{"id":"RHSA-2016:0166","summary":"Red Hat Security Advisory: flash-plugin security update","modified":"2025-11-22T11:07:43Z","published":"2024-09-13T12:26:40Z","upstream":["CVE-2016-0964","CVE-2016-0965","CVE-2016-0966","CVE-2016-0967","CVE-2016-0968","CVE-2016-0969","CVE-2016-0970","CVE-2016-0971","CVE-2016-0972","CVE-2016-0973","CVE-2016-0974","CVE-2016-0975","CVE-2016-0976","CVE-2016-0977","CVE-2016-0978","CVE-2016-0979","CVE-2016-0980","CVE-2016-0981","CVE-2016-0982","CVE-2016-0983","CVE-2016-0984","CVE-2016-0985"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2016:0166"},{"type":"ARTICLE","url":"https://access.redhat.com/security/updates/classification/#critical"},{"type":"ARTICLE","url":"https://helpx.adobe.com/security/products/flash-player/apsb16-04.html"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1306015"},{"type":"ADVISORY","url":"https://security.access.redhat.com/data/csaf/v2/advisories/2016/rhsa-2016_0166.json"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-0964"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-0964"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0964"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-0965"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-0965"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0965"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-0966"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-0966"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0966"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-0967"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-0967"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0967"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-0968"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-0968"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0968"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-0969"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-0969"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0969"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-0970"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-0970"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0970"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-0971"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-0971"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0971"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-0972"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-0972"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0972"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-0973"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-0973"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0973"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-0974"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-0974"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0974"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-0975"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-0975"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0975"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-0976"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-0976"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0976"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-0977"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-0977"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0977"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-0978"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-0978"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0978"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-0979"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-0979"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0979"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-0980"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-0980"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0980"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-0981"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-0981"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0981"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-0982"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-0982"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0982"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-0983"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-0983"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0983"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-0984"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-0984"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0984"},{"type":"ARTICLE","url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-0985"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-0985"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0985"}],"affected":[{"package":{"name":"flash-plugin","ecosystem":"Red Hat:rhel_extras:5::client","purl":"pkg:rpm/redhat/flash-plugin"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:11.2.202.569-1.el5"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:0166.json"}},{"package":{"name":"flash-plugin","ecosystem":"Red Hat:rhel_extras:5::server","purl":"pkg:rpm/redhat/flash-plugin"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:11.2.202.569-1.el5"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:0166.json"}},{"package":{"name":"flash-plugin","ecosystem":"Red Hat:rhel_extras:6","purl":"pkg:rpm/redhat/flash-plugin"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:11.2.202.569-1.el6_7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:0166.json"}}],"schema_version":"1.7.3"}