{"id":"RHSA-2016:0610","summary":"Red Hat Security Advisory: flash-plugin security update","modified":"2025-11-22T11:09:19Z","published":"2024-09-13T12:27:44Z","upstream":["CVE-2016-1006","CVE-2016-1011","CVE-2016-1012","CVE-2016-1013","CVE-2016-1014","CVE-2016-1015","CVE-2016-1016","CVE-2016-1017","CVE-2016-1018","CVE-2016-1019","CVE-2016-1020","CVE-2016-1021","CVE-2016-1022","CVE-2016-1023","CVE-2016-1024","CVE-2016-1025","CVE-2016-1026","CVE-2016-1027","CVE-2016-1028","CVE-2016-1029","CVE-2016-1030","CVE-2016-1031","CVE-2016-1032","CVE-2016-1033"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2016:0610"},{"type":"ARTICLE","url":"https://access.redhat.com/security/updates/classification/#critical"},{"type":"ARTICLE","url":"https://helpx.adobe.com/security/products/flash-player/apsb16-10.html"},{"type":"ARTICLE","url":"https://helpx.adobe.com/security/products/flash-player/apsa16-01.html"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1324353"},{"type":"ADVISORY","url":"https://security.access.redhat.com/data/csaf/v2/advisories/2016/rhsa-2016_0610.json"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-1006"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-1006"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1006"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-1011"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-1011"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1011"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-1012"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-1012"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1012"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-1013"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-1013"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1013"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-1014"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-1014"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1014"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-1015"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-1015"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1015"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-1016"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-1016"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1016"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-1017"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-1017"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1017"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-1018"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-1018"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1018"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-1019"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-1019"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1019"},{"type":"ARTICLE","url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-1020"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-1020"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1020"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-1021"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-1021"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1021"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-1022"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-1022"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1022"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-1023"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-1023"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1023"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-1024"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-1024"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1024"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-1025"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-1025"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1025"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-1026"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-1026"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1026"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-1027"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-1027"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1027"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-1028"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-1028"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1028"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-1029"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-1029"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1029"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-1030"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-1030"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1030"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-1031"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-1031"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1031"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-1032"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-1032"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1032"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-1033"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-1033"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1033"}],"affected":[{"package":{"name":"flash-plugin","ecosystem":"Red Hat:rhel_extras:5::client","purl":"pkg:rpm/redhat/flash-plugin"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:11.2.202.616-1.el5"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:0610.json"}},{"package":{"name":"flash-plugin","ecosystem":"Red Hat:rhel_extras:5::server","purl":"pkg:rpm/redhat/flash-plugin"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:11.2.202.616-1.el5"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:0610.json"}},{"package":{"name":"flash-plugin","ecosystem":"Red Hat:rhel_extras:6","purl":"pkg:rpm/redhat/flash-plugin"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:11.2.202.616-1.el6_7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:0610.json"}}],"schema_version":"1.7.3"}