{"id":"CVE-2016-1006","details":"Adobe Flash Player before 18.0.0.343 and 19.x through 21.x before 21.0.0.213 on Windows and OS X and before 11.2.202.616 on Linux allows attackers to bypass the ASLR protection mechanism via JIT data.","modified":"2026-04-16T06:17:48.072414953Z","published":"2016-04-09T01:59:26.387Z","related":["SUSE-SU-2016:1305-1"],"references":[{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00044.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00045.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2016-0610.html"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1035509"},{"type":"FIX","url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-050"},{"type":"FIX","url":"https://helpx.adobe.com/security/products/flash-player/apsb16-10.html"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2016-1006.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"11.2.202.577"}]},{"events":[{"introduced":"0"},{"last_affected":"21.0.0.197"}]},{"events":[{"introduced":"0"},{"last_affected":"18.0.0.333"}]},{"events":[{"introduced":"0"},{"last_affected":"21.0.0.197"}]},{"events":[{"introduced":"0"},{"last_affected":"21.0.0.197"}]},{"events":[{"introduced":"0"},{"last_affected":"21.0.0.197"}]},{"events":[{"introduced":"0"},{"last_affected":"21.0.0.176"}]},{"events":[{"introduced":"0"},{"last_affected":"21.0.0.176"}]},{"events":[{"introduced":"0"},{"last_affected":"21.0.0.176"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N"}]}