 59364
- 59364
- 59365
- 59365
- 59368
- 59368
- 59370
- 59370
- 59374
- 59374
- 59375
- 59375
- 59380
- 59380
- 59383
- 59383
- 59389
- 59389
- 59413
- 59413
- 59429
- 59429
- 59435
- 59435
- 59437
- 59437
- 59438
- 59438
- 59440
- 59440
- 59441
- 59441
- 59442
- 59442
- 59444
- 59444
- 59445
- 59445
- 59446
- 59446
- 59447
- 59447
- 59448
- 59448
- 59449
- 59449
- 59450
- 59450
- 59451
- 59451
- 59454
- 59454
- 59459
- 59459
- 59460
- 59460
- 59483
- 59483
- 59490
- 59490
- 59491
- 59491
- 59495
- 59495
- 59502
- 59502
- 59506
- 59506
- 59514
- 59514
- 59518
- 59518
- 59525
- 59525
- 59528
- 59528
- 59529
- 59529
- 59530
- 59530
- 59589
- 59589
- 59602
- 59602
- 59655
- 59655
- 59659
- 59659
- 59661
- 59661
- 59666
- 59666
- 59669
- 59669
- 59677
- 59677
- 59721
- 59721
- 59784
- 59784
- 59824
- 59824
- 59827
- 59827
- 59878
- 59878
- 59885
- 59885
- 59894
- 59894
- 59916
- 59916
- 59990
- 59990
- 60049
- 60049
- 60066
- 60066
- 60176
- 60176
- 60522
- 60522
- 60567
- 60567
- 60571
- 60571
- 60577
- 60577
- 60819
- 60819
- 61254
- 61254
- 61815
- 61815
- GLSA-201407-05
- GLSA-201407-05
- http://support.apple.com/kb/HT6443
- http://support.apple.com/kb/HT6443
- http://support.citrix.com/article/CTX140876
- http://support.citrix.com/article/CTX140876
- http://support.f5.com/kb/en-us/solutions/public/15000/300/sol15325.html
- http://support.f5.com/kb/en-us/solutions/public/15000/300/sol15325.html
- 20140605 Multiple Vulnerabilities in OpenSSL Affecting Cisco Products
- 20140605 Multiple Vulnerabilities in OpenSSL Affecting Cisco Products
- http://www.blackberry.com/btsc/KB36051
- http://www.blackberry.com/btsc/KB36051
- http://www.fortiguard.com/advisory/FG-IR-14-018/
- http://www.fortiguard.com/advisory/FG-IR-14-018/
- http://www.f-secure.com/en/web/labs_global/fsc-2014-6
- http://www.f-secure.com/en/web/labs_global/fsc-2014-6
- http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-345106.htm
- http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-345106.htm
- http://www.ibm.com/support/docview.wss?uid=isg3T1020948
- http://www.ibm.com/support/docview.wss?uid=isg3T1020948
- http://www.ibm.com/support/docview.wss?uid=ssg1S1004678
- http://www.ibm.com/support/docview.wss?uid=ssg1S1004678
- IT02314
- IT02314
- http://www.ibm.com/support/docview.wss?uid=swg21676356
- http://www.ibm.com/support/docview.wss?uid=swg21676356
- http://www.ibm.com/support/docview.wss?uid=swg21676793
- http://www.ibm.com/support/docview.wss?uid=swg21676793
- http://www.ibm.com/support/docview.wss?uid=swg21676877
- http://www.ibm.com/support/docview.wss?uid=swg21676877
- http://www.ibm.com/support/docview.wss?uid=swg24037783
- http://www.ibm.com/support/docview.wss?uid=swg24037783
- http://www.innominate.com/data/downloads/manuals/mdm_1.5.2.1_Release_Notes.pdf
- http://www.innominate.com/data/downloads/manuals/mdm_1.5.2.1_Release_Notes.pdf
- VU#978508
- VU#978508
- http://www.kerio.com/support/kerio-control/release-history
- http://www.kerio.com/support/kerio-control/release-history
- MDVSA-2014:105
- MDVSA-2014:105
- MDVSA-2014:106
- MDVSA-2014:106
- MDVSA-2015:062
- MDVSA-2015:062
- http://www.novell.com/support/kb/doc.php?id=7015264
- http://www.novell.com/support/kb/doc.php?id=7015264
- http://www.novell.com/support/kb/doc.php?id=7015300
- http://www.novell.com/support/kb/doc.php?id=7015300
- http://www.openssl.org/news/secadv_20140605.txt
- http://www.openssl.org/news/secadv_20140605.txt
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
- http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
- http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html
- http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html
- http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html
- http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html
- 20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities
- 20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities
- 1031032
- 1031032
- 1031594
- 1031594
- http://www.splunk.com/view/SP-CAAAM2D
- http://www.splunk.com/view/SP-CAAAM2D
- http://www.tenable.com/blog/nessus-527-and-pvs-403-are-available-for-download
- http://www.tenable.com/blog/nessus-527-and-pvs-403-are-available-for-download
- http://www.vmware.com/security/advisories/VMSA-2014-0006.html
- http://www.vmware.com/security/advisories/VMSA-2014-0006.html
- http://www.vmware.com/security/advisories/VMSA-2014-0012.html
- http://www.vmware.com/security/advisories/VMSA-2014-0012.html
- http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0
- http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0
- http://www-01.ibm.com/support/docview.wss?uid=isg400001841
- http://www-01.ibm.com/support/docview.wss?uid=isg400001841
- http://www-01.ibm.com/support/docview.wss?uid=isg400001843
- http://www-01.ibm.com/support/docview.wss?uid=isg400001843
- http://www-01.ibm.com/support/docview.wss?uid=nas8N1020163
- http://www-01.ibm.com/support/docview.wss?uid=nas8N1020163
- http://www-01.ibm.com/support/docview.wss?uid=nas8N1020172
- http://www-01.ibm.com/support/docview.wss?uid=nas8N1020172
- http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004690
- http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004690
- IV61506
- IV61506
- http://www-01.ibm.com/support/docview.wss?uid=swg21673137
- http://www-01.ibm.com/support/docview.wss?uid=swg21673137
- http://www-01.ibm.com/support/docview.wss?uid=swg21675626
- http://www-01.ibm.com/support/docview.wss?uid=swg21675626
- http://www-01.ibm.com/support/docview.wss?uid=swg21675821
- http://www-01.ibm.com/support/docview.wss?uid=swg21675821
- http://www-01.ibm.com/support/docview.wss?uid=swg21676035
- http://www-01.ibm.com/support/docview.wss?uid=swg21676035
- http://www-01.ibm.com/support/docview.wss?uid=swg21676062
- http://www-01.ibm.com/support/docview.wss?uid=swg21676062
- http://www-01.ibm.com/support/docview.wss?uid=swg21676071
- http://www-01.ibm.com/support/docview.wss?uid=swg21676071
- http://www-01.ibm.com/support/docview.wss?uid=swg21676333
- http://www-01.ibm.com/support/docview.wss?uid=swg21676333
- http://www-01.ibm.com/support/docview.wss?uid=swg21676334
- http://www-01.ibm.com/support/docview.wss?uid=swg21676334
- http://www-01.ibm.com/support/docview.wss?uid=swg21676419
- http://www-01.ibm.com/support/docview.wss?uid=swg21676419
- http://www-01.ibm.com/support/docview.wss?uid=swg21676478
- http://www-01.ibm.com/support/docview.wss?uid=swg21676478
- http://www-01.ibm.com/support/docview.wss?uid=swg21676496
- http://www-01.ibm.com/support/docview.wss?uid=swg21676496
- http://www-01.ibm.com/support/docview.wss?uid=swg21676501
- http://www-01.ibm.com/support/docview.wss?uid=swg21676501
- http://www-01.ibm.com/support/docview.wss?uid=swg21676529
- http://www-01.ibm.com/support/docview.wss?uid=swg21676529
- http://www-01.ibm.com/support/docview.wss?uid=swg21676536
- http://www-01.ibm.com/support/docview.wss?uid=swg21676536
- http://www-01.ibm.com/support/docview.wss?uid=swg21676615
- http://www-01.ibm.com/support/docview.wss?uid=swg21676615
- http://www-01.ibm.com/support/docview.wss?uid=swg21676644
- http://www-01.ibm.com/support/docview.wss?uid=swg21676644
- http://www-01.ibm.com/support/docview.wss?uid=swg21676655
- http://www-01.ibm.com/support/docview.wss?uid=swg21676655
- http://www-01.ibm.com/support/docview.wss?uid=swg21676786
- http://www-01.ibm.com/support/docview.wss?uid=swg21676786
- http://www-01.ibm.com/support/docview.wss?uid=swg21676833
- http://www-01.ibm.com/support/docview.wss?uid=swg21676833
- http://www-01.ibm.com/support/docview.wss?uid=swg21676845
- http://www-01.ibm.com/support/docview.wss?uid=swg21676845
- http://www-01.ibm.com/support/docview.wss?uid=swg21676879
- http://www-01.ibm.com/support/docview.wss?uid=swg21676879
- http://www-01.ibm.com/support/docview.wss?uid=swg21676889
- http://www-01.ibm.com/support/docview.wss?uid=swg21676889
- http://www-01.ibm.com/support/docview.wss?uid=swg21677080
- http://www-01.ibm.com/support/docview.wss?uid=swg21677080
- http://www-01.ibm.com/support/docview.wss?uid=swg21677131
- http://www-01.ibm.com/support/docview.wss?uid=swg21677131
- http://www-01.ibm.com/support/docview.wss?uid=swg21677390
- http://www-01.ibm.com/support/docview.wss?uid=swg21677390
- http://www-01.ibm.com/support/docview.wss?uid=swg21677527
- http://www-01.ibm.com/support/docview.wss?uid=swg21677527
- http://www-01.ibm.com/support/docview.wss?uid=swg21677567
- http://www-01.ibm.com/support/docview.wss?uid=swg21677567
- http://www-01.ibm.com/support/docview.wss?uid=swg21677695
- http://www-01.ibm.com/support/docview.wss?uid=swg21677695
- http://www-01.ibm.com/support/docview.wss?uid=swg21677828
- http://www-01.ibm.com/support/docview.wss?uid=swg21677828
- http://www-01.ibm.com/support/docview.wss?uid=swg21677836
- http://www-01.ibm.com/support/docview.wss?uid=swg21677836
- http://www-01.ibm.com/support/docview.wss?uid=swg21678167
- http://www-01.ibm.com/support/docview.wss?uid=swg21678167
- http://www-01.ibm.com/support/docview.wss?uid=swg21678233
- http://www-01.ibm.com/support/docview.wss?uid=swg21678233
- http://www-01.ibm.com/support/docview.wss?uid=swg21678289
- http://www-01.ibm.com/support/docview.wss?uid=swg21678289
- http://www-01.ibm.com/support/docview.wss?uid=swg21683332
- http://www-01.ibm.com/support/docview.wss?uid=swg21683332
- http://www-01.ibm.com/support/docview.wss?uid=swg24037727
- http://www-01.ibm.com/support/docview.wss?uid=swg24037727
- http://www-01.ibm.com/support/docview.wss?uid=swg24037729
- http://www-01.ibm.com/support/docview.wss?uid=swg24037729
- http://www-01.ibm.com/support/docview.wss?uid=swg24037730
- http://www-01.ibm.com/support/docview.wss?uid=swg24037730
- http://www-01.ibm.com/support/docview.wss?uid=swg24037731
- http://www-01.ibm.com/support/docview.wss?uid=swg24037731
- http://www-01.ibm.com/support/docview.wss?uid=swg24037732
- http://www-01.ibm.com/support/docview.wss?uid=swg24037732
- http://www-01.ibm.com/support/docview.wss?uid=swg24037761
- http://www-01.ibm.com/support/docview.wss?uid=swg24037761
- http://www-01.ibm.com/support/docview.wss?uid=swg24037870
- http://www-01.ibm.com/support/docview.wss?uid=swg24037870
- http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=6060&myns=phmc&mync=E
- http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=6060&myns=phmc&mync=E
- http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=6061&myns=phmc&mync=E
- http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=6061&myns=phmc&mync=E
- http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5095737
- http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5095737
- http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095740
- http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095740
- http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095754
- http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095754
- http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095755
- http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095755
- http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095756
- http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095756
- http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095757
- http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095757
- https://access.redhat.com/site/blogs/766093/posts/908133
- https://access.redhat.com/site/blogs/766093/posts/908133
- https://blogs.oracle.com/sunsecurity/entry/cve_2014_0224_cryptographic_issues
- https://blogs.oracle.com/sunsecurity/entry/cve_2014_0224_cryptographic_issues
- https://blogs.oracle.com/sunsecurity/entry/cve_2014_0224_cryptographic_issues1
- https://blogs.oracle.com/sunsecurity/entry/cve_2014_0224_cryptographic_issues1
- https://bugzilla.redhat.com/show_bug.cgi?id=1103586
- https://bugzilla.redhat.com/show_bug.cgi?id=1103586
- https://cert-portal.siemens.com/productcert/pdf/ssa-234763.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-234763.pdf
- https://discussions.nessus.org/thread/7517
- https://discussions.nessus.org/thread/7517
- https://filezilla-project.org/versions.php?type=server
- https://filezilla-project.org/versions.php?type=server
- https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=bc8923b1ec9c467755cd86f7848c50ee8812e441
- https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=bc8923b1ec9c467755cd86f7848c50ee8812e441
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05301946
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05301946
- https://kb.bluecoat.com/index?page=content&id=SA80
- https://kb.bluecoat.com/index?page=content&id=SA80
- https://kc.mcafee.com/corporate/index?page=content&id=SB10075
- https://kc.mcafee.com/corporate/index?page=content&id=SB10075
- https://www.arista.com/en/support/advisories-notices/security-advisories/941-security-advisory-0005
- https://www.arista.com/en/support/advisories-notices/security-advisories/941-security-advisory-0005
- https://www.ibm.com/support/docview.wss?uid=ssg1S1004670
- https://www.ibm.com/support/docview.wss?uid=ssg1S1004670
- https://www.ibm.com/support/docview.wss?uid=ssg1S1004671
- https://www.ibm.com/support/docview.wss?uid=ssg1S1004671
- https://www.imperialviolet.org/2014/06/05/earlyccs.html
- https://www.imperialviolet.org/2014/06/05/earlyccs.html
- https://www.intersectalliance.com/wp-content/uploads/release_notes/ReleaseNotes_for_SNARE_for_MSSQL.pdf
- https://www.intersectalliance.com/wp-content/uploads/release_notes/ReleaseNotes_for_SNARE_for_MSSQL.pdf
- https://www.intersectalliance.com/wp-content/uploads/release_notes/ReleaseNotes_for_Snare_for_Windows.pdf
- https://www.intersectalliance.com/wp-content/uploads/release_notes/ReleaseNotes_for_Snare_for_Windows.pdf
- https://www.novell.com/support/kb/doc.php?id=7015271
- https://www.novell.com/support/kb/doc.php?id=7015271
Modified: 2024-11-21
CVE-2014-5256
Node.js 0.8 before 0.8.28 and 0.10 before 0.10.30 does not consider the possibility of recursive processing that triggers V8 garbage collection in conjunction with a V8 interrupt, which allows remote attackers to cause a denial of service (memory corruption and application crash) via deep JSON objects whose parsing lets this interrupt mask an overflow of the program stack.
- http://advisories.mageia.org/MGASA-2014-0516.html
- http://advisories.mageia.org/MGASA-2014-0516.html
- http://blog.nodejs.org/2014/07/31/v8-memory-corruption-stack-overflow/
- http://blog.nodejs.org/2014/07/31/v8-memory-corruption-stack-overflow/
- 61260
- 61260
- MDVSA-2015:142
- MDVSA-2015:142
- http://www-01.ibm.com/support/docview.wss?uid=swg21684769
- http://www-01.ibm.com/support/docview.wss?uid=swg21684769
- https://github.com/joyent/node/commit/530af9cb8e700e7596b3ec812bad123c9fa06356
- https://github.com/joyent/node/commit/530af9cb8e700e7596b3ec812bad123c9fa06356
Modified: 2024-11-21
CVE-2014-9748
The uv_rwlock_t fallback implementation for Windows XP and Server 2003 in libuv before 1.7.4 does not properly prevent threads from releasing the locks of other threads, which allows attackers to cause a denial of service (deadlock) or possibly have unspecified other impact by leveraging a race condition.
- https://github.com/libuv/libuv/issues/515
- https://github.com/libuv/libuv/issues/515
- https://github.com/libuv/libuv/pull/516
- https://github.com/libuv/libuv/pull/516
- https://github.com/nodejs/node/pull/2723
- https://github.com/nodejs/node/pull/2723
- https://groups.google.com/forum/#%21msg/libuv/KyNnGEXR0OA/NWb605ev2LUJ
- https://groups.google.com/forum/#%21msg/libuv/KyNnGEXR0OA/NWb605ev2LUJ
- https://groups.google.com/forum/#%21topic/libuv/WO2cl9zasN8
- https://groups.google.com/forum/#%21topic/libuv/WO2cl9zasN8
Modified: 2024-11-21
CVE-2014-9772
The validator package before 2.0.0 for Node.js allows remote attackers to bypass the cross-site scripting (XSS) filter via hex-encoded characters.
Modified: 2024-11-21
CVE-2015-0278
libuv before 0.10.34 does not properly drop group privileges, which allows context-dependent attackers to gain privileges via unspecified vectors.
- http://advisories.mageia.org/MGASA-2015-0186.html
- http://advisories.mageia.org/MGASA-2015-0186.html
- MDVSA-2015:228
- MDVSA-2015:228
- https://github.com/libuv/libuv/commit/66ab38918c911bcff025562cf06237d7fedaba0c
- https://github.com/libuv/libuv/commit/66ab38918c911bcff025562cf06237d7fedaba0c
- https://github.com/libuv/libuv/pull/215
- https://github.com/libuv/libuv/pull/215
- https://groups.google.com/forum/#%21msg/libuv/0JZxwLMtsMI/jraczskYWWQJ
- https://groups.google.com/forum/#%21msg/libuv/0JZxwLMtsMI/jraczskYWWQJ
- FEDORA-2015-2313
- FEDORA-2015-2313
- GLSA-201611-10
- GLSA-201611-10
Modified: 2024-11-21
CVE-2015-3194
crypto/rsa/rsa_ameth.c in OpenSSL 1.0.1 before 1.0.1q and 1.0.2 before 1.0.2e allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an RSA PSS ASN.1 signature that lacks a mask generation function parameter.
- http://fortiguard.com/advisory/openssl-advisory-december-2015
- http://fortiguard.com/advisory/openssl-advisory-december-2015
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10761
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10761
- FEDORA-2015-d87d60b9a9
- FEDORA-2015-d87d60b9a9
- openSUSE-SU-2016:0637
- openSUSE-SU-2016:0637
- openSUSE-SU-2016:1332
- openSUSE-SU-2016:1332
- openSUSE-SU-2015:2288
- openSUSE-SU-2015:2288
- openSUSE-SU-2015:2289
- openSUSE-SU-2015:2289
- openSUSE-SU-2015:2318
- openSUSE-SU-2015:2318
- HPSBGN03536
- HPSBGN03536
- http://openssl.org/news/secadv/20151203.txt
- http://openssl.org/news/secadv/20151203.txt
- RHSA-2015:2617
- RHSA-2015:2617
- RHSA-2016:2957
- RHSA-2016:2957
- 20151204 Multiple Vulnerabilities in OpenSSL (December 2015) Affecting Cisco Products
- 20151204 Multiple Vulnerabilities in OpenSSL (December 2015) Affecting Cisco Products
- DSA-3413
- DSA-3413
- http://www.fortiguard.com/advisory/openssl-advisory-december-2015
- http://www.fortiguard.com/advisory/openssl-advisory-december-2015
- http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
- http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
- http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- 78623
- 78623
- 91787
- 91787
- 1034294
- 1034294
- SSA:2015-349-04
- SSA:2015-349-04
- USN-2830-1
- USN-2830-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1288320
- https://bugzilla.redhat.com/show_bug.cgi?id=1288320
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
- https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=c394a488942387246653833359a5c94b5832674e
- https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=c394a488942387246653833359a5c94b5832674e
- https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=d8541d7e9e63bf5f343af24644046c8d96498c17
- https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=d8541d7e9e63bf5f343af24644046c8d96498c17
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04944173
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04944173
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05111017
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05111017
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05131085
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05131085
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05157667
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05157667
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05398322
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05398322
- https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40100
- https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40100
Modified: 2024-11-21
CVE-2015-5380
The Utf8DecoderBase::WriteUtf16Slow function in unicode-decoder.cc in Google V8, as used in Node.js before 0.12.6, io.js before 1.8.3 and 2.x before 2.3.3, and other products, does not verify that there is memory available for a UTF-16 surrogate pair, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a crafted byte sequence.
- http://blog.nodejs.org/2015/07/03/node-v0-12-6-stable/
- http://blog.nodejs.org/2015/07/03/node-v0-12-6-stable/
- 75556
- 75556
- https://codereview.chromium.org/1226493003
- https://codereview.chromium.org/1226493003
- https://github.com/joyent/node/issues/25583
- https://github.com/joyent/node/issues/25583
- https://medium.com/%40iojs/important-security-upgrades-for-node-js-and-io-js-8ac14ece5852
- https://medium.com/%40iojs/important-security-upgrades-for-node-js-and-io-js-8ac14ece5852
Modified: 2024-11-21
CVE-2015-8856
Cross-site scripting (XSS) vulnerability in the serve-index package before 1.6.3 for Node.js allows remote attackers to inject arbitrary web script or HTML via a crafted file or directory name.
Modified: 2024-11-21
CVE-2015-8859
The send package before 0.11.1 for Node.js allows attackers to obtain the root path via unspecified vectors.
Modified: 2024-11-21
CVE-2015-8860
The tar package before 2.0.0 for Node.js allows remote attackers to write to arbitrary files via a symlink attack in an archive.
Modified: 2024-11-21
CVE-2017-16024
The sync-exec module is used to simulate child_process.execSync in node versions <0.11.9. Sync-exec uses tmp directories as a buffer before returning values. Other users on the server have read access to the tmp directory, possibly allowing an attacker on the server to obtain confidential information from the buffer/tmp file, while it exists.
- https://cwe.mitre.org/data/definitions/377.html
- https://cwe.mitre.org/data/definitions/377.html
- https://github.com/gvarsanyi/sync-exec/issues/17
- https://github.com/gvarsanyi/sync-exec/issues/17
- https://nodesecurity.io/advisories/310
- https://nodesecurity.io/advisories/310
- https://www.owasp.org/index.php/Insecure_Temporary_File
- https://www.owasp.org/index.php/Insecure_Temporary_File
Closed bugs
Собрать версию 4.2.6 LTS
Closed vulnerabilities
Modified: 2024-11-21
CVE-2015-7511
Libgcrypt before 1.6.5 does not properly perform elliptic-point curve multiplication during decryption, which makes it easier for physically proximate attackers to extract ECDH keys by measuring electromagnetic emanations.
- openSUSE-SU-2016:1227
- openSUSE-SU-2016:1227
- http://www.cs.tau.ac.IL/~tromer/ecdh/
- http://www.cs.tau.ac.IL/~tromer/ecdh/
- DSA-3474
- DSA-3474
- DSA-3478
- DSA-3478
- 83253
- 83253
- USN-2896-1
- USN-2896-1
- FEDORA-2016-83cd045bcc
- FEDORA-2016-83cd045bcc
- [gnupg-announce] 20160209 [Announce] Libgcrypt 1.6.5 with security fix released
- [gnupg-announce] 20160209 [Announce] Libgcrypt 1.6.5 with security fix released
- GLSA-201610-04
- GLSA-201610-04
Package adobe-flash-player updated to version 11-alt59 for branch sisyphus in task 158591.
Closed vulnerabilities
BDU:2016-00414
Уязвимость программных платформ Adobe Integrated Runtime и Flash Player, позволяющая нарушителю выполнить произвольный код
BDU:2016-00457
Уязвимость программных платформ Adobe Integrated Runtime и Flash Player, позволяющая нарушителю выполнить произвольный код
BDU:2016-00458
Уязвимость программных платформ Adobe Integrated Runtime и Flash Player, позволяющая нарушителю выполнить произвольный код
BDU:2016-00459
Уязвимость программных платформ Adobe Integrated Runtime и Flash Player, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код
BDU:2016-00460
Уязвимость программных платформ Adobe Integrated Runtime и Flash Player, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код
BDU:2016-00461
Уязвимость программных платформ Adobe Integrated Runtime и Flash Player, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код
BDU:2016-00462
Уязвимость программных платформ Adobe Integrated Runtime и Flash Player, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код
BDU:2016-00463
Уязвимость программных платформ Adobe Integrated Runtime и Flash Player, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код
BDU:2016-00464
Уязвимость программных платформ Adobe Integrated Runtime и Flash Player, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код
BDU:2016-00465
Уязвимость программных платформ Adobe Integrated Runtime и Flash Player, позволяющая нарушителю выполнить произвольный код
BDU:2016-00466
Уязвимость программных платформ Adobe Integrated Runtime и Flash Player, позволяющая нарушителю выполнить произвольный код
BDU:2016-00467
Уязвимость программных платформ Adobe Integrated Runtime и Flash Player, позволяющая нарушителю выполнить произвольный код
BDU:2016-00468
Уязвимость программных платформ Adobe Integrated Runtime и Flash Player, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код
BDU:2016-00469
Уязвимость программных платформ Adobe Integrated Runtime и Flash Player, позволяющая нарушителю выполнить произвольный код
BDU:2016-00470
Уязвимость программных платформ Adobe Integrated Runtime и Flash Player, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код
BDU:2016-00471
Уязвимость программных платформ Adobe Integrated Runtime и Flash Player, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код
BDU:2016-00472
Уязвимость программных платформ Adobe Integrated Runtime и Flash Player, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код
BDU:2016-00473
Уязвимость программных платформ Adobe Integrated Runtime и Flash Player, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код
BDU:2016-00474
Уязвимость программных платформ Adobe Integrated Runtime и Flash Player, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код
BDU:2016-00475
Уязвимость программных платформ Adobe Integrated Runtime и Flash Player, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код
BDU:2016-00476
Уязвимость программных платформ Adobe Integrated Runtime и Flash Player, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код
BDU:2016-00537
Уязвимость программных платформ Adobe Integrated Runtime и Flash Player, позволяющая нарушителю выполнить произвольный код
Modified: 2024-11-21
CVE-2016-0964
Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and OS X and before 11.2.202.569 on Linux, Adobe AIR before 20.0.0.260, Adobe AIR SDK before 20.0.0.260, and Adobe AIR SDK & Compiler before 20.0.0.260 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-0965, CVE-2016-0966, CVE-2016-0967, CVE-2016-0968, CVE-2016-0969, CVE-2016-0970, CVE-2016-0972, CVE-2016-0976, CVE-2016-0977, CVE-2016-0978, CVE-2016-0979, CVE-2016-0980, and CVE-2016-0981.
- SUSE-SU-2016:0398
- SUSE-SU-2016:0398
- SUSE-SU-2016:0400
- SUSE-SU-2016:0400
- openSUSE-SU-2016:0412
- openSUSE-SU-2016:0412
- openSUSE-SU-2016:0415
- openSUSE-SU-2016:0415
- RHSA-2016:0166
- RHSA-2016:0166
- 1034970
- 1034970
- https://helpx.adobe.com/security/products/flash-player/apsb16-04.html
- https://helpx.adobe.com/security/products/flash-player/apsb16-04.html
- GLSA-201603-07
- GLSA-201603-07
- 39467
- 39467
Modified: 2024-11-21
CVE-2016-0965
Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and OS X and before 11.2.202.569 on Linux, Adobe AIR before 20.0.0.260, Adobe AIR SDK before 20.0.0.260, and Adobe AIR SDK & Compiler before 20.0.0.260 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-0964, CVE-2016-0966, CVE-2016-0967, CVE-2016-0968, CVE-2016-0969, CVE-2016-0970, CVE-2016-0972, CVE-2016-0976, CVE-2016-0977, CVE-2016-0978, CVE-2016-0979, CVE-2016-0980, and CVE-2016-0981.
- SUSE-SU-2016:0398
- SUSE-SU-2016:0398
- SUSE-SU-2016:0400
- SUSE-SU-2016:0400
- openSUSE-SU-2016:0412
- openSUSE-SU-2016:0412
- openSUSE-SU-2016:0415
- openSUSE-SU-2016:0415
- RHSA-2016:0166
- RHSA-2016:0166
- 1034970
- 1034970
- https://helpx.adobe.com/security/products/flash-player/apsb16-04.html
- https://helpx.adobe.com/security/products/flash-player/apsb16-04.html
- GLSA-201603-07
- GLSA-201603-07
- 39460
- 39460
Modified: 2024-11-21
CVE-2016-0966
Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and OS X and before 11.2.202.569 on Linux, Adobe AIR before 20.0.0.260, Adobe AIR SDK before 20.0.0.260, and Adobe AIR SDK & Compiler before 20.0.0.260 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-0964, CVE-2016-0965, CVE-2016-0967, CVE-2016-0968, CVE-2016-0969, CVE-2016-0970, CVE-2016-0972, CVE-2016-0976, CVE-2016-0977, CVE-2016-0978, CVE-2016-0979, CVE-2016-0980, and CVE-2016-0981.
- SUSE-SU-2016:0398
- SUSE-SU-2016:0398
- SUSE-SU-2016:0400
- SUSE-SU-2016:0400
- openSUSE-SU-2016:0412
- openSUSE-SU-2016:0412
- openSUSE-SU-2016:0415
- openSUSE-SU-2016:0415
- RHSA-2016:0166
- RHSA-2016:0166
- 1034970
- 1034970
- https://helpx.adobe.com/security/products/flash-player/apsb16-04.html
- https://helpx.adobe.com/security/products/flash-player/apsb16-04.html
- GLSA-201603-07
- GLSA-201603-07
Modified: 2024-11-21
CVE-2016-0967
Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and OS X and before 11.2.202.569 on Linux, Adobe AIR before 20.0.0.260, Adobe AIR SDK before 20.0.0.260, and Adobe AIR SDK & Compiler before 20.0.0.260 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-0964, CVE-2016-0965, CVE-2016-0966, CVE-2016-0968, CVE-2016-0969, CVE-2016-0970, CVE-2016-0972, CVE-2016-0976, CVE-2016-0977, CVE-2016-0978, CVE-2016-0979, CVE-2016-0980, and CVE-2016-0981.
- SUSE-SU-2016:0398
- SUSE-SU-2016:0398
- SUSE-SU-2016:0400
- SUSE-SU-2016:0400
- openSUSE-SU-2016:0412
- openSUSE-SU-2016:0412
- openSUSE-SU-2016:0415
- openSUSE-SU-2016:0415
- RHSA-2016:0166
- RHSA-2016:0166
- 1034970
- 1034970
- https://helpx.adobe.com/security/products/flash-player/apsb16-04.html
- https://helpx.adobe.com/security/products/flash-player/apsb16-04.html
- GLSA-201603-07
- GLSA-201603-07
- 39466
- 39466
Modified: 2024-11-21
CVE-2016-0968
Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and OS X and before 11.2.202.569 on Linux, Adobe AIR before 20.0.0.260, Adobe AIR SDK before 20.0.0.260, and Adobe AIR SDK & Compiler before 20.0.0.260 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-0964, CVE-2016-0965, CVE-2016-0966, CVE-2016-0967, CVE-2016-0969, CVE-2016-0970, CVE-2016-0972, CVE-2016-0976, CVE-2016-0977, CVE-2016-0978, CVE-2016-0979, CVE-2016-0980, and CVE-2016-0981.
- SUSE-SU-2016:0398
- SUSE-SU-2016:0398
- SUSE-SU-2016:0400
- SUSE-SU-2016:0400
- openSUSE-SU-2016:0412
- openSUSE-SU-2016:0412
- openSUSE-SU-2016:0415
- openSUSE-SU-2016:0415
- RHSA-2016:0166
- RHSA-2016:0166
- 1034970
- 1034970
- https://helpx.adobe.com/security/products/flash-player/apsb16-04.html
- https://helpx.adobe.com/security/products/flash-player/apsb16-04.html
- GLSA-201603-07
- GLSA-201603-07
Modified: 2024-11-21
CVE-2016-0969
Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and OS X and before 11.2.202.569 on Linux, Adobe AIR before 20.0.0.260, Adobe AIR SDK before 20.0.0.260, and Adobe AIR SDK & Compiler before 20.0.0.260 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-0964, CVE-2016-0965, CVE-2016-0966, CVE-2016-0967, CVE-2016-0968, CVE-2016-0970, CVE-2016-0972, CVE-2016-0976, CVE-2016-0977, CVE-2016-0978, CVE-2016-0979, CVE-2016-0980, and CVE-2016-0981.
- SUSE-SU-2016:0398
- SUSE-SU-2016:0398
- SUSE-SU-2016:0400
- SUSE-SU-2016:0400
- openSUSE-SU-2016:0412
- openSUSE-SU-2016:0412
- openSUSE-SU-2016:0415
- openSUSE-SU-2016:0415
- RHSA-2016:0166
- RHSA-2016:0166
- 1034970
- 1034970
- https://helpx.adobe.com/security/products/flash-player/apsb16-04.html
- https://helpx.adobe.com/security/products/flash-player/apsb16-04.html
- GLSA-201603-07
- GLSA-201603-07
Modified: 2024-11-21
CVE-2016-0970
Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and OS X and before 11.2.202.569 on Linux, Adobe AIR before 20.0.0.260, Adobe AIR SDK before 20.0.0.260, and Adobe AIR SDK & Compiler before 20.0.0.260 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-0964, CVE-2016-0965, CVE-2016-0966, CVE-2016-0967, CVE-2016-0968, CVE-2016-0969, CVE-2016-0972, CVE-2016-0976, CVE-2016-0977, CVE-2016-0978, CVE-2016-0979, CVE-2016-0980, and CVE-2016-0981.
- SUSE-SU-2016:0398
- SUSE-SU-2016:0398
- SUSE-SU-2016:0400
- SUSE-SU-2016:0400
- openSUSE-SU-2016:0412
- openSUSE-SU-2016:0412
- openSUSE-SU-2016:0415
- openSUSE-SU-2016:0415
- RHSA-2016:0166
- RHSA-2016:0166
- 1034970
- 1034970
- https://helpx.adobe.com/security/products/flash-player/apsb16-04.html
- https://helpx.adobe.com/security/products/flash-player/apsb16-04.html
- GLSA-201603-07
- GLSA-201603-07
Modified: 2024-11-21
CVE-2016-0971
Heap-based buffer overflow in Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and OS X and before 11.2.202.569 on Linux, Adobe AIR before 20.0.0.260, Adobe AIR SDK before 20.0.0.260, and Adobe AIR SDK & Compiler before 20.0.0.260 allows attackers to execute arbitrary code via unspecified vectors.
- SUSE-SU-2016:0398
- SUSE-SU-2016:0398
- SUSE-SU-2016:0400
- SUSE-SU-2016:0400
- openSUSE-SU-2016:0412
- openSUSE-SU-2016:0412
- openSUSE-SU-2016:0415
- openSUSE-SU-2016:0415
- RHSA-2016:0166
- RHSA-2016:0166
- 1034970
- 1034970
- https://helpx.adobe.com/security/products/flash-player/apsb16-04.html
- https://helpx.adobe.com/security/products/flash-player/apsb16-04.html
- GLSA-201603-07
- GLSA-201603-07
- 39465
- 39465
Modified: 2024-11-21
CVE-2016-0972
Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and OS X and before 11.2.202.569 on Linux, Adobe AIR before 20.0.0.260, Adobe AIR SDK before 20.0.0.260, and Adobe AIR SDK & Compiler before 20.0.0.260 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-0964, CVE-2016-0965, CVE-2016-0966, CVE-2016-0967, CVE-2016-0968, CVE-2016-0969, CVE-2016-0970, CVE-2016-0976, CVE-2016-0977, CVE-2016-0978, CVE-2016-0979, CVE-2016-0980, and CVE-2016-0981.
- SUSE-SU-2016:0398
- SUSE-SU-2016:0398
- SUSE-SU-2016:0400
- SUSE-SU-2016:0400
- openSUSE-SU-2016:0412
- openSUSE-SU-2016:0412
- openSUSE-SU-2016:0415
- openSUSE-SU-2016:0415
- RHSA-2016:0166
- RHSA-2016:0166
- 1034970
- 1034970
- https://helpx.adobe.com/security/products/flash-player/apsb16-04.html
- https://helpx.adobe.com/security/products/flash-player/apsb16-04.html
- GLSA-201603-07
- GLSA-201603-07
Modified: 2024-11-21
CVE-2016-0973
Use-after-free vulnerability in the URLRequest object implementation in Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and OS X and before 11.2.202.569 on Linux, Adobe AIR before 20.0.0.260, Adobe AIR SDK before 20.0.0.260, and Adobe AIR SDK & Compiler before 20.0.0.260 allows attackers to execute arbitrary code via a URLLoader.load call, a different vulnerability than CVE-2016-0974, CVE-2016-0975, CVE-2016-0982, CVE-2016-0983, and CVE-2016-0984.
- SUSE-SU-2016:0398
- SUSE-SU-2016:0398
- SUSE-SU-2016:0400
- SUSE-SU-2016:0400
- openSUSE-SU-2016:0412
- openSUSE-SU-2016:0412
- openSUSE-SU-2016:0415
- openSUSE-SU-2016:0415
- RHSA-2016:0166
- RHSA-2016:0166
- 1034970
- 1034970
- http://zerodayinitiative.com/advisories/ZDI-16-161/
- http://zerodayinitiative.com/advisories/ZDI-16-161/
- https://helpx.adobe.com/security/products/flash-player/apsb16-04.html
- https://helpx.adobe.com/security/products/flash-player/apsb16-04.html
- GLSA-201603-07
- GLSA-201603-07
Modified: 2024-11-21
CVE-2016-0974
Use-after-free vulnerability in Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and OS X and before 11.2.202.569 on Linux, Adobe AIR before 20.0.0.260, Adobe AIR SDK before 20.0.0.260, and Adobe AIR SDK & Compiler before 20.0.0.260 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-0973, CVE-2016-0975, CVE-2016-0982, CVE-2016-0983, and CVE-2016-0984.
- SUSE-SU-2016:0398
- SUSE-SU-2016:0398
- SUSE-SU-2016:0400
- SUSE-SU-2016:0400
- openSUSE-SU-2016:0412
- openSUSE-SU-2016:0412
- openSUSE-SU-2016:0415
- openSUSE-SU-2016:0415
- RHSA-2016:0166
- RHSA-2016:0166
- 1034970
- 1034970
- https://helpx.adobe.com/security/products/flash-player/apsb16-04.html
- https://helpx.adobe.com/security/products/flash-player/apsb16-04.html
- GLSA-201603-07
- GLSA-201603-07
- 39463
- 39463
Modified: 2024-11-21
CVE-2016-0975
Use-after-free vulnerability in the instanceof function in Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and OS X and before 11.2.202.569 on Linux, Adobe AIR before 20.0.0.260, Adobe AIR SDK before 20.0.0.260, and Adobe AIR SDK & Compiler before 20.0.0.260 allows attackers to execute arbitrary code by leveraging improper reference handling, a different vulnerability than CVE-2016-0973, CVE-2016-0974, CVE-2016-0982, CVE-2016-0983, and CVE-2016-0984.
- SUSE-SU-2016:0398
- SUSE-SU-2016:0398
- SUSE-SU-2016:0400
- SUSE-SU-2016:0400
- openSUSE-SU-2016:0412
- openSUSE-SU-2016:0412
- openSUSE-SU-2016:0415
- openSUSE-SU-2016:0415
- RHSA-2016:0166
- RHSA-2016:0166
- 1034970
- 1034970
- http://zerodayinitiative.com/advisories/ZDI-16-160/
- http://zerodayinitiative.com/advisories/ZDI-16-160/
- https://helpx.adobe.com/security/products/flash-player/apsb16-04.html
- https://helpx.adobe.com/security/products/flash-player/apsb16-04.html
- GLSA-201603-07
- GLSA-201603-07
Modified: 2024-11-21
CVE-2016-0976
Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and OS X and before 11.2.202.569 on Linux, Adobe AIR before 20.0.0.260, Adobe AIR SDK before 20.0.0.260, and Adobe AIR SDK & Compiler before 20.0.0.260 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-0964, CVE-2016-0965, CVE-2016-0966, CVE-2016-0967, CVE-2016-0968, CVE-2016-0969, CVE-2016-0970, CVE-2016-0972, CVE-2016-0977, CVE-2016-0978, CVE-2016-0979, CVE-2016-0980, and CVE-2016-0981.
- SUSE-SU-2016:0398
- SUSE-SU-2016:0398
- SUSE-SU-2016:0400
- SUSE-SU-2016:0400
- openSUSE-SU-2016:0412
- openSUSE-SU-2016:0412
- openSUSE-SU-2016:0415
- openSUSE-SU-2016:0415
- RHSA-2016:0166
- RHSA-2016:0166
- 1034970
- 1034970
- https://helpx.adobe.com/security/products/flash-player/apsb16-04.html
- https://helpx.adobe.com/security/products/flash-player/apsb16-04.html
- GLSA-201603-07
- GLSA-201603-07
Modified: 2024-11-21
CVE-2016-0977
Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and OS X and before 11.2.202.569 on Linux, Adobe AIR before 20.0.0.260, Adobe AIR SDK before 20.0.0.260, and Adobe AIR SDK & Compiler before 20.0.0.260 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-0964, CVE-2016-0965, CVE-2016-0966, CVE-2016-0967, CVE-2016-0968, CVE-2016-0969, CVE-2016-0970, CVE-2016-0972, CVE-2016-0976, CVE-2016-0978, CVE-2016-0979, CVE-2016-0980, and CVE-2016-0981.
- SUSE-SU-2016:0398
- SUSE-SU-2016:0398
- SUSE-SU-2016:0400
- SUSE-SU-2016:0400
- openSUSE-SU-2016:0412
- openSUSE-SU-2016:0412
- openSUSE-SU-2016:0415
- openSUSE-SU-2016:0415
- RHSA-2016:0166
- RHSA-2016:0166
- 1034970
- 1034970
- https://helpx.adobe.com/security/products/flash-player/apsb16-04.html
- https://helpx.adobe.com/security/products/flash-player/apsb16-04.html
- GLSA-201603-07
- GLSA-201603-07
Modified: 2024-11-21
CVE-2016-0978
Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and OS X and before 11.2.202.569 on Linux, Adobe AIR before 20.0.0.260, Adobe AIR SDK before 20.0.0.260, and Adobe AIR SDK & Compiler before 20.0.0.260 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-0964, CVE-2016-0965, CVE-2016-0966, CVE-2016-0967, CVE-2016-0968, CVE-2016-0969, CVE-2016-0970, CVE-2016-0972, CVE-2016-0976, CVE-2016-0977, CVE-2016-0979, CVE-2016-0980, and CVE-2016-0981.
- SUSE-SU-2016:0398
- SUSE-SU-2016:0398
- SUSE-SU-2016:0400
- SUSE-SU-2016:0400
- openSUSE-SU-2016:0412
- openSUSE-SU-2016:0412
- openSUSE-SU-2016:0415
- openSUSE-SU-2016:0415
- RHSA-2016:0166
- RHSA-2016:0166
- 1034970
- 1034970
- https://helpx.adobe.com/security/products/flash-player/apsb16-04.html
- https://helpx.adobe.com/security/products/flash-player/apsb16-04.html
- GLSA-201603-07
- GLSA-201603-07
Modified: 2024-11-21
CVE-2016-0979
Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and OS X and before 11.2.202.569 on Linux, Adobe AIR before 20.0.0.260, Adobe AIR SDK before 20.0.0.260, and Adobe AIR SDK & Compiler before 20.0.0.260 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-0964, CVE-2016-0965, CVE-2016-0966, CVE-2016-0967, CVE-2016-0968, CVE-2016-0969, CVE-2016-0970, CVE-2016-0972, CVE-2016-0976, CVE-2016-0977, CVE-2016-0978, CVE-2016-0980, and CVE-2016-0981.
- SUSE-SU-2016:0398
- SUSE-SU-2016:0398
- SUSE-SU-2016:0400
- SUSE-SU-2016:0400
- openSUSE-SU-2016:0412
- openSUSE-SU-2016:0412
- openSUSE-SU-2016:0415
- openSUSE-SU-2016:0415
- RHSA-2016:0166
- RHSA-2016:0166
- 1034970
- 1034970
- https://helpx.adobe.com/security/products/flash-player/apsb16-04.html
- https://helpx.adobe.com/security/products/flash-player/apsb16-04.html
- GLSA-201603-07
- GLSA-201603-07
Modified: 2024-11-21
CVE-2016-0980
Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and OS X and before 11.2.202.569 on Linux, Adobe AIR before 20.0.0.260, Adobe AIR SDK before 20.0.0.260, and Adobe AIR SDK & Compiler before 20.0.0.260 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-0964, CVE-2016-0965, CVE-2016-0966, CVE-2016-0967, CVE-2016-0968, CVE-2016-0969, CVE-2016-0970, CVE-2016-0972, CVE-2016-0976, CVE-2016-0977, CVE-2016-0978, CVE-2016-0979, and CVE-2016-0981.
- SUSE-SU-2016:0398
- SUSE-SU-2016:0398
- SUSE-SU-2016:0400
- SUSE-SU-2016:0400
- openSUSE-SU-2016:0412
- openSUSE-SU-2016:0412
- openSUSE-SU-2016:0415
- openSUSE-SU-2016:0415
- RHSA-2016:0166
- RHSA-2016:0166
- 1034970
- 1034970
- https://helpx.adobe.com/security/products/flash-player/apsb16-04.html
- https://helpx.adobe.com/security/products/flash-player/apsb16-04.html
- GLSA-201603-07
- GLSA-201603-07
Modified: 2024-11-21
CVE-2016-0981
Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and OS X and before 11.2.202.569 on Linux, Adobe AIR before 20.0.0.260, Adobe AIR SDK before 20.0.0.260, and Adobe AIR SDK & Compiler before 20.0.0.260 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-0964, CVE-2016-0965, CVE-2016-0966, CVE-2016-0967, CVE-2016-0968, CVE-2016-0969, CVE-2016-0970, CVE-2016-0972, CVE-2016-0976, CVE-2016-0977, CVE-2016-0978, CVE-2016-0979, and CVE-2016-0980.
- SUSE-SU-2016:0398
- SUSE-SU-2016:0398
- SUSE-SU-2016:0400
- SUSE-SU-2016:0400
- openSUSE-SU-2016:0412
- openSUSE-SU-2016:0412
- openSUSE-SU-2016:0415
- openSUSE-SU-2016:0415
- RHSA-2016:0166
- RHSA-2016:0166
- 1034970
- 1034970
- https://helpx.adobe.com/security/products/flash-player/apsb16-04.html
- https://helpx.adobe.com/security/products/flash-player/apsb16-04.html
- GLSA-201603-07
- GLSA-201603-07
Modified: 2024-11-21
CVE-2016-0982
Use-after-free vulnerability in Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and OS X and before 11.2.202.569 on Linux, Adobe AIR before 20.0.0.260, Adobe AIR SDK before 20.0.0.260, and Adobe AIR SDK & Compiler before 20.0.0.260 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-0973, CVE-2016-0974, CVE-2016-0975, CVE-2016-0983, and CVE-2016-0984.
- SUSE-SU-2016:0398
- SUSE-SU-2016:0398
- SUSE-SU-2016:0400
- SUSE-SU-2016:0400
- openSUSE-SU-2016:0412
- openSUSE-SU-2016:0412
- openSUSE-SU-2016:0415
- openSUSE-SU-2016:0415
- RHSA-2016:0166
- RHSA-2016:0166
- 1034970
- 1034970
- https://helpx.adobe.com/security/products/flash-player/apsb16-04.html
- https://helpx.adobe.com/security/products/flash-player/apsb16-04.html
- GLSA-201603-07
- GLSA-201603-07
Modified: 2024-11-21
CVE-2016-0983
Use-after-free vulnerability in Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and OS X and before 11.2.202.569 on Linux, Adobe AIR before 20.0.0.260, Adobe AIR SDK before 20.0.0.260, and Adobe AIR SDK & Compiler before 20.0.0.260 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-0973, CVE-2016-0974, CVE-2016-0975, CVE-2016-0982, and CVE-2016-0984.
- SUSE-SU-2016:0398
- SUSE-SU-2016:0398
- SUSE-SU-2016:0400
- SUSE-SU-2016:0400
- openSUSE-SU-2016:0412
- openSUSE-SU-2016:0412
- openSUSE-SU-2016:0415
- openSUSE-SU-2016:0415
- RHSA-2016:0166
- RHSA-2016:0166
- 1034970
- 1034970
- https://helpx.adobe.com/security/products/flash-player/apsb16-04.html
- https://helpx.adobe.com/security/products/flash-player/apsb16-04.html
- GLSA-201603-07
- GLSA-201603-07
Modified: 2025-02-14
CVE-2016-0984
Use-after-free vulnerability in Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and OS X and before 11.2.202.569 on Linux, Adobe AIR before 20.0.0.260, Adobe AIR SDK before 20.0.0.260, and Adobe AIR SDK & Compiler before 20.0.0.260 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-0973, CVE-2016-0974, CVE-2016-0975, CVE-2016-0982, and CVE-2016-0983.
- SUSE-SU-2016:0398
- SUSE-SU-2016:0400
- openSUSE-SU-2016:0412
- openSUSE-SU-2016:0415
- RHSA-2016:0166
- 1034970
- https://helpx.adobe.com/security/products/flash-player/apsb16-04.html
- GLSA-201603-07
- 39462
- SUSE-SU-2016:0398
- 39462
- GLSA-201603-07
- https://helpx.adobe.com/security/products/flash-player/apsb16-04.html
- 1034970
- RHSA-2016:0166
- openSUSE-SU-2016:0415
- openSUSE-SU-2016:0412
- SUSE-SU-2016:0400
Modified: 2024-11-21
CVE-2016-0985
Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and OS X and before 11.2.202.569 on Linux, Adobe AIR before 20.0.0.260, Adobe AIR SDK before 20.0.0.260, and Adobe AIR SDK & Compiler before 20.0.0.260 allow attackers to execute arbitrary code by leveraging an unspecified "type confusion."
- SUSE-SU-2016:0398
- SUSE-SU-2016:0398
- SUSE-SU-2016:0400
- SUSE-SU-2016:0400
- openSUSE-SU-2016:0412
- openSUSE-SU-2016:0412
- openSUSE-SU-2016:0415
- openSUSE-SU-2016:0415
- RHSA-2016:0166
- RHSA-2016:0166
- 1034970
- 1034970
- https://helpx.adobe.com/security/products/flash-player/apsb16-04.html
- https://helpx.adobe.com/security/products/flash-player/apsb16-04.html
- GLSA-201603-07
- GLSA-201603-07
- 39461
- 39461