{"id":"RHSA-2016:1423","summary":"Red Hat Security Advisory: flash-plugin security update","modified":"2025-11-22T11:11:15Z","published":"2024-09-13T14:36:56Z","upstream":["CVE-2016-4172","CVE-2016-4173","CVE-2016-4174","CVE-2016-4175","CVE-2016-4176","CVE-2016-4177","CVE-2016-4178","CVE-2016-4179","CVE-2016-4180","CVE-2016-4181","CVE-2016-4182","CVE-2016-4183","CVE-2016-4184","CVE-2016-4185","CVE-2016-4186","CVE-2016-4187","CVE-2016-4188","CVE-2016-4189","CVE-2016-4190","CVE-2016-4217","CVE-2016-4218","CVE-2016-4219","CVE-2016-4220","CVE-2016-4221","CVE-2016-4222","CVE-2016-4223","CVE-2016-4224","CVE-2016-4225","CVE-2016-4226","CVE-2016-4227","CVE-2016-4228","CVE-2016-4229","CVE-2016-4230","CVE-2016-4231","CVE-2016-4232","CVE-2016-4233","CVE-2016-4234","CVE-2016-4235","CVE-2016-4236","CVE-2016-4237","CVE-2016-4238","CVE-2016-4239","CVE-2016-4240","CVE-2016-4241","CVE-2016-4242","CVE-2016-4243","CVE-2016-4244","CVE-2016-4245","CVE-2016-4246","CVE-2016-4247","CVE-2016-4248","CVE-2016-4249","CVE-2016-7020"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2016:1423"},{"type":"ARTICLE","url":"https://access.redhat.com/security/updates/classification/#critical"},{"type":"ARTICLE","url":"https://helpx.adobe.com/security/products/flash-player/apsb16-25.html"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1355971"},{"type":"ADVISORY","url":"https://security.access.redhat.com/data/csaf/v2/advisories/2016/rhsa-2016_1423.json"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-4172"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-4172"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-4172"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-4173"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-4173"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-4173"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-4174"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-4174"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-4174"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-4175"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-4175"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-4175"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-4176"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-4176"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-4176"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-4177"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-4177"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-4177"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-4178"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-4178"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-4178"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-4179"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-4179"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-4179"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-4180"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-4180"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-4180"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-4181"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-4181"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-4181"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-4182"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-4182"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-4182"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-4183"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-4183"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-4183"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-4184"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-4184"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-4184"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-4185"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-4185"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-4185"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-4186"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-4186"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-4186"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-4187"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-4187"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-4187"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-4188"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-4188"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-4188"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-4189"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-4189"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-4189"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-4190"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-4190"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-4190"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-4217"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-4217"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-4217"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-4218"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-4218"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-4218"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-4219"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-4219"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-4219"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-4220"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-4220"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-4220"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-4221"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-4221"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-4221"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-4222"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-4222"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-4222"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-4223"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-4223"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-4223"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-4224"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-4224"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-4224"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-4225"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-4225"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-4225"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-4226"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-4226"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-4226"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-4227"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-4227"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-4227"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-4228"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-4228"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-4228"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-4229"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-4229"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-4229"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-4230"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-4230"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-4230"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-4231"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-4231"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-4231"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-4232"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-4232"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-4232"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-4233"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-4233"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-4233"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-4234"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-4234"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-4234"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-4235"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-4235"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-4235"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-4236"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-4236"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-4236"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-4237"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-4237"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-4237"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-4238"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-4238"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-4238"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-4239"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-4239"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-4239"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-4240"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-4240"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-4240"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-4241"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-4241"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-4241"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-4242"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-4242"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-4242"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-4243"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-4243"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-4243"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-4244"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-4244"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-4244"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-4245"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-4245"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-4245"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-4246"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-4246"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-4246"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-4247"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-4247"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-4247"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-4248"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-4248"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-4248"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-4249"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-4249"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-4249"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-7020"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-7020"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-7020"}],"affected":[{"package":{"name":"flash-plugin","ecosystem":"Red Hat:rhel_extras:5::client","purl":"pkg:rpm/redhat/flash-plugin"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:11.2.202.632-1.el5_11"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:1423.json"}},{"package":{"name":"flash-plugin","ecosystem":"Red Hat:rhel_extras:5::server","purl":"pkg:rpm/redhat/flash-plugin"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:11.2.202.632-1.el5_11"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:1423.json"}},{"package":{"name":"flash-plugin","ecosystem":"Red Hat:rhel_extras:6","purl":"pkg:rpm/redhat/flash-plugin"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:11.2.202.632-1.el6_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:1423.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}]}