{"id":"RHSA-2016:1079","summary":"Red Hat Security Advisory: flash-plugin security update","modified":"2025-11-22T11:10:25Z","published":"2024-09-13T12:28:14Z","upstream":["CVE-2016-1096","CVE-2016-1097","CVE-2016-1098","CVE-2016-1099","CVE-2016-1100","CVE-2016-1101","CVE-2016-1102","CVE-2016-1103","CVE-2016-1104","CVE-2016-1105","CVE-2016-1106","CVE-2016-1107","CVE-2016-1108","CVE-2016-1109","CVE-2016-1110","CVE-2016-4108","CVE-2016-4109","CVE-2016-4110","CVE-2016-4111","CVE-2016-4112","CVE-2016-4113","CVE-2016-4114","CVE-2016-4115","CVE-2016-4116","CVE-2016-4117","CVE-2016-4120","CVE-2016-4121","CVE-2016-4160","CVE-2016-4161","CVE-2016-4162","CVE-2016-4163"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2016:1079"},{"type":"ARTICLE","url":"https://access.redhat.com/security/updates/classification/#critical"},{"type":"ARTICLE","url":"https://helpx.adobe.com/security/products/flash-player/apsb16-15.html"},{"type":"ARTICLE","url":"https://helpx.adobe.com/security/products/flash-player/apsa16-02.html"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1335058"},{"type":"ADVISORY","url":"https://security.access.redhat.com/data/csaf/v2/advisories/2016/rhsa-2016_1079.json"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-1096"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-1096"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1096"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-1097"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-1097"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1097"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-1098"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-1098"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1098"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-1099"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-1099"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1099"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-1100"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-1100"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1100"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-1101"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-1101"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1101"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-1102"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-1102"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1102"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-1103"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-1103"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1103"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-1104"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-1104"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1104"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-1105"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-1105"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1105"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-1106"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-1106"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1106"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-1107"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-1107"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1107"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-1108"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-1108"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1108"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-1109"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-1109"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1109"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-1110"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-1110"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1110"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-4108"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-4108"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-4108"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-4109"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-4109"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-4109"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-4110"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-4110"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-4110"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-4111"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-4111"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-4111"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-4112"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-4112"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-4112"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-4113"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-4113"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-4113"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-4114"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-4114"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-4114"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-4115"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-4115"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-4115"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-4116"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-4116"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-4116"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-4117"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-4117"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-4117"},{"type":"ARTICLE","url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-4120"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-4120"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-4120"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-4121"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-4121"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-4121"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-4160"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-4160"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-4160"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-4161"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-4161"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-4161"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-4162"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-4162"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-4162"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-4163"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-4163"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-4163"}],"affected":[{"package":{"name":"flash-plugin","ecosystem":"Red Hat:rhel_extras:5::client","purl":"pkg:rpm/redhat/flash-plugin"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:11.2.202.621-1.el5"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:1079.json"}},{"package":{"name":"flash-plugin","ecosystem":"Red Hat:rhel_extras:5::server","purl":"pkg:rpm/redhat/flash-plugin"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:11.2.202.621-1.el5"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:1079.json"}},{"package":{"name":"flash-plugin","ecosystem":"Red Hat:rhel_extras:6","purl":"pkg:rpm/redhat/flash-plugin"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:11.2.202.621-1.el6_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:1079.json"}}],"schema_version":"1.7.3"}