{"id":"RHSA-2016:1865","summary":"Red Hat Security Advisory: flash-plugin security update","modified":"2025-11-22T11:12:49Z","published":"2024-09-13T14:37:29Z","upstream":["CVE-2016-4271","CVE-2016-4272","CVE-2016-4274","CVE-2016-4275","CVE-2016-4276","CVE-2016-4277","CVE-2016-4278","CVE-2016-4279","CVE-2016-4280","CVE-2016-4281","CVE-2016-4282","CVE-2016-4283","CVE-2016-4284","CVE-2016-4285","CVE-2016-4287","CVE-2016-6921","CVE-2016-6922","CVE-2016-6923","CVE-2016-6924","CVE-2016-6925","CVE-2016-6926","CVE-2016-6927","CVE-2016-6929","CVE-2016-6930","CVE-2016-6931","CVE-2016-6932"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2016:1865"},{"type":"ARTICLE","url":"https://access.redhat.com/security/updates/classification/#critical"},{"type":"ARTICLE","url":"https://helpx.adobe.com/security/products/flash-player/apsb16-29.html"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1375725"},{"type":"ADVISORY","url":"https://security.access.redhat.com/data/csaf/v2/advisories/2016/rhsa-2016_1865.json"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-4271"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-4271"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-4271"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-4272"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-4272"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-4272"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-4274"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-4274"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-4274"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-4275"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-4275"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-4275"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-4276"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-4276"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-4276"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-4277"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-4277"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-4277"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-4278"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-4278"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-4278"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-4279"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-4279"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-4279"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-4280"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-4280"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-4280"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-4281"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-4281"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-4281"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-4282"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-4282"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-4282"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-4283"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-4283"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-4283"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-4284"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-4284"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-4284"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-4285"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-4285"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-4285"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-4287"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-4287"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-4287"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-6921"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-6921"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-6921"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-6922"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-6922"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-6922"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-6923"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-6923"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-6923"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-6924"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-6924"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-6924"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-6925"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-6925"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-6925"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-6926"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-6926"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-6926"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-6927"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-6927"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-6927"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-6929"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-6929"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-6929"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-6930"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-6930"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-6930"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-6931"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-6931"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-6931"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-6932"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-6932"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-6932"}],"affected":[{"package":{"name":"flash-plugin","ecosystem":"Red Hat:rhel_extras:5::client","purl":"pkg:rpm/redhat/flash-plugin"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:11.2.202.635-1.el5_11"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:1865.json"}},{"package":{"name":"flash-plugin","ecosystem":"Red Hat:rhel_extras:5::server","purl":"pkg:rpm/redhat/flash-plugin"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:11.2.202.635-1.el5_11"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:1865.json"}},{"package":{"name":"flash-plugin","ecosystem":"Red Hat:rhel_extras:6","purl":"pkg:rpm/redhat/flash-plugin"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:11.2.202.635-1.el6_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:1865.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}]}