Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2016-1024 (GCVE-0-2016-1024)
Vulnerability from cvelistv5 – Published: 2016-04-09 01:00 – Updated: 2024-08-05 22:38- n/a
| URL | Tags | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T22:38:41.542Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "SUSE-SU-2016:1305",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00044.html"
},
{
"name": "openSUSE-SU-2016:1306",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00045.html"
},
{
"name": "RHSA-2016:0610",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://rhn.redhat.com/errata/RHSA-2016-0610.html"
},
{
"name": "85932",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/85932"
},
{
"name": "1035509",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id/1035509"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://helpx.adobe.com/security/products/flash-player/apsb16-10.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2016-04-07T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "Adobe Flash Player before 18.0.0.343 and 19.x through 21.x before 21.0.0.213 on Windows and OS X and before 11.2.202.616 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-1012, CVE-2016-1020, CVE-2016-1021, CVE-2016-1022, CVE-2016-1023, CVE-2016-1025, CVE-2016-1026, CVE-2016-1027, CVE-2016-1028, CVE-2016-1029, CVE-2016-1032, and CVE-2016-1033."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-06-07T09:57:01.000Z",
"orgId": "078d4453-3bcd-4900-85e6-15281da43538",
"shortName": "adobe"
},
"references": [
{
"name": "SUSE-SU-2016:1305",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00044.html"
},
{
"name": "openSUSE-SU-2016:1306",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00045.html"
},
{
"name": "RHSA-2016:0610",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://rhn.redhat.com/errata/RHSA-2016-0610.html"
},
{
"name": "85932",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/85932"
},
{
"name": "1035509",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id/1035509"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://helpx.adobe.com/security/products/flash-player/apsb16-10.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2016-1024",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Adobe Flash Player before 18.0.0.343 and 19.x through 21.x before 21.0.0.213 on Windows and OS X and before 11.2.202.616 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-1012, CVE-2016-1020, CVE-2016-1021, CVE-2016-1022, CVE-2016-1023, CVE-2016-1025, CVE-2016-1026, CVE-2016-1027, CVE-2016-1028, CVE-2016-1029, CVE-2016-1032, and CVE-2016-1033."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "SUSE-SU-2016:1305",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00044.html"
},
{
"name": "openSUSE-SU-2016:1306",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00045.html"
},
{
"name": "RHSA-2016:0610",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-0610.html"
},
{
"name": "85932",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/85932"
},
{
"name": "1035509",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1035509"
},
{
"name": "https://helpx.adobe.com/security/products/flash-player/apsb16-10.html",
"refsource": "CONFIRM",
"url": "https://helpx.adobe.com/security/products/flash-player/apsb16-10.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538",
"assignerShortName": "adobe",
"cveId": "CVE-2016-1024",
"datePublished": "2016-04-09T01:00:00.000Z",
"dateReserved": "2015-12-22T00:00:00.000Z",
"dateUpdated": "2024-08-05T22:38:41.542Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
GSD-2016-1024
Vulnerability from gsd - Updated: 2023-12-13 01:21{
"GSD": {
"alias": "CVE-2016-1024",
"description": "Adobe Flash Player before 18.0.0.343 and 19.x through 21.x before 21.0.0.213 on Windows and OS X and before 11.2.202.616 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-1012, CVE-2016-1020, CVE-2016-1021, CVE-2016-1022, CVE-2016-1023, CVE-2016-1025, CVE-2016-1026, CVE-2016-1027, CVE-2016-1028, CVE-2016-1029, CVE-2016-1032, and CVE-2016-1033.",
"id": "GSD-2016-1024",
"references": [
"https://www.suse.com/security/cve/CVE-2016-1024.html",
"https://access.redhat.com/errata/RHSA-2016:0610",
"https://advisories.mageia.org/CVE-2016-1024.html",
"https://alas.aws.amazon.com/cve/html/CVE-2016-1024.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2016-1024"
],
"details": "Adobe Flash Player before 18.0.0.343 and 19.x through 21.x before 21.0.0.213 on Windows and OS X and before 11.2.202.616 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-1012, CVE-2016-1020, CVE-2016-1021, CVE-2016-1022, CVE-2016-1023, CVE-2016-1025, CVE-2016-1026, CVE-2016-1027, CVE-2016-1028, CVE-2016-1029, CVE-2016-1032, and CVE-2016-1033.",
"id": "GSD-2016-1024",
"modified": "2023-12-13T01:21:24.819055Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2016-1024",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Adobe Flash Player before 18.0.0.343 and 19.x through 21.x before 21.0.0.213 on Windows and OS X and before 11.2.202.616 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-1012, CVE-2016-1020, CVE-2016-1021, CVE-2016-1022, CVE-2016-1023, CVE-2016-1025, CVE-2016-1026, CVE-2016-1027, CVE-2016-1028, CVE-2016-1029, CVE-2016-1032, and CVE-2016-1033."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "SUSE-SU-2016:1305",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00044.html"
},
{
"name": "openSUSE-SU-2016:1306",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00045.html"
},
{
"name": "RHSA-2016:0610",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-0610.html"
},
{
"name": "85932",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/85932"
},
{
"name": "1035509",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1035509"
},
{
"name": "https://helpx.adobe.com/security/products/flash-player/apsb16-10.html",
"refsource": "CONFIRM",
"url": "https://helpx.adobe.com/security/products/flash-player/apsb16-10.html"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "11.2.202.577",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:adobe:flash_player_desktop_runtime:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "21.0.0.197",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:adobe:flash_player:*:*:*:*:esr:*:*:*",
"cpe_name": [],
"versionEndIncluding": "18.0.0.333",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:internet_explorer:*:*",
"cpe_name": [],
"versionEndIncluding": "21.0.0.197",
"vulnerable": true
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:chrome:*:*",
"cpe_name": [],
"versionEndIncluding": "21.0.0.197",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:google:chrome_os:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:edge:*:*",
"cpe_name": [],
"versionEndIncluding": "21.0.0.197",
"vulnerable": true
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:adobe:air_desktop_runtime:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "21.0.0.176",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "21.0.0.176",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:apple:iphone_os:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:adobe:air_sdk_\\\u0026_compiler:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "21.0.0.176",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:apple:iphone_os:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2016-1024"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "Adobe Flash Player before 18.0.0.343 and 19.x through 21.x before 21.0.0.213 on Windows and OS X and before 11.2.202.616 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-1012, CVE-2016-1020, CVE-2016-1021, CVE-2016-1022, CVE-2016-1023, CVE-2016-1025, CVE-2016-1026, CVE-2016-1027, CVE-2016-1028, CVE-2016-1029, CVE-2016-1032, and CVE-2016-1033."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://helpx.adobe.com/security/products/flash-player/apsb16-10.html",
"refsource": "CONFIRM",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://helpx.adobe.com/security/products/flash-player/apsb16-10.html"
},
{
"name": "RHSA-2016:0610",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2016-0610.html"
},
{
"name": "SUSE-SU-2016:1305",
"refsource": "SUSE",
"tags": [
"Broken Link",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00044.html"
},
{
"name": "openSUSE-SU-2016:1306",
"refsource": "SUSE",
"tags": [
"Broken Link",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00045.html"
},
{
"name": "1035509",
"refsource": "SECTRACK",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id/1035509"
},
{
"name": "85932",
"refsource": "BID",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/85932"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.3,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": true
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
},
"lastModifiedDate": "2023-01-26T19:25Z",
"publishedDate": "2016-04-09T01:59Z"
}
}
}
FKIE_CVE-2016-1024
Vulnerability from fkie_nvd - Published: 2016-04-09 01:59 - Updated: 2025-04-12 10:46| Vendor | Product | Version | |
|---|---|---|---|
| adobe | flash_player | * | |
| linux | linux_kernel | - | |
| adobe | flash_player_desktop_runtime | * | |
| apple | mac_os_x | - | |
| microsoft | windows | - | |
| adobe | flash_player | * | |
| apple | mac_os_x | - | |
| microsoft | windows | - | |
| microsoft | windows_10 | - | |
| microsoft | windows_8.1 | - | |
| adobe | flash_player | * | |
| adobe | flash_player | * | |
| apple | mac_os_x | - | |
| chrome_os | - | ||
| linux | linux_kernel | - | |
| microsoft | windows | - | |
| microsoft | windows_10 | - | |
| adobe | flash_player | * | |
| adobe | air_desktop_runtime | * | |
| apple | mac_os_x | - | |
| microsoft | windows | - | |
| adobe | air_sdk | * | |
| apple | iphone_os | - | |
| apple | mac_os_x | - | |
| android | - | ||
| microsoft | windows | - | |
| adobe | air_sdk_\&_compiler | * | |
| apple | iphone_os | - | |
| apple | mac_os_x | - | |
| android | - | ||
| microsoft | windows | - |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DBB40E98-5A3C-4D4E-BF35-66D8490D6B96",
"versionEndIncluding": "11.2.202.577",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:adobe:flash_player_desktop_runtime:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EAB15A84-C6CE-4B87-B058-1ACAF56D96A5",
"versionEndIncluding": "21.0.0.197",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4781BF1E-8A4E-4AFF-9540-23D523EE30DD",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:esr:*:*:*",
"matchCriteriaId": "68F6E54E-28D2-460A-9167-8BD0D3283E26",
"versionEndIncluding": "18.0.0.333",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4781BF1E-8A4E-4AFF-9540-23D523EE30DD",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "21540673-614A-4D40-8BD7-3F07723803B0",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E93068DB-549B-45AB-8E5C-00EB5D8B5CF8",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:internet_explorer:*:*",
"matchCriteriaId": "0303DA1C-3C95-4E68-B654-579A302FDF62",
"versionEndIncluding": "21.0.0.197",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:chrome:*:*",
"matchCriteriaId": "9B384454-A4B4-4E57-8B0C-2B7BB8DCC545",
"versionEndIncluding": "21.0.0.197",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4781BF1E-8A4E-4AFF-9540-23D523EE30DD",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:google:chrome_os:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D32ACF6F-5FF7-4815-8EAD-4719F5FC9B79",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "21540673-614A-4D40-8BD7-3F07723803B0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:edge:*:*",
"matchCriteriaId": "7B5CCFA5-1620-4BC0-ABC3-10F6CFC2D7FB",
"versionEndIncluding": "21.0.0.197",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:adobe:air_desktop_runtime:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5C86F836-BD68-4B24-87F0-536D61670256",
"versionEndIncluding": "21.0.0.176",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4781BF1E-8A4E-4AFF-9540-23D523EE30DD",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B2F4F71D-DA29-43C6-B71F-26F0E1E82619",
"versionEndIncluding": "21.0.0.176",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:apple:iphone_os:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B5415705-33E5-46D5-8E4D-9EBADC8C5705",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4781BF1E-8A4E-4AFF-9540-23D523EE30DD",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F8B9FEC8-73B6-43B8-B24E-1F7C20D91D26",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:adobe:air_sdk_\\\u0026_compiler:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B1EBEC22-8E22-47A6-B3F9-2D577AFE5FA1",
"versionEndIncluding": "21.0.0.176",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:apple:iphone_os:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B5415705-33E5-46D5-8E4D-9EBADC8C5705",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4781BF1E-8A4E-4AFF-9540-23D523EE30DD",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F8B9FEC8-73B6-43B8-B24E-1F7C20D91D26",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Adobe Flash Player before 18.0.0.343 and 19.x through 21.x before 21.0.0.213 on Windows and OS X and before 11.2.202.616 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-1012, CVE-2016-1020, CVE-2016-1021, CVE-2016-1022, CVE-2016-1023, CVE-2016-1025, CVE-2016-1026, CVE-2016-1027, CVE-2016-1028, CVE-2016-1029, CVE-2016-1032, and CVE-2016-1033."
},
{
"lang": "es",
"value": "Adobe Flash Player en versiones anteriores a 18.0.0.343 y 19.x hasta la versi\u00f3n 21.x en versiones anteriores a 21.0.0.213 en Windows y OS X y en versiones anteriores a 11.2.202.616 en Linux permite a atacantes ejecutar c\u00f3digo arbitrario o causar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) a trav\u00e9s de vectores no especificados, una vulnerabilidad diferente de CVE-2016-1012, CVE-2016-1020, CVE-2016-1021, CVE-2016-1022, CVE-2016-1023, CVE-2016-1025, CVE-2016-1026, CVE-2016-1027, CVE-2016-1028, CVE-2016-1029, CVE-2016-1032 y CVE-2016-1033."
}
],
"id": "CVE-2016-1024",
"lastModified": "2025-04-12T10:46:40.837",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.3,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2016-04-09T01:59:38.840",
"references": [
{
"source": "psirt@adobe.com",
"tags": [
"Broken Link",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00044.html"
},
{
"source": "psirt@adobe.com",
"tags": [
"Broken Link",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00045.html"
},
{
"source": "psirt@adobe.com",
"tags": [
"Third Party Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2016-0610.html"
},
{
"source": "psirt@adobe.com",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/85932"
},
{
"source": "psirt@adobe.com",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id/1035509"
},
{
"source": "psirt@adobe.com",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://helpx.adobe.com/security/products/flash-player/apsb16-10.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00044.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00045.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2016-0610.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/85932"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id/1035509"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://helpx.adobe.com/security/products/flash-player/apsb16-10.html"
}
],
"sourceIdentifier": "psirt@adobe.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-787"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
CERTFR-2016-AVI-116
Vulnerability from certfr_avis - Published: 2016-04-08 - Updated: 2016-04-13
De multiples vulnérabilités ont été corrigées dans Adobe Flash Player. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Adobe | N/A | Adobe Flash Player versions antérieures à 11.2.202.616 sur Linux | ||
| Adobe | N/A | Adobe Flash Player pour Google Chrome versions antérieures à 21.0.0.213 sur Windows, Macintosh, Linux et ChromeOS | ||
| Adobe | N/A | Adobe AIR SDK & Compiler versions antérieures à 21.0.0.198 sur Windows, Macintosh, Android et iOS | ||
| Adobe | N/A | Adobe AIR Desktop Runtime versions antérieures à 21.0.0.198 sur Windows et Macintosh | ||
| Adobe | N/A | Adobe Flash Player ESR versions antérieures à 18.0.0.343 sur Windows et Macintosh | ||
| Adobe | N/A | Adobe Flash Player pour Internet Explorer 11 versions antérieures à 21.0.0.213 sur Windows 8.1 | ||
| Adobe | N/A | Adobe Flash Player Desktop Runtime versions antérieures à 21.0.0.213 sur Windows et Macintosh | ||
| Adobe | N/A | Adobe AIR SDK versions antérieures à 21.0.0.198 sur Windows, Macintosh, Android et iOS | ||
| Adobe | N/A | Adobe Flash Player pour Microsoft Edge et Internet Explorer 11 versions antérieures à 21.0.0.213 sur Windows 10 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Adobe Flash Player versions ant\u00e9rieures \u00e0 11.2.202.616 sur Linux",
"product": {
"name": "N/A",
"vendor": {
"name": "Adobe",
"scada": false
}
}
},
{
"description": "Adobe Flash Player pour Google Chrome versions ant\u00e9rieures \u00e0 21.0.0.213 sur Windows, Macintosh, Linux et ChromeOS",
"product": {
"name": "N/A",
"vendor": {
"name": "Adobe",
"scada": false
}
}
},
{
"description": "Adobe AIR SDK \u0026 Compiler versions ant\u00e9rieures \u00e0 21.0.0.198 sur Windows, Macintosh, Android et iOS",
"product": {
"name": "N/A",
"vendor": {
"name": "Adobe",
"scada": false
}
}
},
{
"description": "Adobe AIR Desktop Runtime versions ant\u00e9rieures \u00e0 21.0.0.198 sur Windows et Macintosh",
"product": {
"name": "N/A",
"vendor": {
"name": "Adobe",
"scada": false
}
}
},
{
"description": "Adobe Flash Player ESR versions ant\u00e9rieures \u00e0 18.0.0.343 sur Windows et Macintosh",
"product": {
"name": "N/A",
"vendor": {
"name": "Adobe",
"scada": false
}
}
},
{
"description": "Adobe Flash Player pour Internet Explorer 11 versions ant\u00e9rieures \u00e0 21.0.0.213 sur Windows 8.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Adobe",
"scada": false
}
}
},
{
"description": "Adobe Flash Player Desktop Runtime versions ant\u00e9rieures \u00e0 21.0.0.213 sur Windows et Macintosh",
"product": {
"name": "N/A",
"vendor": {
"name": "Adobe",
"scada": false
}
}
},
{
"description": "Adobe AIR SDK versions ant\u00e9rieures \u00e0 21.0.0.198 sur Windows, Macintosh, Android et iOS",
"product": {
"name": "N/A",
"vendor": {
"name": "Adobe",
"scada": false
}
}
},
{
"description": "Adobe Flash Player pour Microsoft Edge et Internet Explorer 11 versions ant\u00e9rieures \u00e0 21.0.0.213 sur Windows 10",
"product": {
"name": "N/A",
"vendor": {
"name": "Adobe",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2016-1025",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1025"
},
{
"name": "CVE-2016-1019",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1019"
},
{
"name": "CVE-2016-1032",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1032"
},
{
"name": "CVE-2016-1017",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1017"
},
{
"name": "CVE-2016-1022",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1022"
},
{
"name": "CVE-2016-1021",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1021"
},
{
"name": "CVE-2016-1026",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1026"
},
{
"name": "CVE-2016-1015",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1015"
},
{
"name": "CVE-2016-1031",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1031"
},
{
"name": "CVE-2016-1028",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1028"
},
{
"name": "CVE-2016-1018",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1018"
},
{
"name": "CVE-2016-1006",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1006"
},
{
"name": "CVE-2016-1027",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1027"
},
{
"name": "CVE-2016-1029",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1029"
},
{
"name": "CVE-2016-1012",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1012"
},
{
"name": "CVE-2016-1020",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1020"
},
{
"name": "CVE-2016-1030",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1030"
},
{
"name": "CVE-2016-1033",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1033"
},
{
"name": "CVE-2016-1014",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1014"
},
{
"name": "CVE-2016-1024",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1024"
},
{
"name": "CVE-2016-1023",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1023"
},
{
"name": "CVE-2016-1016",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1016"
},
{
"name": "CVE-2016-1013",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1013"
},
{
"name": "CVE-2016-1011",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1011"
}
],
"initial_release_date": "2016-04-08T00:00:00",
"last_revision_date": "2016-04-13T00:00:00",
"links": [],
"reference": "CERTFR-2016-AVI-116",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2016-04-08T00:00:00.000000"
},
{
"description": "ajout des versions AIR aux Syst\u00e8mes affect\u00e9s suite \u00e0 la mise \u00e0 jour de l\u0027avis de s\u00e9curit\u00e9 d\u0027Adobe en date du 12 avril 2016",
"revision_date": "2016-04-13T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eAdobe Flash Player\u003c/span\u003e. Elles permettent \u00e0 un\nattaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance et un\ncontournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Adobe Flash Player",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Adobe APSB16-10 du 07 avril 2016",
"url": "https://helpx.adobe.com/security/products/flash-player/apsb16-10.html"
}
]
}
CERTFR-2017-AVI-099
Vulnerability from certfr_avis - Published: 2017-04-04 - Updated: 2017-04-04
De multiples vulnérabilités ont été corrigées dans Google Android (Nexus). Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, une exécution de code arbitraire à distance et un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Google Android (Nexus) toutes versions n'intégrant pas le correctif de sécurité du 3 avril 2017
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cP\u003eGoogle Android (Nexus) toutes versions n\u0027int\u00e9grant pas le correctif de s\u00e9curit\u00e9 du 3 avril 2017\u003c/P\u003e",
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2017-0554",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0554"
},
{
"name": "CVE-2016-7097",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7097"
},
{
"name": "CVE-2017-0585",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0585"
},
{
"name": "CVE-2017-0544",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0544"
},
{
"name": "CVE-2017-0543",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0543"
},
{
"name": "CVE-2017-0574",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0574"
},
{
"name": "CVE-2016-5129",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5129"
},
{
"name": "CVE-2017-0332",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0332"
},
{
"name": "CVE-2017-0329",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0329"
},
{
"name": "CVE-2014-9936",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9936"
},
{
"name": "CVE-2017-0546",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0546"
},
{
"name": "CVE-2017-0580",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0580"
},
{
"name": "CVE-2017-0572",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0572"
},
{
"name": "CVE-2017-6425",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6425"
},
{
"name": "CVE-2014-0206",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0206"
},
{
"name": "CVE-2014-9933",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9933"
},
{
"name": "CVE-2016-5349",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5349"
},
{
"name": "CVE-2017-0565",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0565"
},
{
"name": "CVE-2017-0558",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0558"
},
{
"name": "CVE-2017-0573",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0573"
},
{
"name": "CVE-2017-0556",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0556"
},
{
"name": "CVE-2017-0564",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0564"
},
{
"name": "CVE-2016-5346",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5346"
},
{
"name": "CVE-2016-1022",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1022"
},
{
"name": "CVE-2014-9932",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9932"
},
{
"name": "CVE-2017-0568",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0568"
},
{
"name": "CVE-2017-0555",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0555"
},
{
"name": "CVE-2017-0548",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0548"
},
{
"name": "CVE-2014-1739",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-1739"
},
{
"name": "CVE-2017-0542",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0542"
},
{
"name": "CVE-2017-0586",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0586"
},
{
"name": "CVE-2017-0327",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0327"
},
{
"name": "CVE-2017-0541",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0541"
},
{
"name": "CVE-2014-2706",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-2706"
},
{
"name": "CVE-2017-0579",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0579"
},
{
"name": "CVE-2017-0577",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0577"
},
{
"name": "CVE-2017-0561",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0561"
},
{
"name": "CVE-2014-9935",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9935"
},
{
"name": "CVE-2017-0538",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0538"
},
{
"name": "CVE-2017-0566",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0566"
},
{
"name": "CVE-2015-8997",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8997"
},
{
"name": "CVE-2017-0339",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0339"
},
{
"name": "CVE-2017-0570",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0570"
},
{
"name": "CVE-2017-0560",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0560"
},
{
"name": "CVE-2017-0539",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0539"
},
{
"name": "CVE-2016-8465",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8465"
},
{
"name": "CVE-2015-8995",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8995"
},
{
"name": "CVE-2017-0584",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0584"
},
{
"name": "CVE-2014-9922",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9922"
},
{
"name": "CVE-2017-0462",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0462"
},
{
"name": "CVE-2017-0454",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0454"
},
{
"name": "CVE-2017-0325",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0325"
},
{
"name": "CVE-2014-9934",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9934"
},
{
"name": "CVE-2017-0563",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0563"
},
{
"name": "CVE-2014-9937",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9937"
},
{
"name": "CVE-2015-8996",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8996"
},
{
"name": "CVE-2017-0562",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0562"
},
{
"name": "CVE-2017-0575",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0575"
},
{
"name": "CVE-2015-8999",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8999"
},
{
"name": "CVE-2016-1024",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1024"
},
{
"name": "CVE-2017-6424",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6424"
},
{
"name": "CVE-2017-0545",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0545"
},
{
"name": "CVE-2017-0581",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0581"
},
{
"name": "CVE-2015-8998",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8998"
},
{
"name": "CVE-2017-0328",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0328"
},
{
"name": "CVE-2017-0559",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0559"
},
{
"name": "CVE-2014-9931",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9931"
},
{
"name": "CVE-2016-1023",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1023"
},
{
"name": "CVE-2017-0567",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0567"
},
{
"name": "CVE-2017-0569",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0569"
},
{
"name": "CVE-2017-0583",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0583"
},
{
"name": "CVE-2017-6426",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6426"
},
{
"name": "CVE-2015-9003",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-9003"
},
{
"name": "CVE-2017-0557",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0557"
},
{
"name": "CVE-2017-0551",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0551"
},
{
"name": "CVE-2017-0550",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0550"
},
{
"name": "CVE-2017-0552",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0552"
},
{
"name": "CVE-2017-0571",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0571"
},
{
"name": "CVE-2015-9001",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-9001"
},
{
"name": "CVE-2017-0578",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0578"
},
{
"name": "CVE-2017-0547",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0547"
},
{
"name": "CVE-2014-3145",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3145"
},
{
"name": "CVE-2015-9000",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-9000"
},
{
"name": "CVE-2017-0549",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0549"
},
{
"name": "CVE-2014-4656",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4656"
},
{
"name": "CVE-2016-8489",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8489"
},
{
"name": "CVE-2017-6423",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6423"
},
{
"name": "CVE-2015-9002",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-9002"
},
{
"name": "CVE-2017-0330",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0330"
},
{
"name": "CVE-2017-0553",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0553"
},
{
"name": "CVE-2017-0540",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0540"
},
{
"name": "CVE-2017-0576",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0576"
},
{
"name": "CVE-2017-0582",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0582"
}
],
"initial_release_date": "2017-04-04T00:00:00",
"last_revision_date": "2017-04-04T00:00:00",
"links": [],
"reference": "CERTFR-2017-AVI-099",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2017-04-04T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eGoogle Android (Nexus)\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non\nsp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, une ex\u00e9cution de code arbitraire \u00e0 distance et\nun d\u00e9ni de service \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Google Android (Nexus)",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Android du 03 avril 2017",
"url": "http://source.android.com/security/bulletin/2017-04-01.html"
}
]
}
CERTFR-2017-AVI-135
Vulnerability from certfr_avis - Published: 2017-05-02 - Updated: 2017-05-02
De multiples vulnérabilités ont été corrigées dans Google Android (Nexus). Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Google Android (Nexus) toutes versions n'intégrant pas le correctif de sécurité du 1 mai 2017
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cP\u003eGoogle Android (Nexus) toutes versions n\u0027int\u00e9grant pas le correctif de s\u00e9curit\u00e9 du 1 mai 2017\u003c/P\u003e",
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2016-9794",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9794"
},
{
"name": "CVE-2017-0596",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0596"
},
{
"name": "CVE-2014-9947",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9947"
},
{
"name": "CVE-2017-0593",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0593"
},
{
"name": "CVE-2017-0331",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0331"
},
{
"name": "CVE-2016-5860",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5860"
},
{
"name": "CVE-2017-0600",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0600"
},
{
"name": "CVE-2015-9004",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-9004"
},
{
"name": "CVE-2017-0601",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0601"
},
{
"name": "CVE-2017-0604",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0604"
},
{
"name": "CVE-2017-0599",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0599"
},
{
"name": "CVE-2017-0632",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0632"
},
{
"name": "CVE-2017-0588",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0588"
},
{
"name": "CVE-2017-0493",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0493"
},
{
"name": "CVE-2017-0633",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0633"
},
{
"name": "CVE-2016-5858",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5858"
},
{
"name": "CVE-2014-9925",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9925"
},
{
"name": "CVE-2014-9945",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9945"
},
{
"name": "CVE-2017-0597",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0597"
},
{
"name": "CVE-2017-0603",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0603"
},
{
"name": "CVE-2017-0591",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0591"
},
{
"name": "CVE-2017-0630",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0630"
},
{
"name": "CVE-2014-9929",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9929"
},
{
"name": "CVE-2017-0609",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0609"
},
{
"name": "CVE-2017-0602",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0602"
},
{
"name": "CVE-2014-9941",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9941"
},
{
"name": "CVE-2017-0605",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0605"
},
{
"name": "CVE-2017-0625",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0625"
},
{
"name": "CVE-2017-0594",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0594"
},
{
"name": "CVE-2016-5853",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5853"
},
{
"name": "CVE-2017-0634",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0634"
},
{
"name": "CVE-2017-0616",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0616"
},
{
"name": "CVE-2014-9944",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9944"
},
{
"name": "CVE-2014-9949",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9949"
},
{
"name": "CVE-2017-0615",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0615"
},
{
"name": "CVE-2017-0629",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0629"
},
{
"name": "CVE-2017-0592",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0592"
},
{
"name": "CVE-2016-1028",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1028"
},
{
"name": "CVE-2017-0621",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0621"
},
{
"name": "CVE-2016-5855",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5855"
},
{
"name": "CVE-2014-9946",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9946"
},
{
"name": "CVE-2017-0612",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0612"
},
{
"name": "CVE-2017-0620",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0620"
},
{
"name": "CVE-2015-7555",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7555"
},
{
"name": "CVE-2017-0618",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0618"
},
{
"name": "CVE-2015-9005",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-9005"
},
{
"name": "CVE-2016-5859",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5859"
},
{
"name": "CVE-2016-1027",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1027"
},
{
"name": "CVE-2017-0613",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0613"
},
{
"name": "CVE-2017-0606",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0606"
},
{
"name": "CVE-2016-1029",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1029"
},
{
"name": "CVE-2017-0617",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0617"
},
{
"name": "CVE-2017-0619",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0619"
},
{
"name": "CVE-2017-0595",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0595"
},
{
"name": "CVE-2017-0624",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0624"
},
{
"name": "CVE-2014-9951",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9951"
},
{
"name": "CVE-2014-9928",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9928"
},
{
"name": "CVE-2017-0627",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0627"
},
{
"name": "CVE-2015-9006",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-9006"
},
{
"name": "CVE-2014-9943",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9943"
},
{
"name": "CVE-2016-5868",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5868"
},
{
"name": "CVE-2016-5854",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5854"
},
{
"name": "CVE-2017-0465",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0465"
},
{
"name": "CVE-2014-9926",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9926"
},
{
"name": "CVE-2017-0589",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0589"
},
{
"name": "CVE-2016-1024",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1024"
},
{
"name": "CVE-2017-0610",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0610"
},
{
"name": "CVE-2016-5867",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5867"
},
{
"name": "CVE-2016-5862",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5862"
},
{
"name": "CVE-2014-9952",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9952"
},
{
"name": "CVE-2014-9940",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9940"
},
{
"name": "CVE-2014-9930",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9930"
},
{
"name": "CVE-2015-9007",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-9007"
},
{
"name": "CVE-2017-0607",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0607"
},
{
"name": "CVE-2014-9950",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9950"
},
{
"name": "CVE-2017-0611",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0611"
},
{
"name": "CVE-2014-9948",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9948"
},
{
"name": "CVE-2014-9923",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9923"
},
{
"name": "CVE-2014-9927",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9927"
},
{
"name": "CVE-2014-9924",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9924"
},
{
"name": "CVE-2017-0598",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0598"
},
{
"name": "CVE-2017-0623",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0623"
},
{
"name": "CVE-2017-7184",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7184"
},
{
"name": "CVE-2016-5347",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5347"
},
{
"name": "CVE-2017-0631",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0631"
},
{
"name": "CVE-2017-0635",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0635"
},
{
"name": "CVE-2017-0608",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0608"
},
{
"name": "CVE-2017-0590",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0590"
},
{
"name": "CVE-2016-7056",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7056"
},
{
"name": "CVE-2017-0628",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0628"
},
{
"name": "CVE-2016-5131",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5131"
},
{
"name": "CVE-2017-0626",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0626"
},
{
"name": "CVE-2017-0622",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0622"
},
{
"name": "CVE-2014-9942",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9942"
},
{
"name": "CVE-2017-0587",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0587"
}
],
"initial_release_date": "2017-05-02T00:00:00",
"last_revision_date": "2017-05-02T00:00:00",
"links": [],
"reference": "CERTFR-2017-AVI-135",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2017-05-02T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eGoogle Android (Nexus)\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire\n\u00e0 distance, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la\nconfidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Google Android (Nexus)",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Android du 01 mai 2017",
"url": "https://source.android.com/security/bulletin/2017-05-01"
}
]
}
GHSA-28V2-8GQW-GMQ2
Vulnerability from github – Published: 2022-05-17 02:42 – Updated: 2023-01-26 21:30Adobe Flash Player before 18.0.0.343 and 19.x through 21.x before 21.0.0.213 on Windows and OS X and before 11.2.202.616 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-1012, CVE-2016-1020, CVE-2016-1021, CVE-2016-1022, CVE-2016-1023, CVE-2016-1025, CVE-2016-1026, CVE-2016-1027, CVE-2016-1028, CVE-2016-1029, CVE-2016-1032, and CVE-2016-1033.
{
"affected": [],
"aliases": [
"CVE-2016-1024"
],
"database_specific": {
"cwe_ids": [
"CWE-119",
"CWE-787"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2016-04-09T01:59:00Z",
"severity": "CRITICAL"
},
"details": "Adobe Flash Player before 18.0.0.343 and 19.x through 21.x before 21.0.0.213 on Windows and OS X and before 11.2.202.616 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-1012, CVE-2016-1020, CVE-2016-1021, CVE-2016-1022, CVE-2016-1023, CVE-2016-1025, CVE-2016-1026, CVE-2016-1027, CVE-2016-1028, CVE-2016-1029, CVE-2016-1032, and CVE-2016-1033.",
"id": "GHSA-28v2-8gqw-gmq2",
"modified": "2023-01-26T21:30:31Z",
"published": "2022-05-17T02:42:42Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1024"
},
{
"type": "WEB",
"url": "https://helpx.adobe.com/security/products/flash-player/apsb16-10.html"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00044.html"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00045.html"
},
{
"type": "WEB",
"url": "http://rhn.redhat.com/errata/RHSA-2016-0610.html"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/bid/85932"
},
{
"type": "WEB",
"url": "http://www.securitytracker.com/id/1035509"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
]
}
CVE-2016-1024
Vulnerability from fstec - Published: 09.04.2016{
"CVSS 2.0": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS 3.0": null,
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "Adobe Systems Inc.",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "\u0434\u043e 18.0.0.343 (Flash Player), \u043e\u0442 19.0 \u0434\u043e 21.0.0.213 (Flash Player), \u0434\u043e 11.2.202.616 (Flash Player)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b Flash Player \u0434\u043b\u044f Windows \u0438 Mac OS X \u0434\u043e \u0432\u0435\u0440\u0441\u0438\u0438 18.0.0.343, 21.0.0.213 \u0438\u043b\u0438 \u043d\u043e\u0432\u0435\u0435, \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b Flash Player \u0434\u043b\u044f Linux \u0434\u043e \u0432\u0435\u0440\u0441\u0438\u0438 11.2.202.616 \u0438\u043b\u0438 \u0431\u043e\u043b\u0435\u0435 \u043d\u043e\u0432\u043e\u0439",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "09.04.2016",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "23.03.2021",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "25.04.2016",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2016-00985",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2016-1024",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "Flash Player",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": "\u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Linux . 64-bit, \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Linux . 32-bit, Apple Inc. MacOS X 32-bit, \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Linux . PowerPC, Microsoft Corp Windows - 64-bit, Microsoft Corp Windows - 32-bit, Apple Inc. MacOS X 64-bit, Apple Inc. MacOS X PowerPC, \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Linux . ARM, Microsoft Corp Windows - ARM, Apple Inc. MacOS X ARM",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b Flash Player, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438 \u0438\u043b\u0438 \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u0434",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u0412\u044b\u0445\u043e\u0434 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u0438 \u0437\u0430 \u0433\u0440\u0430\u043d\u0438\u0446\u044b \u0431\u0443\u0444\u0435\u0440\u0430 \u0432 \u043f\u0430\u043c\u044f\u0442\u0438 (CWE-119)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b Flash Player \u0432\u044b\u0437\u0432\u0430\u043d\u0430 \u043f\u0435\u0440\u0435\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u0435\u043c \u0431\u0443\u0444\u0435\u0440\u0430. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e, \u0434\u0435\u0439\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u043c\u0443 \u0443\u0434\u0430\u043b\u0451\u043d\u043d\u043e, \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u0434 \u0438\u043b\u0438 \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438 (\u043f\u043e\u0432\u0440\u0435\u0436\u0434\u0435\u043d\u0438\u0435 \u043f\u0430\u043c\u044f\u0442\u0438)",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": "-",
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://helpx.adobe.com/security/products/flash-player/apsb16-10.html",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041f\u0440\u0438\u043a\u043b\u0430\u0434\u043d\u043e\u0435 \u041f\u041e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-119",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 10)"
}
CNVD-2016-02101
Vulnerability from cnvd - Published: 2016-04-11用户可参考如下厂商提供的安全补丁以修复该漏洞: https://helpx.adobe.com/security/products/flash-player/apsb16-10.html
| Name | ['Adobe Flash Player <18.0.0.343', 'Adobe Flash Player(on Windows/OS X) 19.x-21.x(<21.0.0.213)', 'Adobe Flash Player(on Linux) <11.2.202.616'] |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2016-1024"
}
},
"description": "Adobe Flash Player\u662f\u4e00\u6b3e\u8de8\u5e73\u53f0\u3001\u57fa\u4e8e\u6d4f\u89c8\u5668\u7684\u591a\u5a92\u4f53\u64ad\u653e\u5668\u4ea7\u54c1\u3002\r\n\r\nAdobe Flash Player\u5b58\u5728\u5185\u5b58\u7834\u574f\u6f0f\u6d1e\uff0c\u8fdc\u7a0b\u653b\u51fb\u53ef\u8005\u5229\u7528\u8be5\u6f0f\u6d1e\u6784\u5efa\u6076\u610fSWF\u5185\u5bb9\uff0c\u8bf1\u4f7f\u5e94\u7528\u89e3\u6790\uff0c\u53ef\u4f7f\u5e94\u7528\u7a0b\u5e8f\u5d29\u6e83\u6216\u6267\u884c\u4efb\u610f\u4ee3\u7801\u3002",
"discovererName": "willj of Tencent PC Manager",
"formalWay": "\u7528\u6237\u53ef\u53c2\u8003\u5982\u4e0b\u5382\u5546\u63d0\u4f9b\u7684\u5b89\u5168\u8865\u4e01\u4ee5\u4fee\u590d\u8be5\u6f0f\u6d1e\uff1a\r\nhttps://helpx.adobe.com/security/products/flash-player/apsb16-10.html",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2016-02101",
"openTime": "2016-04-11",
"patchDescription": "Adobe Flash Player\u662f\u4e00\u6b3e\u8de8\u5e73\u53f0\u3001\u57fa\u4e8e\u6d4f\u89c8\u5668\u7684\u591a\u5a92\u4f53\u64ad\u653e\u5668\u4ea7\u54c1\u3002\r\n\r\nAdobe Flash Player\u5b58\u5728\u5185\u5b58\u7834\u574f\u6f0f\u6d1e\uff0c\u8fdc\u7a0b\u653b\u51fb\u53ef\u8005\u5229\u7528\u8be5\u6f0f\u6d1e\u6784\u5efa\u6076\u610fSWF\u5185\u5bb9\uff0c\u8bf1\u4f7f\u5e94\u7528\u89e3\u6790\uff0c\u53ef\u4f7f\u5e94\u7528\u7a0b\u5e8f\u5d29\u6e83\u6216\u6267\u884c\u4efb\u610f\u4ee3\u7801\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "Adobe Flash Player\u5185\u5b58\u7834\u574f\u6f0f\u6d1e\uff08CNVD-2016-02101\uff09\u7684\u8865\u4e01",
"products": {
"product": [
"Adobe Flash Player \u003c18.0.0.343",
"Adobe Flash Player(on Windows/OS X) 19.x-21.x(\u003c21.0.0.213)",
"Adobe Flash Player(on Linux) \u003c11.2.202.616"
]
},
"referenceLink": "https://helpx.adobe.com/security/products/flash-player/apsb16-10.html",
"serverity": "\u9ad8",
"submitTime": "2016-04-09",
"title": "Adobe Flash Player\u5185\u5b58\u7834\u574f\u6f0f\u6d1e\uff08CNVD-2016-02101\uff09"
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.