VARIoT IoT vulnerabilities database
| VAR-201508-0603 | CVE-2015-2904 | Actiontec GT784WN Wireless N DSL Modem contains multiple vulnerabilities |
CVSS V2: 8.3 CVSS V3: - Severity: HIGH |
Actiontec GT784WN modems with firmware before NCS01-1.0.13 have hardcoded credentials, which makes it easier for remote attackers to obtain root access by connecting to the web administration interface. Actiontec GT784WN Wireless N DSL Modem, versions NCS01-1.0.12 and earlier, contains multiple vulnerabilities. Actiontec GT784WN Since the modem firmware has hard-coded authentication information, root There is a vulnerability that can gain access. Supplementary information : CWE Vulnerability type by CWE-798: Use of Hard-coded Credentials ( Using hard-coded credentials ) Has been identified. The Actiontec GT784WN is a DSL (Digital Subscriber Line) modem router from Actiontec, USA
| VAR-201508-0605 | CVE-2015-2906 | Mobile Devices C4 ODB2 dongle contains multiple vulnerabilities |
CVSS V2: 9.0 CVSS V3: - Severity: HIGH |
Mobile Devices (aka MDI) C4 OBD-II dongles with firmware 2.x and 3.4.x, as used in Metromile Pulse and other products, store SSH private keys that are the same across different customers' installations, which makes it easier for remote attackers to obtain access by leveraging knowledge of a private key from another installation. Mobile Devices C4 OBD2 dongle, and potentially other rebranded devices, contains multiple vulnerabilities. ** Unsettled ** This case has not been confirmed as a vulnerability. The vendor says, “This is for developers. / Due to a problem with the debugging device, it is not included in the device for general customers, but is fixed at the current release ( Invalidation ) Has been announced. " Supplementary information : CWE Vulnerability type by CWE-321: Use of Hard-coded Cryptographic Key ( Using hard-coded encryption keys ) Has been identified. http://cwe.mitre.org/data/definitions/321.htmlAn access right may be obtained by using a private key information from another installation by a third party. Metromile Pulse (formerly known as Metronome) is a set of auto insurance business software from Metromile Company in the United States that reads the mileage of the vehicle through OBD2 (on-board diagnostic system) and charges according to the mileage. The software supports mobile network and built-in GPS, and retrieves lost vehicles through positioning. The vulnerability stems from the fact that different user installers store the same private SSH key
| VAR-201508-0604 | CVE-2015-2905 | Actiontec GT784WN Modem Cross-Site Request Forgery Vulnerability |
CVSS V2: 6.8 CVSS V3: - Severity: MEDIUM |
Cross-site request forgery (CSRF) vulnerability on Actiontec GT784WN modems with firmware before NCS01-1.0.13 allows remote attackers to hijack the authentication or intranet connectivity of arbitrary users. Actiontec GT784WN Wireless N DSL Modem, versions NCS01-1.0.12 and earlier, contains multiple vulnerabilities. The Actiontec GT784WN is a DSL (Digital Subscriber Line) modem router from Actiontec, USA
| VAR-201508-0607 | CVE-2015-2908 | Mobile Devices C4 ODB2 dongle contains multiple vulnerabilities |
CVSS V2: 9.0 CVSS V3: - Severity: HIGH |
Mobile Devices (aka MDI) C4 OBD-II dongles with firmware 2.x and 3.4.x, as used in Metromile Pulse and other products, do not validate firmware updates, which allows remote attackers to execute arbitrary code by specifying an update server. Mobile Devices C4 OBD2 dongle, and potentially other rebranded devices, contains multiple vulnerabilities. ** Unsettled ** This case has not been confirmed as a vulnerability. The vendor is (1) This is for developers / This is a bug in the debugging device. 3 It has been corrected a year ago. Local connection is enabled in the developer version (2) This problem, SMS Is valid, or 3 It only occurs with older software older than a year. " Supplementary information : CWE Vulnerability type by CWE-345: Insufficient Verification of Data Authenticity ( Inadequate verification of data reliability ) Has been identified. http://cwe.mitre.org/data/definitions/345.htmlArbitrary code may be executed by a third party by specifying the update server. Metromile Pulse (formerly known as Metronome) is a set of auto insurance business software from Metromile Company in the United States that reads the mileage of the vehicle through OBD2 (on-board diagnostic system) and charges according to the mileage. The software supports mobile network and built-in GPS, and retrieves lost vehicles through positioning
| VAR-201508-0606 | CVE-2015-2907 | Mobile Devices C4 ODB2 dongle contains multiple vulnerabilities |
CVSS V2: 9.0 CVSS V3: - Severity: HIGH |
Mobile Devices (aka MDI) C4 OBD-II dongles with firmware 2.x and 3.4.x, as used in Metromile Pulse and other products, have hardcoded SSH credentials, which makes it easier for remote attackers to obtain access by leveraging knowledge of the required username and password. Mobile Devices C4 OBD2 dongle, and potentially other rebranded devices, contains multiple vulnerabilities. ** Unsettled ** This case has not been confirmed as a vulnerability. The vendor says, “This is for developers. / Due to a problem with the debugging device, it is not included in the device for general customers, but is fixed at the current release ( Invalidation ) Has been announced. " Supplementary information : CWE Vulnerability type by CWE-798: Use of Hard-coded Credentials ( Using hard-coded credentials ) Has been identified. http://cwe.mitre.org/data/definitions/798.htmlAn access right may be obtained by using the requested user name and password information by a third party. A remote attacker could exploit the vulnerability with a known username and password to gain access. Metromile Pulse (formerly known as Metronome) is a set of auto insurance business software from Metromile Company in the United States that reads the mileage of the vehicle through OBD2 (on-board diagnostic system) and charges according to the mileage. The software supports mobile network and built-in GPS, and retrieves lost vehicles through positioning
| VAR-201508-0294 | CVE-2015-5125 | Adobe Flash Player and Adobe AIR Service disruption in (DoS) Vulnerabilities |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
Adobe Flash Player before 18.0.0.232 on Windows and OS X and before 11.2.202.508 on Linux, Adobe AIR before 18.0.0.199, Adobe AIR SDK before 18.0.0.199, and Adobe AIR SDK & Compiler before 18.0.0.199 allow attackers to cause a denial of service (vector-length corruption) or possibly have unspecified other impact via unknown vectors. Adobe Flash Player and AIR are prone to multiple memory-corruption vulnerabilities.
An attacker can exploit these issues to execute arbitrary code in the context of the application or cause denial-of-service conditions. A memory corruption vulnerability exists in several Adobe products. Attackers can exploit this vulnerability to cause denial of service (vector-length corruption). The following products and versions are affected: Adobe Flash Player Desktop Runtime 18.0.0.209 and earlier versions and Adobe Flash Player Extended Support Release 13.0.0.309 and earlier versions based on Windows and Macintosh platforms, Adobe Flash Player for Windows, Macintosh and Linux platforms Google Chrome 18.0.0.209 and earlier, Adobe Flash Player for Microsoft Edge and Internet Explorer 11 on Windows 10 18.0.0.209 and earlier, Adobe Flash Player for Internet Explorer 10 and 11 18.0.0.209 on Windows 8.0 and 8.1 and previous versions, Adobe Flash Player for Linux 11.2.202.491 and previous versions based on Linux platforms, AIR Desktop Runtime 18.0.0.180 and previous versions based on Windows and Macintosh platforms, and AIR SDK 18.0 based on Windows, Macintosh, Android and iOS platforms. 0.180 and earlier and AIR SDK & Compiler 18.0.0.180 and earlier. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05390722
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: c05390722
Version: 1
HPSBMU03691 rev.1 - HPE Insight Control, Multiple Remote Vulnerabilities
NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.
Release Date: 2017-02-14
Last Updated: 2017-02-14
Potential Security Impact: Local: Denial of Service (DoS); Remote: Access
Restriction Bypass, Cross-Site Request Forgery (CSRF), Cross-Site Scripting
(XSS), Denial of Service (DoS), Disclosure of Sensitive Information,
Execution of Arbitrary Commands, Unauthorized Modification
Source: Hewlett Packard Enterprise, Product Security Response Team
VULNERABILITY SUMMARY
Several potential security vulnerabilities have been identified in HPE
Insight Control. The vulnerabilities could be exploited remotely resulting in
remote denial of Service (DoS), cross-site request forgery (CSRF), remote
execution of arbitrary commands, disclosure of sensitive information,
cross-site scripting (XSS), bypass access restriction or unauthorized
modification.
References:
- CVE-2009-5028 - Namazu Remote Denial of Service
- CVE-2011-4345 - Namazu Cross-site Scripting
- CVE-2014-0050 - Apache Commons Collection Unauthorized Disclosure of
Information
- CVE-2014-4877 - GNU Wget, Unauthorized Disclosure of Information
- CVE-2015-5125 - Adobe Flash, Unauthorized Disclosure of Information
- CVE-2015-5127 - Adobe Flash, Unauthorized Disclosure of Information
- CVE-2015-5129 - Adobe Flash, Unauthorized Disclosure of Information
- CVE-2015-5130 - Adobe Flash, Unauthorized Disclosure of Information
- CVE-2015-5131 - Adobe Flash, Unauthorized Disclosure of Information
- CVE-2015-5132 - Adobe Flash, Unauthorized Disclosure of Information
- CVE-2015-5133 - Adobe Flash, Unauthorized Disclosure of Information
- CVE-2015-5134 - Adobe Flash, Unauthorized Disclosure of Information
- CVE-2015-5539 - Adobe Flash, Unauthorized Disclosure of Information
- CVE-2015-5540 - Adobe Flash, Unauthorized Disclosure of Information
- CVE-2015-5541 - Adobe Flash, Unauthorized Disclosure of Information
- CVE-2015-5544 - Adobe Flash, Unauthorized Disclosure of Information
- CVE-2015-5545 - Adobe Flash, Unauthorized Disclosure of Information
- CVE-2015-5546 - Adobe Flash, Unauthorized Disclosure of Information
- CVE-2015-5547 - Adobe Flash, Unauthorized Disclosure of Information
- CVE-2015-5548 - Adobe Flash, Unauthorized Disclosure of Information
- CVE-2015-5549 - Adobe Flash, Unauthorized Disclosure of Information
- CVE-2015-5550 - Adobe Flash, Unauthorized Disclosure of Information
- CVE-2015-5551 - Adobe Flash, Unauthorized Disclosure of Information
- CVE-2015-5552 - Adobe Flash, Unauthorized Disclosure of Information
- CVE-2015-5553 - Adobe Flash, Unauthorized Disclosure of Information
- CVE-2015-5554 - Adobe Flash, Unauthorized Disclosure of Information
- CVE-2015-5555 - Adobe Flash, Unauthorized Disclosure of Information
- CVE-2015-5556 - Adobe Flash, Unauthorized Disclosure of Information
- CVE-2015-5557 - Adobe Flash, Unauthorized Disclosure of Information
- CVE-2015-5558 - Adobe Flash, Unauthorized Disclosure of Information
- CVE-2015-5559 - Adobe Flash, Unauthorized Disclosure of Information
- CVE-2015-5560 - Adobe Flash, Unauthorized Disclosure of Information
- CVE-2015-5561 - Adobe Flash, Unauthorized Disclosure of Information
- CVE-2015-5562 - Adobe Flash, Unauthorized Disclosure of Information
- CVE-2015-5563 - Adobe Flash, Unauthorized Disclosure of Information
- CVE-2015-5564 - Adobe Flash, Unauthorized Disclosure of Information
- CVE-2015-5565 - Adobe Flash, Unauthorized Disclosure of Information
- CVE-2015-5566 - Adobe Flash, Unauthorized Disclosure of Information
- CVE-2015-5567 - Adobe Flash, Unauthorized Disclosure of Information
- CVE-2015-5568 - Adobe Flash, Unauthorized Disclosure of Information
- CVE-2015-5570 - Adobe Flash, Unauthorized Disclosure of Information
- CVE-2015-5571 - Adobe Flash, Unauthorized Disclosure of Information
- CVE-2015-5572 - Adobe Flash, Unauthorized Disclosure of Information
- CVE-2015-5573 - Adobe Flash, Unauthorized Disclosure of Information
- CVE-2015-5574 - Adobe Flash, Unauthorized Disclosure of Information
- CVE-2015-5575 - Adobe Flash, Unauthorized Disclosure of Information
- CVE-2015-5576 - Adobe Flash, Unauthorized Disclosure of Information
- CVE-2015-5577 - Adobe Flash, Unauthorized Disclosure of Information
- CVE-2015-5578 - Adobe Flash, Unauthorized Disclosure of Information
- CVE-2015-5579 - Adobe Flash, Unauthorized Disclosure of Information
- CVE-2015-5580 - Adobe Flash, Unauthorized Disclosure of Information
- CVE-2015-5581 - Adobe Flash, Unauthorized Disclosure of Information
- CVE-2015-5582 - Adobe Flash, Unauthorized Disclosure of Information
- CVE-2015-5584 - Adobe Flash, Unauthorized Disclosure of Information
- CVE-2015-5587 - Adobe Flash, Unauthorized Disclosure of Information
- CVE-2015-5588 - Adobe Flash, Unauthorized Disclosure of Information
- CVE-2015-6420 - Adobe Flash, Unauthorized Disclosure of Information
- CVE-2015-6676 - Adobe Flash, Unauthorized Disclosure of Information
- CVE-2015-6677 - Adobe Flash, Unauthorized Disclosure of Information
- CVE-2015-6678 - Adobe Flash, Unauthorized Disclosure of Information
- CVE-2015-6679 - Adobe Flash, Unauthorized Disclosure of Information
- CVE-2015-6682 - Adobe Flash, Unauthorized Disclosure of Information
- CVE-2015-7547 - Adobe Flash, Unauthorized Disclosure of Information
- CVE-2015-8044 - Adobe Flash, Unauthorized Disclosure of Information
- CVE-2015-8415 - Adobe Flash, Unauthorized Disclosure of Information
- CVE-2015-8416 - Adobe Flash, Unauthorized Disclosure of Information
- CVE-2015-8417 - Adobe Flash, Unauthorized Disclosure of Information
- CVE-2015-8418 - Adobe Flash, Unauthorized Disclosure of Information
- CVE-2015-8419 - Adobe Flash, Unauthorized Disclosure of Information
- CVE-2015-8420 - Adobe Flash, Unauthorized Disclosure of Information
- CVE-2015-8421 - Adobe Flash, Unauthorized Disclosure of Information
- CVE-2015-8422 - Adobe Flash, Unauthorized Disclosure of Information
- CVE-2015-8423 - Adobe Flash, Unauthorized Disclosure of Information
- CVE-2015-8424 - Adobe Flash, Unauthorized Disclosure of Information
- CVE-2015-8425 - Adobe Flash, Unauthorized Disclosure of Information
- CVE-2015-8426 - Adobe Flash, Unauthorized Disclosure of Information
- CVE-2015-8427 - Adobe Flash, Unauthorized Disclosure of Information
- CVE-2015-8428 - Adobe Flash, Unauthorized Disclosure of Information
- CVE-2015-8429 - Adobe Flash, Unauthorized Disclosure of Information
- CVE-2015-8430 - Adobe Flash, Unauthorized Disclosure of Information
- CVE-2015-8431 - Adobe Flash, Unauthorized Disclosure of Information
- CVE-2015-8432 - Adobe Flash, Unauthorized Disclosure of Information
- CVE-2015-8433 - Adobe Flash, Unauthorized Disclosure of Information
- CVE-2015-8434 - Adobe Flash, Unauthorized Disclosure of Information
- CVE-2015-8435 - Adobe Flash, Unauthorized Disclosure of Information
- CVE-2015-8436 - Adobe Flash, Unauthorized Disclosure of Information
- CVE-2015-8437 - Adobe Flash, Unauthorized Disclosure of Information
- CVE-2015-8438 - Adobe Flash, Unauthorized Disclosure of Information
- CVE-2015-8439 - Adobe Flash, Unauthorized Disclosure of Information
- CVE-2015-8440 - Adobe Flash, Unauthorized Disclosure of Information
- CVE-2015-8441 - Adobe Flash, Unauthorized Disclosure of Information
- CVE-2015-8442 - Adobe Flash, Unauthorized Disclosure of Information
- CVE-2015-8443 - Adobe Flash, Unauthorized Disclosure of Information
- CVE-2015-8444 - Adobe Flash, Unauthorized Disclosure of Information
- CVE-2015-8445 - Adobe Flash, Unauthorized Disclosure of Information
- CVE-2015-8446 - Adobe Flash, Unauthorized Disclosure of Information
- CVE-2015-8447 - Adobe Flash, Unauthorized Disclosure of Information
- CVE-2015-8448 - Adobe Flash, Unauthorized Disclosure of Information
- CVE-2015-8449 - Adobe Flash, Unauthorized Disclosure of Information
- CVE-2015-8450 - Adobe Flash, Unauthorized Disclosure of Information
- CVE-2015-8451 - Adobe Flash, Unauthorized Disclosure of Information
- CVE-2015-8452 - Adobe Flash, Unauthorized Disclosure of Information
- CVE-2015-8453 - Adobe Flash, Unauthorized Disclosure of Information
- CVE-2015-8454 - Adobe Flash, Unauthorized Disclosure of Information
- CVE-2015-8455 - Adobe Flash, Unauthorized Disclosure of Information
- CVE-2015-8456 - Adobe Flash, Unauthorized Disclosure of Information
- CVE-2015-8457 - Adobe Flash, Unauthorized Disclosure of Information
- CVE-2015-8459 - Adobe Flash, Unauthorized Disclosure of Information
- CVE-2015-8460 - Adobe Flash, Unauthorized Disclosure of Information
- CVE-2015-8634 - Adobe Flash, Unauthorized Disclosure of Information
- CVE-2015-8635 - Adobe Flash, Unauthorized Disclosure of Information
- CVE-2015-8636 - Adobe Flash, Unauthorized Disclosure of Information
- CVE-2015-8638 - Adobe Flash, Unauthorized Disclosure of Information
- CVE-2015-8639 - Adobe Flash, Unauthorized Disclosure of Information
- CVE-2015-8640 - Adobe Flash, Unauthorized Disclosure of Information
- CVE-2015-8641 - Adobe Flash, Unauthorized Disclosure of Information
- CVE-2015-8642 - Adobe Flash, Unauthorized Disclosure of Information
- CVE-2015-8643 - Adobe Flash, Unauthorized Disclosure of Information
- CVE-2015-8644 - Adobe Flash, Unauthorized Disclosure of Information
- CVE-2015-8645 - Adobe Flash, Unauthorized Disclosure of Information
- CVE-2015-8646 - Adobe Flash, Unauthorized Disclosure of Information
- CVE-2015-8647 - Adobe Flash, Unauthorized Disclosure of Information
- CVE-2015-8648 - Adobe Flash, Unauthorized Disclosure of Information
- CVE-2015-8649 - Adobe Flash, Unauthorized Disclosure of Information
- CVE-2015-8650 - Adobe Flash, Unauthorized Disclosure of Information
- CVE-2015-8651 - Adobe Flash, Unauthorized Disclosure of Information
- CVE-2016-0702 - Adobe Flash, Unauthorized Disclosure of Information
- CVE-2016-0705 - Adobe Flash, Unauthorized Disclosure of Information
- CVE-2016-0777 - Adobe Flash, Unauthorized Disclosure of Information
- CVE-2016-0778 - Adobe Flash, Unauthorized Disclosure of Information
- CVE-2016-0797 - Adobe Flash, Unauthorized Disclosure of Information
- CVE-2016-0799 - Adobe Flash, Unauthorized Disclosure of Information
- CVE-2016-1521 - Adobe Flash, Unauthorized Disclosure of Information
- CVE-2016-1907 - Adobe Flash, Unauthorized Disclosure of Information
- CVE-2016-2105 - Adobe Flash, Unauthorized Disclosure of Information
- CVE-2016-2106 - Adobe Flash, Unauthorized Disclosure of Information
- CVE-2016-2107 - Adobe Flash, Unauthorized Disclosure of Information
- CVE-2016-2109 - Adobe Flash, Unauthorized Disclosure of Information
- CVE-2016-2183 - Adobe Flash, Unauthorized Disclosure of Information
- CVE-2016-2842 - Adobe Flash, Unauthorized Disclosure of Information
- CVE-2016-3739 - Adobe Flash, Unauthorized Disclosure of Information
- CVE-2016-4070 - Adobe Flash, Unauthorized Disclosure of Information
- CVE-2016-4071 - Adobe Flash, Unauthorized Disclosure of Information
- CVE-2016-4072 - Adobe Flash, Unauthorized Disclosure of Information
- CVE-2016-4342 - Adobe Flash, Unauthorized Disclosure of Information
- CVE-2016-4343 - Adobe Flash, Unauthorized Disclosure of Information
- CVE-2016-4393 - Adobe Flash, Unauthorized Disclosure of Information
- CVE-2016-4394 - Adobe Flash, Unauthorized Disclosure of Information
- CVE-2016-4395 - Adobe Flash, Unauthorized Disclosure of Information
- CVE-2016-4396 - Adobe Flash, Unauthorized Disclosure of Information
- CVE-2016-4537 - Adobe Flash, Unauthorized Disclosure of Information
- CVE-2016-4538 - Adobe Flash, Unauthorized Disclosure of Information
- CVE-2016-4539 - Adobe Flash, Unauthorized Disclosure of Information
- CVE-2016-4540 - Adobe Flash, Unauthorized Disclosure of Information
- CVE-2016-4541 - Adobe Flash, Unauthorized Disclosure of Information
- CVE-2016-4542 - Adobe Flash, Unauthorized Disclosure of Information
- CVE-2016-4543 - Adobe Flash, Unauthorized Disclosure of Information
- CVE-2016-5385 - Adobe Flash, Unauthorized Disclosure of Information
- CVE-2016-5387 - Adobe Flash, Unauthorized Disclosure of Information
- CVE-2016-5388 - Adobe Flash, Unauthorized Disclosure of Information
- CVE-2017-5787 - DoS - LINUX VCRM
- CVE-2016-8517 - SIM
- CVE-2016-8516 - SIM
- CVE-2016-8518 - SIM
- CVE-2016-8513 - Cross-Site Request Forgery (CSRF) Linux VCRM
- CVE-2016-8515 - Malicious File Upload - Linux VCRM
- CVE-2016-8514 - Information Disclosure - Linux VCRM
SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
- HP Insight Control Prior to 7.6
- HPE System Management Homepage Prior to 7.6
- HP Systems Insight Manager (HP SIM), Software Prior to 7.6
- HPE Version Control Repository Manager Prior to 7.6
- HP Insight Control server provisioning Prior to 7.6
BACKGROUND
CVSS Base Metrics
=================
Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector
CVE-2009-5028
7.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVE-2011-4345
3.7 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
2.6 (AV:N/AC:H/Au:N/C:N/I:P/A:N)
CVE-2014-0050
7.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVE-2014-4877
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-5125
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5127
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5129
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5130
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5131
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5132
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5133
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5134
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5539
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5540
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5541
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5544
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5545
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5546
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5547
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5548
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5549
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5550
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5551
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5552
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5553
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5554
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5555
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5556
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5557
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5558
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5559
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5560
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5561
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5562
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5563
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5564
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5565
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5566
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5567
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5568
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5570
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5571
5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N)
CVE-2015-5572
5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)
CVE-2015-5573
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5574
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5575
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5576
5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)
CVE-2015-5577
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5578
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5579
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5580
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5581
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5582
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5584
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5587
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5588
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-6420
7.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVE-2015-6676
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-6677
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-6678
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-6679
5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)
CVE-2015-6682
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-7547
7.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CVE-2015-8044
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8415
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8416
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8417
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8418
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8419
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8420
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8421
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8422
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8423
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8424
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8425
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8426
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8427
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8428
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8429
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8430
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8431
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8432
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8433
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8434
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8435
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8436
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8437
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8438
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8439
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8440
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8441
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8442
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8443
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8444
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8445
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8446
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8447
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8448
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8449
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8450
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8451
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8452
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8453
5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N)
CVE-2015-8454
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8455
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8456
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8457
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8459
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8460
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8634
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8635
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8636
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8638
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8639
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8640
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8641
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8642
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8643
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8644
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8645
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8646
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8647
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8648
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8649
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8650
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8651
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2016-0702
4.0 CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1.9 (AV:L/AC:M/Au:N/C:P/I:N/A:N)
CVE-2016-0705
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2016-0777
4.3 CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
4.0 (AV:N/AC:L/Au:S/C:P/I:N/A:N)
CVE-2016-0778
5.0 CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
4.6 (AV:N/AC:H/Au:S/C:P/I:P/A:P)
CVE-2016-0797
5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)
CVE-2016-0799
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2016-1521
7.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CVE-2016-1907
5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)
CVE-2016-2105
5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)
CVE-2016-2106
5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)
CVE-2016-2107
3.7 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
2.6 (AV:N/AC:H/Au:N/C:P/I:N/A:N)
CVE-2016-2109
7.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.8 (AV:N/AC:L/Au:N/C:N/I:N/A:C)
CVE-2016-2183
5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)
CVE-2016-2842
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2016-3739
3.7 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
2.6 (AV:N/AC:H/Au:N/C:N/I:P/A:N)
CVE-2016-4070
5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)
CVE-2016-4071
7.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVE-2016-4072
7.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVE-2016-4342
8.6 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H
8.3 (AV:N/AC:M/Au:N/C:P/I:P/A:C)
CVE-2016-4343
7.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CVE-2016-4393
4.3 CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
3.5 (AV:N/AC:M/Au:S/C:N/I:P/A:N)
CVE-2016-4394
6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
5.8 (AV:N/AC:M/Au:N/C:N/I:P/A:P)
CVE-2016-4395
7.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
7.8 (AV:N/AC:L/Au:N/C:N/I:C/A:N)
CVE-2016-4396
7.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
7.8 (AV:N/AC:L/Au:N/C:N/I:C/A:N)
CVE-2016-4537
7.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVE-2016-4538
7.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVE-2016-4539
7.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVE-2016-4540
7.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVE-2016-4541
7.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVE-2016-4542
7.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVE-2016-4543
7.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVE-2016-5385
5.6 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
5.1 (AV:N/AC:H/Au:N/C:P/I:P/A:P)
CVE-2016-5387
5.6 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
5.1 (AV:N/AC:H/Au:N/C:P/I:P/A:P)
CVE-2016-5388
5.6 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
5.1 (AV:N/AC:H/Au:N/C:P/I:P/A:P)
CVE-2016-8513
5.7 CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N
6.8 (AV:N/AC:L/Au:S/C:C/I:N/A:N)
CVE-2016-8514
5.7 CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N
6.8 (AV:N/AC:L/Au:S/C:C/I:N/A:N)
CVE-2016-8515
3.5 CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N
4.0 (AV:N/AC:L/Au:S/C:P/I:N/A:N)
CVE-2016-8516
3.3 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
4.0 (AV:N/AC:L/Au:S/C:N/I:N/A:P)
CVE-2016-8517
6.8 CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N
7.9 (AV:N/AC:M/Au:S/C:C/I:C/A:N)
CVE-2016-8518
7.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.8 (AV:N/AC:L/Au:N/C:N/I:C/A:N)
CVE-2017-5787
5.7 CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H
6.8 (AV:N/AC:L/Au:S/C:N/I:N/A:C)
Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499
RESOLUTION
HPE has released the following software updates to resolve these
vulnerabilities in HPE Insight Control. The HPE Insight Control 7.6 Update
kit applicable to HPE Insight Control 7.6 installations is available at the
following location:
<https://h20392.www2.hpe.com/portal/swdepot/displayProductInfo.do?productNumb
r=IMDVD>
HPE has addressed these vulnerabilities for the impacted software components
bundled with HPE Insight Control in the following HPE Security Bulletins:
HPE Systems Insight Manager (SIM) (HPE Security Bulletin: HPSBMU03668)
*
<https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05356388>
HPE System Management Homepage (SMH) (HPE Security Bulletin: HPSBMU03593)
*
<http://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05320149>
Version Control Repository Manager (VCRM) (HPE Security Bulletin:
HPSBMU03684)
*
<https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05356363>
HPE Insight Control server provisioning (HPE Security Bulletin: HPSBMU03685)
*
<http://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05376917>
HISTORY
Version:1 (rev.1) - 14 February 2017 Initial release
Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.
Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-alert@hpe.com.
Report: To report a potential security vulnerability for any HPE supported
product:
Web form: https://www.hpe.com/info/report-security-vulnerability
Email: security-alert@hpe.com
Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice
Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive
Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.
3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX
Copyright 2016 Hewlett Packard Enterprise
Hewlett Packard Enterprise shall not be liable for technical or editorial
errors or omissions contained herein. The information provided is provided
"as is" without warranty of any kind. To the extent permitted by law, neither
HP or its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice. Hewlett
Packard Enterprise and the names of Hewlett Packard Enterprise products
referenced herein are trademarks of Hewlett Packard Enterprise in the United
States and other countries. Other product and company names mentioned herein
may be trademarks of their respective owners.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iQEcBAEBCAAGBQJYozemAAoJELXhAxt7SZaiyq8H/Rlxf8UBpl53oh8s78cun1AA
1hTA/MO+IhKr2QRhjRTNvoh6ccVzcAIQfwovPQKWfBDgB+rTH7Qt7G9Kp5VcTFXI
c+oObVcNXRHrquROlddOGM9cQPtWUJU1ZiPcVPT0sGJo7wNAPBO2/QjicOfDgtz5
thrXhlQRp+eOUdHoDlpkqdinwSZG0f/Zdc0AAEetCatj7sGbugLFp8A9dE4CMtnG
r/8Xpa7sFaHtJioCVYar4wP0fMU8ldW0ood8OIj5arkdiTSAfHsxpNhlTAkyMhBP
JrzUZ9bkmX8ZJKeV4l60vEcPsqeGN6tkX6CZ6a82lOoHkPzdIKAiBQUlAcAUFdk=
=wHFj
-----END PGP SIGNATURE-----
.
Background
==========
The Adobe Flash Player is a renderer for the SWF file format, which is
commonly used to provide interactive websites.
Please review the CVE identifiers referenced below for details.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All Adobe Flash Player users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot -v ">=www-plugins/adobe-flash-11.2.202.508"
References
==========
[ 1 ] CVE-2015-3107
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3107
[ 2 ] CVE-2015-5122
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5122
[ 3 ] CVE-2015-5123
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5123
[ 4 ] CVE-2015-5124
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5124
[ 5 ] CVE-2015-5125
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5125
[ 6 ] CVE-2015-5127
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5127
[ 7 ] CVE-2015-5129
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5129
[ 8 ] CVE-2015-5130
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5130
[ 9 ] CVE-2015-5131
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5131
[ 10 ] CVE-2015-5132
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5132
[ 11 ] CVE-2015-5133
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5133
[ 12 ] CVE-2015-5134
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5134
[ 13 ] CVE-2015-5539
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5539
[ 14 ] CVE-2015-5540
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5540
[ 15 ] CVE-2015-5541
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5541
[ 16 ] CVE-2015-5544
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5544
[ 17 ] CVE-2015-5545
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5545
[ 18 ] CVE-2015-5546
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5546
[ 19 ] CVE-2015-5547
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5547
[ 20 ] CVE-2015-5548
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5548
[ 21 ] CVE-2015-5549
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5549
[ 22 ] CVE-2015-5550
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5550
[ 23 ] CVE-2015-5551
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5551
[ 24 ] CVE-2015-5552
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5552
[ 25 ] CVE-2015-5553
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5553
[ 26 ] CVE-2015-5554
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5554
[ 27 ] CVE-2015-5555
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5555
[ 28 ] CVE-2015-5556
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5556
[ 29 ] CVE-2015-5557
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5557
[ 30 ] CVE-2015-5558
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5558
[ 31 ] CVE-2015-5559
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5559
[ 32 ] CVE-2015-5560
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5560
[ 33 ] CVE-2015-5561
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5561
[ 34 ] CVE-2015-5562
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5562
[ 35 ] CVE-2015-5563
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5563
[ 36 ] CVE-2015-5564
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5564
[ 37 ] CVE-2015-5965
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5965
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/201508-01
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2015 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
| VAR-201508-0300 | CVE-2015-5133 | Adobe Flash Player and Adobe AIR Vulnerable to buffer overflow |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
Buffer overflow in Adobe Flash Player before 18.0.0.232 on Windows and OS X and before 11.2.202.508 on Linux, Adobe AIR before 18.0.0.199, Adobe AIR SDK before 18.0.0.199, and Adobe AIR SDK & Compiler before 18.0.0.199 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-5131 and CVE-2015-5132. This vulnerability CVE-2015-5131 and CVE-2015-5132 Is a different vulnerability.An attacker could execute arbitrary code. The following products and versions are affected: Adobe Flash Player Desktop Runtime 18.0.0.209 and earlier versions and Adobe Flash Player Extended Support Release 13.0.0.309 and earlier versions based on Windows and Macintosh platforms, Adobe Flash Player for Windows, Macintosh and Linux platforms Google Chrome 18.0.0.209 and earlier, Adobe Flash Player for Microsoft Edge and Internet Explorer 11 on Windows 10 18.0.0.209 and earlier, Adobe Flash Player for Internet Explorer 10 and 11 18.0.0.209 on Windows 8.0 and 8.1 and previous versions, Adobe Flash Player for Linux 11.2.202.491 and previous versions based on Linux platforms, AIR Desktop Runtime 18.0.0.180 and previous versions based on Windows and Macintosh platforms, and AIR SDK 18.0 based on Windows, Macintosh, Android and iOS platforms. 0.180 and earlier and AIR SDK & Compiler 18.0.0.180 and earlier. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Critical: flash-plugin security update
Advisory ID: RHSA-2015:1603-01
Product: Red Hat Enterprise Linux Supplementary
Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1603.html
Issue date: 2015-08-12
CVE Names: CVE-2015-5127 CVE-2015-5128 CVE-2015-5129
CVE-2015-5130 CVE-2015-5131 CVE-2015-5132
CVE-2015-5133 CVE-2015-5134 CVE-2015-5539
CVE-2015-5540 CVE-2015-5541 CVE-2015-5544
CVE-2015-5545 CVE-2015-5546 CVE-2015-5547
CVE-2015-5548 CVE-2015-5549 CVE-2015-5550
CVE-2015-5551 CVE-2015-5552 CVE-2015-5553
CVE-2015-5554 CVE-2015-5555 CVE-2015-5556
CVE-2015-5557 CVE-2015-5558 CVE-2015-5559
CVE-2015-5560 CVE-2015-5561 CVE-2015-5562
CVE-2015-5563 CVE-2015-5564
=====================================================================
1. Summary:
An updated Adobe Flash Player package that fixes multiple security issues
is now available for Red Hat Enterprise Linux 5 and 6 Supplementary.
Red Hat Product Security has rated this update as having Critical security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Desktop Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64
3. Description:
The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash
Player web browser plug-in. These
vulnerabilities are detailed in the Adobe Security Bulletin APSB15-19
listed in the References section.
Multiple flaws were found in the way flash-plugin displayed certain SWF
content. An attacker could use these flaws to create a specially crafted
SWF file that would cause flash-plugin to crash or, potentially, execute
arbitrary code when the victim loaded a page containing the malicious SWF
content. (CVE-2015-5127, CVE-2015-5128, CVE-2015-5129, CVE-2015-5130,
CVE-2015-5131, CVE-2015-5132, CVE-2015-5133, CVE-2015-5134, CVE-2015-5539,
CVE-2015-5540, CVE-2015-5541, CVE-2015-5544, CVE-2015-5545, CVE-2015-5546,
CVE-2015-5547, CVE-2015-5548, CVE-2015-5549, CVE-2015-5550, CVE-2015-5551,
CVE-2015-5552, CVE-2015-5553, CVE-2015-5554, CVE-2015-5555, CVE-2015-5556,
CVE-2015-5557, CVE-2015-5558, CVE-2015-5559, CVE-2015-5560, CVE-2015-5561,
CVE-2015-5562, CVE-2015-5563, CVE-2015-5564)
All users of Adobe Flash Player should install this updated package, which
upgrades Flash Player to version 11.2.202.508.
4. Solution:
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1252697 - flash-plugin: multiple code execution flaws (APSB15-19)
6. Package List:
Red Hat Enterprise Linux Desktop Supplementary (v. 5):
i386:
flash-plugin-11.2.202.508-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.508-1.el5.i386.rpm
Red Hat Enterprise Linux Server Supplementary (v. 5):
i386:
flash-plugin-11.2.202.508-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.508-1.el5.i386.rpm
Red Hat Enterprise Linux Desktop Supplementary (v. 6):
i386:
flash-plugin-11.2.202.508-1.el6_7.i686.rpm
x86_64:
flash-plugin-11.2.202.508-1.el6_7.i686.rpm
Red Hat Enterprise Linux Server Supplementary (v. 6):
i386:
flash-plugin-11.2.202.508-1.el6_7.i686.rpm
x86_64:
flash-plugin-11.2.202.508-1.el6_7.i686.rpm
Red Hat Enterprise Linux Workstation Supplementary (v. 6):
i386:
flash-plugin-11.2.202.508-1.el6_7.i686.rpm
x86_64:
flash-plugin-11.2.202.508-1.el6_7.i686.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2015-5127
https://access.redhat.com/security/cve/CVE-2015-5128
https://access.redhat.com/security/cve/CVE-2015-5129
https://access.redhat.com/security/cve/CVE-2015-5130
https://access.redhat.com/security/cve/CVE-2015-5131
https://access.redhat.com/security/cve/CVE-2015-5132
https://access.redhat.com/security/cve/CVE-2015-5133
https://access.redhat.com/security/cve/CVE-2015-5134
https://access.redhat.com/security/cve/CVE-2015-5539
https://access.redhat.com/security/cve/CVE-2015-5540
https://access.redhat.com/security/cve/CVE-2015-5541
https://access.redhat.com/security/cve/CVE-2015-5544
https://access.redhat.com/security/cve/CVE-2015-5545
https://access.redhat.com/security/cve/CVE-2015-5546
https://access.redhat.com/security/cve/CVE-2015-5547
https://access.redhat.com/security/cve/CVE-2015-5548
https://access.redhat.com/security/cve/CVE-2015-5549
https://access.redhat.com/security/cve/CVE-2015-5550
https://access.redhat.com/security/cve/CVE-2015-5551
https://access.redhat.com/security/cve/CVE-2015-5552
https://access.redhat.com/security/cve/CVE-2015-5553
https://access.redhat.com/security/cve/CVE-2015-5554
https://access.redhat.com/security/cve/CVE-2015-5555
https://access.redhat.com/security/cve/CVE-2015-5556
https://access.redhat.com/security/cve/CVE-2015-5557
https://access.redhat.com/security/cve/CVE-2015-5558
https://access.redhat.com/security/cve/CVE-2015-5559
https://access.redhat.com/security/cve/CVE-2015-5560
https://access.redhat.com/security/cve/CVE-2015-5561
https://access.redhat.com/security/cve/CVE-2015-5562
https://access.redhat.com/security/cve/CVE-2015-5563
https://access.redhat.com/security/cve/CVE-2015-5564
https://access.redhat.com/security/updates/classification/#critical
https://helpx.adobe.com/security/products/flash-player/apsb15-19.html
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2015 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iD8DBQFVy2mAXlSAg2UNWIIRAty7AKCcTl+pzRlPMcYb+ESu7xg0C9nkVwCfbcNj
SwY72oO+5brzzyYR9NLDDnE=
=izmD
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
.
Background
==========
The Adobe Flash Player is a renderer for the SWF file format, which is
commonly used to provide interactive websites.
Please review the CVE identifiers referenced below for details.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All Adobe Flash Player users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot -v ">=www-plugins/adobe-flash-11.2.202.508"
References
==========
[ 1 ] CVE-2015-3107
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3107
[ 2 ] CVE-2015-5122
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5122
[ 3 ] CVE-2015-5123
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5123
[ 4 ] CVE-2015-5124
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5124
[ 5 ] CVE-2015-5125
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5125
[ 6 ] CVE-2015-5127
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5127
[ 7 ] CVE-2015-5129
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5129
[ 8 ] CVE-2015-5130
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5130
[ 9 ] CVE-2015-5131
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5131
[ 10 ] CVE-2015-5132
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5132
[ 11 ] CVE-2015-5133
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5133
[ 12 ] CVE-2015-5134
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5134
[ 13 ] CVE-2015-5539
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5539
[ 14 ] CVE-2015-5540
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5540
[ 15 ] CVE-2015-5541
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5541
[ 16 ] CVE-2015-5544
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5544
[ 17 ] CVE-2015-5545
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5545
[ 18 ] CVE-2015-5546
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5546
[ 19 ] CVE-2015-5547
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5547
[ 20 ] CVE-2015-5548
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5548
[ 21 ] CVE-2015-5549
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5549
[ 22 ] CVE-2015-5550
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5550
[ 23 ] CVE-2015-5551
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5551
[ 24 ] CVE-2015-5552
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5552
[ 25 ] CVE-2015-5553
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5553
[ 26 ] CVE-2015-5554
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5554
[ 27 ] CVE-2015-5555
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5555
[ 28 ] CVE-2015-5556
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5556
[ 29 ] CVE-2015-5557
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5557
[ 30 ] CVE-2015-5558
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5558
[ 31 ] CVE-2015-5559
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5559
[ 32 ] CVE-2015-5560
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5560
[ 33 ] CVE-2015-5561
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5561
[ 34 ] CVE-2015-5562
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5562
[ 35 ] CVE-2015-5563
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5563
[ 36 ] CVE-2015-5564
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5564
[ 37 ] CVE-2015-5965
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5965
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/201508-01
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2015 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05385680
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: c05385680
Version: 1
HPSBMU03692 rev.1 - HPE Matrix Operating Environment, Multiple Remote
Vulnerabilities
NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.
Release Date: 2017-02-03
Last Updated: 2017-02-03
Potential Security Impact: Remote: Bypass Security Restrictions, Cross-Site
Request Forgery (CSRF), Cross-Site Scripting (XSS), Denial of Service (DoS),
Disclosure of Information, Execution of Arbitrary Code
Source: Hewlett Packard Enterprise, Product Security Response Team
VULNERABILITY SUMMARY
Multiple potential security vulnerabilities have been identified in HPE
Matrix Operating Enviroment (MOE) on Windows. The vulnerabilities could be
exploited remotely resulting in the Bypass of Security Restrictions,
cross-site request forgery (CSRF), cross-site scripting (XSS), Denial of
Service (DoS), Disclosure of Information, and Execution of Arbitrary Code.
References:
- CVE-2016-8531 - Information Disclosure - VSE
- CVE-2016-8532 - XSS - VCEM
- CVE-2016-8533 - Priviledge Escalation - VCEM
- CVE-2016-8534 - Privilege Elevation - VSE
- CVE-2016-8535 - Http Parameter Pollution - VCEM
- CVE-2017-5780 - Clickjacking - MRM
- CVE-2017-5781 - CSRF - VSE
- CVE-2017-5782 - HSTS Header Missing - IO
- CVE-2017-5783 - Clickjacking - SPM
- CVE-2017-5784 - HSTS Header Missing - SPM
- CVE-2017-5785 - Information Disclosure - SPM
- CVE-2015-5127 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5129 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5130 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5131 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5132 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5133 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5134 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5539 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5540 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5541 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5544 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5545 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5546 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5547 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5548 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5549 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5550 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5551 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5552 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5553 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5555 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5556 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5557 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5558 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5559 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5560 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5561 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5562 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5563 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5564 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5565 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5566 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5575 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5576 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5580 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5574 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5588 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5570 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5572 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-6678 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5571 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5582 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5584 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5587 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5579 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5568 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-6679 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-6682 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-6677 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5573 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5578 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5577 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-6676 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5581 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8415 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8416 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8417 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8418 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8419 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8420 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8421 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8422 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8423 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8424 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8425 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8426 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8427 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8428 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8429 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8430 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8431 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8432 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8433 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8434 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8435 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8436 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8437 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8438 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8439 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8440 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8441 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8442 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8443 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8444 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8445 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8446 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8447 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8448 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8449 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8450 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8451 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8452 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8453 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8454 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8455 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8456 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8457 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8044 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8459 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8460 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8634 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8635 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8636 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8638 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8639 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8640 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8641 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8642 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8643 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8644 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8645 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8646 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8647 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8648 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8649 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8650 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8651 - Adobe Flash - unauthorized disclosure of information
- CVE-2016-2183 - Sweet32, DES, 3DES
- CVE-2016-0777 - OpenSSH, unauthorized disclosure of information
- CVE-2016-0778 - OpenSSH, unauthorized disclosure of information
- CVE-2016-1907 - OpenSSH, unauthorized disclosure of information
- CVE-2009-5028 - Namazu, unauthorized disclosure of information
- CVE-2011-4345 - Namazu, unauthorized disclosure of information
- CVE-2015-5254 - Apache ActiveMQ unauthorized disclosure of information
- CVE-2016-4366 - HPE SIM, unauthorized disclosure of information
- CVE-2015-5554 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5567 - Adobe Flash - unauthorized disclosure of information
- CVE-2016-8517 - HPE SIM, Cross-site Scripting (XSS)
- CVE-2016-8516 - HPE SIM, Denial of Service
- CVE-2016-8518 - HPE SIM, Denial of Service
SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
- HP Matrix Operating Environment Software 7.6
- HP Systems Insight Manager (HP SIM), Software 7.6
BACKGROUND
CVSS Base Metrics
=================
Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector
CVE-2009-5028
7.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVE-2011-4345
3.7 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
2.6 (AV:N/AC:H/Au:N/C:N/I:P/A:N)
CVE-2015-5127
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5129
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5130
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5131
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5132
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5133
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5134
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5254
7.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVE-2015-5539
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5540
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5541
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5544
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5545
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5546
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5547
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5548
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5549
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5550
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5551
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5552
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5553
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5554
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5555
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5556
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5557
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5558
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5559
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5560
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5561
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5562
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5563
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5564
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5565
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5566
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5567
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5568
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5570
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5571
5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N)
CVE-2015-5572
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)
CVE-2015-5573
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5574
7.2 CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5575
7.2 CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5576
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)
CVE-2015-5577
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5578
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5579
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5580
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5581
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5582
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5584
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5587
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5588
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-6676
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-6677
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-6678
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-6679
5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)
CVE-2015-6682
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8044
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8415
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8416
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8417
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8418
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8419
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8420
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8421
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8422
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8423
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8424
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8425
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8426
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8427
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8428
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8429
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8430
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8431
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8432
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8433
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8434
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8435
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8436
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8437
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8438
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8439
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8440
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8441
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8442
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8443
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8444
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8445
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8446
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8447
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8448
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8449
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8450
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8451
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8452
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8453
5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N)
CVE-2015-8454
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8455
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8456
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8457
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8459
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8460
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8634
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8635
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8636
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8638
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8639
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8640
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8641
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8642
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8643
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8644
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8645
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8646
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8647
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8648
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8649
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8650
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8651
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2016-0777
3.5 CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N
4.0 (AV:N/AC:L/Au:S/C:P/I:N/A:N)
CVE-2016-0778
5.5 CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L
4.6 (AV:N/AC:H/Au:S/C:P/I:P/A:P)
CVE-2016-1907
5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)
CVE-2016-2183
5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)
CVE-2016-4366
7.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVE-2016-8516
3.3 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
4.0 (AV:N/AC:L/Au:S/C:N/I:N/A:P)
CVE-2016-8517
6.8 CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N
7.9 (AV:N/AC:M/Au:S/C:C/I:C/A:N)
CVE-2016-8518
7.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.8 (AV:N/AC:L/Au:N/C:N/I:C/A:N)
CVE-2016-8531
6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
6.4 (AV:N/AC:L/Au:N/C:P/I:P/A:N)
CVE-2016-8532
6.3 CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:H/A:N
7.0 (AV:N/AC:M/Au:S/C:P/I:C/A:N)
CVE-2016-8533
5.7 CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N
6.8 (AV:N/AC:L/Au:S/C:C/I:N/A:N)
CVE-2016-8534
3.5 CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N
3.5 (AV:N/AC:M/Au:S/C:P/I:N/A:N)
CVE-2016-8535
4.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
4.0 (AV:N/AC:L/Au:S/C:N/I:P/A:N)
CVE-2017-5780
6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
7.8 (AV:N/AC:L/Au:N/C:C/I:N/A:N)
CVE-2017-5781
3.9 CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N
5.0 (AV:L/AC:M/Au:S/C:P/I:C/A:N)
CVE-2017-5782
5.6 CVSS:3.0/AV:P/AC:H/PR:H/UI:R/S:U/C:L/I:H/A:H
5.8 (AV:N/AC:M/Au:N/C:P/I:P/A:N)
CVE-2017-5783
5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N)
CVE-2017-5784
6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
5.8 (AV:N/AC:M/Au:N/C:P/I:P/A:N)
CVE-2017-5785
6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
6.4 (AV:N/AC:L/Au:N/C:P/I:P/A:N)
Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499
RESOLUTION
HPE has provided the following software updates to resolve the
vulnerabilities in the HPE Matrix Operating Environment (MOE). The update kit
applicable to the HPE Matrix Operating Environment (MOE) 7.6 is available at
the following location:
*
<https://h20392.www2.hpe.com/portal/swdepot/displayProductInfo.do?productNumb
r=HPID>
HPE has addressed these vulnerabilities for the impacted software components
bundled with HPE Matrix Operating Environment in the following HPE Security
Bulletins:
**HPE Systems Insight Manager (SIM)**
HPE Security Bulletin: HPSBMU03668
*
<https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05356388>
HISTORY
Version:1 (rev.1) - 3 February 2017 Initial release
Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.
Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-alert@hpe.com.
Report: To report a potential security vulnerability for any HPE supported
product:
Web form: https://www.hpe.com/info/report-security-vulnerability
Email: security-alert@hpe.com
Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice
Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive
Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.
3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX
Copyright 2016 Hewlett Packard Enterprise
Hewlett Packard Enterprise shall not be liable for technical or editorial
errors or omissions contained herein. The information provided is provided
"as is" without warranty of any kind. To the extent permitted by law, neither
HP or its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice. Hewlett
Packard Enterprise and the names of Hewlett Packard Enterprise products
referenced herein are trademarks of Hewlett Packard Enterprise in the United
States and other countries. Other product and company names mentioned herein
may be trademarks of their respective owners
| VAR-201508-0301 | CVE-2015-5134 | Adobe Flash Player and Adobe AIR Vulnerable to arbitrary code execution |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
Use-after-free vulnerability in Adobe Flash Player before 18.0.0.232 on Windows and OS X and before 11.2.202.508 on Linux, Adobe AIR before 18.0.0.199, Adobe AIR SDK before 18.0.0.199, and Adobe AIR SDK & Compiler before 18.0.0.199 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-5127, CVE-2015-5130, CVE-2015-5539, CVE-2015-5540, CVE-2015-5550, CVE-2015-5551, CVE-2015-5556, CVE-2015-5557, CVE-2015-5559, CVE-2015-5561, CVE-2015-5563, CVE-2015-5564, and CVE-2015-5565. This vulnerability CVE-2015-5127 , CVE-2015-5130 , CVE-2015-5539 , CVE-2015-5540 , CVE-2015-5550 , CVE-2015-5551 , CVE-2015-5556 , CVE-2015-5557 , CVE-2015-5559 , CVE-2015-5561 , CVE-2015-5563 , CVE-2015-5564 ,and CVE-2015-5565 Is a different vulnerability. Supplementary information : CWE Vulnerability type by CWE-416: Use-after-free ( Use of freed memory ) Has been identified. http://cwe.mitre.org/data/definitions/416.htmlAn attacker could execute arbitrary code. Failed exploit attempts will likely cause a denial-of-service condition. A use-after-free vulnerability exists in several Adobe products. The following products and versions are affected: Adobe Flash Player Desktop Runtime 18.0.0.209 and earlier versions and Adobe Flash Player Extended Support Release 13.0.0.309 and earlier versions based on Windows and Macintosh platforms, Adobe Flash Player for Windows, Macintosh and Linux platforms Google Chrome 18.0.0.209 and earlier, Adobe Flash Player for Microsoft Edge and Internet Explorer 11 on Windows 10 18.0.0.209 and earlier, Adobe Flash Player for Internet Explorer 10 and 11 18.0.0.209 on Windows 8.0 and 8.1 and previous versions, Adobe Flash Player for Linux 11.2.202.491 and previous versions based on Linux platforms, AIR Desktop Runtime 18.0.0.180 and previous versions based on Windows and Macintosh platforms, and AIR SDK 18.0 based on Windows, Macintosh, Android and iOS platforms. 0.180 and earlier and AIR SDK & Compiler 18.0.0.180 and earlier. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Critical: flash-plugin security update
Advisory ID: RHSA-2015:1603-01
Product: Red Hat Enterprise Linux Supplementary
Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1603.html
Issue date: 2015-08-12
CVE Names: CVE-2015-5127 CVE-2015-5128 CVE-2015-5129
CVE-2015-5130 CVE-2015-5131 CVE-2015-5132
CVE-2015-5133 CVE-2015-5134 CVE-2015-5539
CVE-2015-5540 CVE-2015-5541 CVE-2015-5544
CVE-2015-5545 CVE-2015-5546 CVE-2015-5547
CVE-2015-5548 CVE-2015-5549 CVE-2015-5550
CVE-2015-5551 CVE-2015-5552 CVE-2015-5553
CVE-2015-5554 CVE-2015-5555 CVE-2015-5556
CVE-2015-5557 CVE-2015-5558 CVE-2015-5559
CVE-2015-5560 CVE-2015-5561 CVE-2015-5562
CVE-2015-5563 CVE-2015-5564
=====================================================================
1. Summary:
An updated Adobe Flash Player package that fixes multiple security issues
is now available for Red Hat Enterprise Linux 5 and 6 Supplementary.
Red Hat Product Security has rated this update as having Critical security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Desktop Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64
3. Description:
The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash
Player web browser plug-in. These
vulnerabilities are detailed in the Adobe Security Bulletin APSB15-19
listed in the References section.
Multiple flaws were found in the way flash-plugin displayed certain SWF
content. An attacker could use these flaws to create a specially crafted
SWF file that would cause flash-plugin to crash or, potentially, execute
arbitrary code when the victim loaded a page containing the malicious SWF
content. (CVE-2015-5127, CVE-2015-5128, CVE-2015-5129, CVE-2015-5130,
CVE-2015-5131, CVE-2015-5132, CVE-2015-5133, CVE-2015-5134, CVE-2015-5539,
CVE-2015-5540, CVE-2015-5541, CVE-2015-5544, CVE-2015-5545, CVE-2015-5546,
CVE-2015-5547, CVE-2015-5548, CVE-2015-5549, CVE-2015-5550, CVE-2015-5551,
CVE-2015-5552, CVE-2015-5553, CVE-2015-5554, CVE-2015-5555, CVE-2015-5556,
CVE-2015-5557, CVE-2015-5558, CVE-2015-5559, CVE-2015-5560, CVE-2015-5561,
CVE-2015-5562, CVE-2015-5563, CVE-2015-5564)
All users of Adobe Flash Player should install this updated package, which
upgrades Flash Player to version 11.2.202.508.
4. Solution:
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1252697 - flash-plugin: multiple code execution flaws (APSB15-19)
6. Package List:
Red Hat Enterprise Linux Desktop Supplementary (v. 5):
i386:
flash-plugin-11.2.202.508-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.508-1.el5.i386.rpm
Red Hat Enterprise Linux Server Supplementary (v. 5):
i386:
flash-plugin-11.2.202.508-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.508-1.el5.i386.rpm
Red Hat Enterprise Linux Desktop Supplementary (v. 6):
i386:
flash-plugin-11.2.202.508-1.el6_7.i686.rpm
x86_64:
flash-plugin-11.2.202.508-1.el6_7.i686.rpm
Red Hat Enterprise Linux Server Supplementary (v. 6):
i386:
flash-plugin-11.2.202.508-1.el6_7.i686.rpm
x86_64:
flash-plugin-11.2.202.508-1.el6_7.i686.rpm
Red Hat Enterprise Linux Workstation Supplementary (v. 6):
i386:
flash-plugin-11.2.202.508-1.el6_7.i686.rpm
x86_64:
flash-plugin-11.2.202.508-1.el6_7.i686.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2015-5127
https://access.redhat.com/security/cve/CVE-2015-5128
https://access.redhat.com/security/cve/CVE-2015-5129
https://access.redhat.com/security/cve/CVE-2015-5130
https://access.redhat.com/security/cve/CVE-2015-5131
https://access.redhat.com/security/cve/CVE-2015-5132
https://access.redhat.com/security/cve/CVE-2015-5133
https://access.redhat.com/security/cve/CVE-2015-5134
https://access.redhat.com/security/cve/CVE-2015-5539
https://access.redhat.com/security/cve/CVE-2015-5540
https://access.redhat.com/security/cve/CVE-2015-5541
https://access.redhat.com/security/cve/CVE-2015-5544
https://access.redhat.com/security/cve/CVE-2015-5545
https://access.redhat.com/security/cve/CVE-2015-5546
https://access.redhat.com/security/cve/CVE-2015-5547
https://access.redhat.com/security/cve/CVE-2015-5548
https://access.redhat.com/security/cve/CVE-2015-5549
https://access.redhat.com/security/cve/CVE-2015-5550
https://access.redhat.com/security/cve/CVE-2015-5551
https://access.redhat.com/security/cve/CVE-2015-5552
https://access.redhat.com/security/cve/CVE-2015-5553
https://access.redhat.com/security/cve/CVE-2015-5554
https://access.redhat.com/security/cve/CVE-2015-5555
https://access.redhat.com/security/cve/CVE-2015-5556
https://access.redhat.com/security/cve/CVE-2015-5557
https://access.redhat.com/security/cve/CVE-2015-5558
https://access.redhat.com/security/cve/CVE-2015-5559
https://access.redhat.com/security/cve/CVE-2015-5560
https://access.redhat.com/security/cve/CVE-2015-5561
https://access.redhat.com/security/cve/CVE-2015-5562
https://access.redhat.com/security/cve/CVE-2015-5563
https://access.redhat.com/security/cve/CVE-2015-5564
https://access.redhat.com/security/updates/classification/#critical
https://helpx.adobe.com/security/products/flash-player/apsb15-19.html
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2015 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iD8DBQFVy2mAXlSAg2UNWIIRAty7AKCcTl+pzRlPMcYb+ESu7xg0C9nkVwCfbcNj
SwY72oO+5brzzyYR9NLDDnE=
=izmD
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
.
Background
==========
The Adobe Flash Player is a renderer for the SWF file format, which is
commonly used to provide interactive websites.
Please review the CVE identifiers referenced below for details.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All Adobe Flash Player users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot -v ">=www-plugins/adobe-flash-11.2.202.508"
References
==========
[ 1 ] CVE-2015-3107
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3107
[ 2 ] CVE-2015-5122
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5122
[ 3 ] CVE-2015-5123
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5123
[ 4 ] CVE-2015-5124
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5124
[ 5 ] CVE-2015-5125
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5125
[ 6 ] CVE-2015-5127
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5127
[ 7 ] CVE-2015-5129
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5129
[ 8 ] CVE-2015-5130
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5130
[ 9 ] CVE-2015-5131
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5131
[ 10 ] CVE-2015-5132
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5132
[ 11 ] CVE-2015-5133
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5133
[ 12 ] CVE-2015-5134
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5134
[ 13 ] CVE-2015-5539
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5539
[ 14 ] CVE-2015-5540
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5540
[ 15 ] CVE-2015-5541
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5541
[ 16 ] CVE-2015-5544
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5544
[ 17 ] CVE-2015-5545
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5545
[ 18 ] CVE-2015-5546
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5546
[ 19 ] CVE-2015-5547
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5547
[ 20 ] CVE-2015-5548
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5548
[ 21 ] CVE-2015-5549
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5549
[ 22 ] CVE-2015-5550
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5550
[ 23 ] CVE-2015-5551
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5551
[ 24 ] CVE-2015-5552
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5552
[ 25 ] CVE-2015-5553
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5553
[ 26 ] CVE-2015-5554
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5554
[ 27 ] CVE-2015-5555
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5555
[ 28 ] CVE-2015-5556
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5556
[ 29 ] CVE-2015-5557
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5557
[ 30 ] CVE-2015-5558
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5558
[ 31 ] CVE-2015-5559
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5559
[ 32 ] CVE-2015-5560
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5560
[ 33 ] CVE-2015-5561
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5561
[ 34 ] CVE-2015-5562
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5562
[ 35 ] CVE-2015-5563
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5563
[ 36 ] CVE-2015-5564
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5564
[ 37 ] CVE-2015-5965
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5965
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/201508-01
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2015 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05385680
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: c05385680
Version: 1
HPSBMU03692 rev.1 - HPE Matrix Operating Environment, Multiple Remote
Vulnerabilities
NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.
Release Date: 2017-02-03
Last Updated: 2017-02-03
Potential Security Impact: Remote: Bypass Security Restrictions, Cross-Site
Request Forgery (CSRF), Cross-Site Scripting (XSS), Denial of Service (DoS),
Disclosure of Information, Execution of Arbitrary Code
Source: Hewlett Packard Enterprise, Product Security Response Team
VULNERABILITY SUMMARY
Multiple potential security vulnerabilities have been identified in HPE
Matrix Operating Enviroment (MOE) on Windows. The vulnerabilities could be
exploited remotely resulting in the Bypass of Security Restrictions,
cross-site request forgery (CSRF), cross-site scripting (XSS), Denial of
Service (DoS), Disclosure of Information, and Execution of Arbitrary Code.
References:
- CVE-2016-8531 - Information Disclosure - VSE
- CVE-2016-8532 - XSS - VCEM
- CVE-2016-8533 - Priviledge Escalation - VCEM
- CVE-2016-8534 - Privilege Elevation - VSE
- CVE-2016-8535 - Http Parameter Pollution - VCEM
- CVE-2017-5780 - Clickjacking - MRM
- CVE-2017-5781 - CSRF - VSE
- CVE-2017-5782 - HSTS Header Missing - IO
- CVE-2017-5783 - Clickjacking - SPM
- CVE-2017-5784 - HSTS Header Missing - SPM
- CVE-2017-5785 - Information Disclosure - SPM
- CVE-2015-5127 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5129 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5130 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5131 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5132 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5133 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5134 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5539 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5540 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5541 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5544 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5545 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5546 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5547 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5548 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5549 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5550 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5551 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5552 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5553 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5555 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5556 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5557 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5558 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5559 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5560 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5561 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5562 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5563 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5564 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5565 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5566 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5575 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5576 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5580 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5574 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5588 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5570 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5572 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-6678 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5571 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5582 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5584 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5587 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5579 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5568 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-6679 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-6682 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-6677 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5573 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5578 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5577 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-6676 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5581 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8415 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8416 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8417 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8418 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8419 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8420 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8421 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8422 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8423 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8424 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8425 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8426 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8427 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8428 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8429 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8430 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8431 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8432 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8433 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8434 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8435 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8436 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8437 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8438 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8439 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8440 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8441 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8442 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8443 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8444 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8445 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8446 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8447 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8448 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8449 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8450 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8451 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8452 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8453 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8454 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8455 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8456 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8457 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8044 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8459 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8460 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8634 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8635 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8636 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8638 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8639 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8640 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8641 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8642 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8643 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8644 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8645 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8646 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8647 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8648 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8649 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8650 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8651 - Adobe Flash - unauthorized disclosure of information
- CVE-2016-2183 - Sweet32, DES, 3DES
- CVE-2016-0777 - OpenSSH, unauthorized disclosure of information
- CVE-2016-0778 - OpenSSH, unauthorized disclosure of information
- CVE-2016-1907 - OpenSSH, unauthorized disclosure of information
- CVE-2009-5028 - Namazu, unauthorized disclosure of information
- CVE-2011-4345 - Namazu, unauthorized disclosure of information
- CVE-2015-5254 - Apache ActiveMQ unauthorized disclosure of information
- CVE-2016-4366 - HPE SIM, unauthorized disclosure of information
- CVE-2015-5554 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5567 - Adobe Flash - unauthorized disclosure of information
- CVE-2016-8517 - HPE SIM, Cross-site Scripting (XSS)
- CVE-2016-8516 - HPE SIM, Denial of Service
- CVE-2016-8518 - HPE SIM, Denial of Service
SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
- HP Matrix Operating Environment Software 7.6
- HP Systems Insight Manager (HP SIM), Software 7.6
BACKGROUND
CVSS Base Metrics
=================
Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector
CVE-2009-5028
7.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVE-2011-4345
3.7 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
2.6 (AV:N/AC:H/Au:N/C:N/I:P/A:N)
CVE-2015-5127
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5129
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5130
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5131
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5132
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5133
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5134
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5254
7.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVE-2015-5539
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5540
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5541
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5544
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5545
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5546
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5547
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5548
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5549
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5550
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5551
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5552
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5553
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5554
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5555
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5556
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5557
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5558
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5559
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5560
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5561
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5562
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5563
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5564
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5565
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5566
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5567
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5568
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5570
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5571
5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N)
CVE-2015-5572
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)
CVE-2015-5573
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5574
7.2 CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5575
7.2 CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5576
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)
CVE-2015-5577
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5578
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5579
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5580
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5581
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5582
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5584
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5587
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5588
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-6676
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-6677
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-6678
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-6679
5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)
CVE-2015-6682
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8044
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8415
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8416
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8417
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8418
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8419
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8420
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8421
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8422
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8423
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8424
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8425
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8426
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8427
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8428
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8429
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8430
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8431
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8432
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8433
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8434
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8435
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8436
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8437
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8438
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8439
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8440
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8441
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8442
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8443
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8444
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8445
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8446
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8447
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8448
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8449
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8450
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8451
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8452
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8453
5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N)
CVE-2015-8454
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8455
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8456
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8457
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8459
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8460
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8634
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8635
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8636
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8638
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8639
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8640
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8641
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8642
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8643
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8644
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8645
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8646
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8647
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8648
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8649
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8650
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8651
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2016-0777
3.5 CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N
4.0 (AV:N/AC:L/Au:S/C:P/I:N/A:N)
CVE-2016-0778
5.5 CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L
4.6 (AV:N/AC:H/Au:S/C:P/I:P/A:P)
CVE-2016-1907
5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)
CVE-2016-2183
5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)
CVE-2016-4366
7.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVE-2016-8516
3.3 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
4.0 (AV:N/AC:L/Au:S/C:N/I:N/A:P)
CVE-2016-8517
6.8 CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N
7.9 (AV:N/AC:M/Au:S/C:C/I:C/A:N)
CVE-2016-8518
7.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.8 (AV:N/AC:L/Au:N/C:N/I:C/A:N)
CVE-2016-8531
6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
6.4 (AV:N/AC:L/Au:N/C:P/I:P/A:N)
CVE-2016-8532
6.3 CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:H/A:N
7.0 (AV:N/AC:M/Au:S/C:P/I:C/A:N)
CVE-2016-8533
5.7 CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N
6.8 (AV:N/AC:L/Au:S/C:C/I:N/A:N)
CVE-2016-8534
3.5 CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N
3.5 (AV:N/AC:M/Au:S/C:P/I:N/A:N)
CVE-2016-8535
4.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
4.0 (AV:N/AC:L/Au:S/C:N/I:P/A:N)
CVE-2017-5780
6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
7.8 (AV:N/AC:L/Au:N/C:C/I:N/A:N)
CVE-2017-5781
3.9 CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N
5.0 (AV:L/AC:M/Au:S/C:P/I:C/A:N)
CVE-2017-5782
5.6 CVSS:3.0/AV:P/AC:H/PR:H/UI:R/S:U/C:L/I:H/A:H
5.8 (AV:N/AC:M/Au:N/C:P/I:P/A:N)
CVE-2017-5783
5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N)
CVE-2017-5784
6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
5.8 (AV:N/AC:M/Au:N/C:P/I:P/A:N)
CVE-2017-5785
6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
6.4 (AV:N/AC:L/Au:N/C:P/I:P/A:N)
Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499
RESOLUTION
HPE has provided the following software updates to resolve the
vulnerabilities in the HPE Matrix Operating Environment (MOE). The update kit
applicable to the HPE Matrix Operating Environment (MOE) 7.6 is available at
the following location:
*
<https://h20392.www2.hpe.com/portal/swdepot/displayProductInfo.do?productNumb
r=HPID>
HPE has addressed these vulnerabilities for the impacted software components
bundled with HPE Matrix Operating Environment in the following HPE Security
Bulletins:
**HPE Systems Insight Manager (SIM)**
HPE Security Bulletin: HPSBMU03668
*
<https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05356388>
HISTORY
Version:1 (rev.1) - 3 February 2017 Initial release
Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.
Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-alert@hpe.com.
Report: To report a potential security vulnerability for any HPE supported
product:
Web form: https://www.hpe.com/info/report-security-vulnerability
Email: security-alert@hpe.com
Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice
Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive
Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.
3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX
Copyright 2016 Hewlett Packard Enterprise
Hewlett Packard Enterprise shall not be liable for technical or editorial
errors or omissions contained herein. The information provided is provided
"as is" without warranty of any kind. To the extent permitted by law, neither
HP or its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice. Hewlett
Packard Enterprise and the names of Hewlett Packard Enterprise products
referenced herein are trademarks of Hewlett Packard Enterprise in the United
States and other countries. Other product and company names mentioned herein
may be trademarks of their respective owners
| VAR-201508-0298 | CVE-2015-5131 | Adobe Flash Player and Adobe AIR Vulnerable to buffer overflow |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
Buffer overflow in Adobe Flash Player before 18.0.0.232 on Windows and OS X and before 11.2.202.508 on Linux, Adobe AIR before 18.0.0.199, Adobe AIR SDK before 18.0.0.199, and Adobe AIR SDK & Compiler before 18.0.0.199 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-5132 and CVE-2015-5133. This vulnerability CVE-2015-5132 and CVE-2015-5133 Is a different vulnerability.An attacker could execute arbitrary code. The following products and versions are affected: Adobe Flash Player Desktop Runtime 18.0.0.209 and earlier versions and Adobe Flash Player Extended Support Release 13.0.0.309 and earlier versions based on Windows and Macintosh platforms, Adobe Flash Player for Windows, Macintosh and Linux platforms Google Chrome 18.0.0.209 and earlier, Adobe Flash Player for Microsoft Edge and Internet Explorer 11 on Windows 10 18.0.0.209 and earlier, Adobe Flash Player for Internet Explorer 10 and 11 18.0.0.209 on Windows 8.0 and 8.1 and previous versions, Adobe Flash Player for Linux 11.2.202.491 and previous versions based on Linux platforms, AIR Desktop Runtime 18.0.0.180 and previous versions based on Windows and Macintosh platforms, and AIR SDK 18.0 based on Windows, Macintosh, Android and iOS platforms. 0.180 and earlier and AIR SDK & Compiler 18.0.0.180 and earlier. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Critical: flash-plugin security update
Advisory ID: RHSA-2015:1603-01
Product: Red Hat Enterprise Linux Supplementary
Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1603.html
Issue date: 2015-08-12
CVE Names: CVE-2015-5127 CVE-2015-5128 CVE-2015-5129
CVE-2015-5130 CVE-2015-5131 CVE-2015-5132
CVE-2015-5133 CVE-2015-5134 CVE-2015-5539
CVE-2015-5540 CVE-2015-5541 CVE-2015-5544
CVE-2015-5545 CVE-2015-5546 CVE-2015-5547
CVE-2015-5548 CVE-2015-5549 CVE-2015-5550
CVE-2015-5551 CVE-2015-5552 CVE-2015-5553
CVE-2015-5554 CVE-2015-5555 CVE-2015-5556
CVE-2015-5557 CVE-2015-5558 CVE-2015-5559
CVE-2015-5560 CVE-2015-5561 CVE-2015-5562
CVE-2015-5563 CVE-2015-5564
=====================================================================
1. Summary:
An updated Adobe Flash Player package that fixes multiple security issues
is now available for Red Hat Enterprise Linux 5 and 6 Supplementary.
Red Hat Product Security has rated this update as having Critical security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Desktop Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64
3. Description:
The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash
Player web browser plug-in. These
vulnerabilities are detailed in the Adobe Security Bulletin APSB15-19
listed in the References section.
Multiple flaws were found in the way flash-plugin displayed certain SWF
content. An attacker could use these flaws to create a specially crafted
SWF file that would cause flash-plugin to crash or, potentially, execute
arbitrary code when the victim loaded a page containing the malicious SWF
content. (CVE-2015-5127, CVE-2015-5128, CVE-2015-5129, CVE-2015-5130,
CVE-2015-5131, CVE-2015-5132, CVE-2015-5133, CVE-2015-5134, CVE-2015-5539,
CVE-2015-5540, CVE-2015-5541, CVE-2015-5544, CVE-2015-5545, CVE-2015-5546,
CVE-2015-5547, CVE-2015-5548, CVE-2015-5549, CVE-2015-5550, CVE-2015-5551,
CVE-2015-5552, CVE-2015-5553, CVE-2015-5554, CVE-2015-5555, CVE-2015-5556,
CVE-2015-5557, CVE-2015-5558, CVE-2015-5559, CVE-2015-5560, CVE-2015-5561,
CVE-2015-5562, CVE-2015-5563, CVE-2015-5564)
All users of Adobe Flash Player should install this updated package, which
upgrades Flash Player to version 11.2.202.508.
4. Solution:
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1252697 - flash-plugin: multiple code execution flaws (APSB15-19)
6. Package List:
Red Hat Enterprise Linux Desktop Supplementary (v. 5):
i386:
flash-plugin-11.2.202.508-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.508-1.el5.i386.rpm
Red Hat Enterprise Linux Server Supplementary (v. 5):
i386:
flash-plugin-11.2.202.508-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.508-1.el5.i386.rpm
Red Hat Enterprise Linux Desktop Supplementary (v. 6):
i386:
flash-plugin-11.2.202.508-1.el6_7.i686.rpm
x86_64:
flash-plugin-11.2.202.508-1.el6_7.i686.rpm
Red Hat Enterprise Linux Server Supplementary (v. 6):
i386:
flash-plugin-11.2.202.508-1.el6_7.i686.rpm
x86_64:
flash-plugin-11.2.202.508-1.el6_7.i686.rpm
Red Hat Enterprise Linux Workstation Supplementary (v. 6):
i386:
flash-plugin-11.2.202.508-1.el6_7.i686.rpm
x86_64:
flash-plugin-11.2.202.508-1.el6_7.i686.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2015-5127
https://access.redhat.com/security/cve/CVE-2015-5128
https://access.redhat.com/security/cve/CVE-2015-5129
https://access.redhat.com/security/cve/CVE-2015-5130
https://access.redhat.com/security/cve/CVE-2015-5131
https://access.redhat.com/security/cve/CVE-2015-5132
https://access.redhat.com/security/cve/CVE-2015-5133
https://access.redhat.com/security/cve/CVE-2015-5134
https://access.redhat.com/security/cve/CVE-2015-5539
https://access.redhat.com/security/cve/CVE-2015-5540
https://access.redhat.com/security/cve/CVE-2015-5541
https://access.redhat.com/security/cve/CVE-2015-5544
https://access.redhat.com/security/cve/CVE-2015-5545
https://access.redhat.com/security/cve/CVE-2015-5546
https://access.redhat.com/security/cve/CVE-2015-5547
https://access.redhat.com/security/cve/CVE-2015-5548
https://access.redhat.com/security/cve/CVE-2015-5549
https://access.redhat.com/security/cve/CVE-2015-5550
https://access.redhat.com/security/cve/CVE-2015-5551
https://access.redhat.com/security/cve/CVE-2015-5552
https://access.redhat.com/security/cve/CVE-2015-5553
https://access.redhat.com/security/cve/CVE-2015-5554
https://access.redhat.com/security/cve/CVE-2015-5555
https://access.redhat.com/security/cve/CVE-2015-5556
https://access.redhat.com/security/cve/CVE-2015-5557
https://access.redhat.com/security/cve/CVE-2015-5558
https://access.redhat.com/security/cve/CVE-2015-5559
https://access.redhat.com/security/cve/CVE-2015-5560
https://access.redhat.com/security/cve/CVE-2015-5561
https://access.redhat.com/security/cve/CVE-2015-5562
https://access.redhat.com/security/cve/CVE-2015-5563
https://access.redhat.com/security/cve/CVE-2015-5564
https://access.redhat.com/security/updates/classification/#critical
https://helpx.adobe.com/security/products/flash-player/apsb15-19.html
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2015 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iD8DBQFVy2mAXlSAg2UNWIIRAty7AKCcTl+pzRlPMcYb+ESu7xg0C9nkVwCfbcNj
SwY72oO+5brzzyYR9NLDDnE=
=izmD
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
.
Background
==========
The Adobe Flash Player is a renderer for the SWF file format, which is
commonly used to provide interactive websites.
Please review the CVE identifiers referenced below for details.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All Adobe Flash Player users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot -v ">=www-plugins/adobe-flash-11.2.202.508"
References
==========
[ 1 ] CVE-2015-3107
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3107
[ 2 ] CVE-2015-5122
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5122
[ 3 ] CVE-2015-5123
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5123
[ 4 ] CVE-2015-5124
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5124
[ 5 ] CVE-2015-5125
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5125
[ 6 ] CVE-2015-5127
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5127
[ 7 ] CVE-2015-5129
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5129
[ 8 ] CVE-2015-5130
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5130
[ 9 ] CVE-2015-5131
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5131
[ 10 ] CVE-2015-5132
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5132
[ 11 ] CVE-2015-5133
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5133
[ 12 ] CVE-2015-5134
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5134
[ 13 ] CVE-2015-5539
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5539
[ 14 ] CVE-2015-5540
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5540
[ 15 ] CVE-2015-5541
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5541
[ 16 ] CVE-2015-5544
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5544
[ 17 ] CVE-2015-5545
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5545
[ 18 ] CVE-2015-5546
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5546
[ 19 ] CVE-2015-5547
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5547
[ 20 ] CVE-2015-5548
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5548
[ 21 ] CVE-2015-5549
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5549
[ 22 ] CVE-2015-5550
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5550
[ 23 ] CVE-2015-5551
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5551
[ 24 ] CVE-2015-5552
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5552
[ 25 ] CVE-2015-5553
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5553
[ 26 ] CVE-2015-5554
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5554
[ 27 ] CVE-2015-5555
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5555
[ 28 ] CVE-2015-5556
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5556
[ 29 ] CVE-2015-5557
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5557
[ 30 ] CVE-2015-5558
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5558
[ 31 ] CVE-2015-5559
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5559
[ 32 ] CVE-2015-5560
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5560
[ 33 ] CVE-2015-5561
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5561
[ 34 ] CVE-2015-5562
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5562
[ 35 ] CVE-2015-5563
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5563
[ 36 ] CVE-2015-5564
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5564
[ 37 ] CVE-2015-5965
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5965
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/201508-01
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2015 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05385680
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: c05385680
Version: 1
HPSBMU03692 rev.1 - HPE Matrix Operating Environment, Multiple Remote
Vulnerabilities
NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.
Release Date: 2017-02-03
Last Updated: 2017-02-03
Potential Security Impact: Remote: Bypass Security Restrictions, Cross-Site
Request Forgery (CSRF), Cross-Site Scripting (XSS), Denial of Service (DoS),
Disclosure of Information, Execution of Arbitrary Code
Source: Hewlett Packard Enterprise, Product Security Response Team
VULNERABILITY SUMMARY
Multiple potential security vulnerabilities have been identified in HPE
Matrix Operating Enviroment (MOE) on Windows. The vulnerabilities could be
exploited remotely resulting in the Bypass of Security Restrictions,
cross-site request forgery (CSRF), cross-site scripting (XSS), Denial of
Service (DoS), Disclosure of Information, and Execution of Arbitrary Code.
References:
- CVE-2016-8531 - Information Disclosure - VSE
- CVE-2016-8532 - XSS - VCEM
- CVE-2016-8533 - Priviledge Escalation - VCEM
- CVE-2016-8534 - Privilege Elevation - VSE
- CVE-2016-8535 - Http Parameter Pollution - VCEM
- CVE-2017-5780 - Clickjacking - MRM
- CVE-2017-5781 - CSRF - VSE
- CVE-2017-5782 - HSTS Header Missing - IO
- CVE-2017-5783 - Clickjacking - SPM
- CVE-2017-5784 - HSTS Header Missing - SPM
- CVE-2017-5785 - Information Disclosure - SPM
- CVE-2015-5127 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5129 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5130 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5131 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5132 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5133 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5134 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5539 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5540 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5541 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5544 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5545 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5546 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5547 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5548 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5549 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5550 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5551 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5552 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5553 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5555 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5556 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5557 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5558 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5559 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5560 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5561 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5562 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5563 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5564 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5565 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5566 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5575 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5576 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5580 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5574 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5588 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5570 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5572 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-6678 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5571 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5582 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5584 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5587 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5579 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5568 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-6679 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-6682 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-6677 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5573 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5578 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5577 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-6676 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5581 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8415 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8416 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8417 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8418 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8419 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8420 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8421 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8422 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8423 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8424 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8425 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8426 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8427 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8428 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8429 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8430 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8431 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8432 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8433 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8434 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8435 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8436 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8437 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8438 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8439 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8440 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8441 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8442 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8443 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8444 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8445 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8446 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8447 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8448 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8449 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8450 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8451 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8452 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8453 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8454 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8455 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8456 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8457 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8044 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8459 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8460 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8634 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8635 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8636 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8638 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8639 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8640 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8641 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8642 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8643 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8644 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8645 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8646 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8647 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8648 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8649 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8650 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8651 - Adobe Flash - unauthorized disclosure of information
- CVE-2016-2183 - Sweet32, DES, 3DES
- CVE-2016-0777 - OpenSSH, unauthorized disclosure of information
- CVE-2016-0778 - OpenSSH, unauthorized disclosure of information
- CVE-2016-1907 - OpenSSH, unauthorized disclosure of information
- CVE-2009-5028 - Namazu, unauthorized disclosure of information
- CVE-2011-4345 - Namazu, unauthorized disclosure of information
- CVE-2015-5254 - Apache ActiveMQ unauthorized disclosure of information
- CVE-2016-4366 - HPE SIM, unauthorized disclosure of information
- CVE-2015-5554 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5567 - Adobe Flash - unauthorized disclosure of information
- CVE-2016-8517 - HPE SIM, Cross-site Scripting (XSS)
- CVE-2016-8516 - HPE SIM, Denial of Service
- CVE-2016-8518 - HPE SIM, Denial of Service
SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
- HP Matrix Operating Environment Software 7.6
- HP Systems Insight Manager (HP SIM), Software 7.6
BACKGROUND
CVSS Base Metrics
=================
Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector
CVE-2009-5028
7.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVE-2011-4345
3.7 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
2.6 (AV:N/AC:H/Au:N/C:N/I:P/A:N)
CVE-2015-5127
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5129
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5130
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5131
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5132
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5133
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5134
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5254
7.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVE-2015-5539
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5540
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5541
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5544
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5545
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5546
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5547
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5548
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5549
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5550
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5551
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5552
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5553
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5554
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5555
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5556
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5557
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5558
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5559
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5560
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5561
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5562
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5563
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5564
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5565
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5566
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5567
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5568
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5570
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5571
5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N)
CVE-2015-5572
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)
CVE-2015-5573
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5574
7.2 CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5575
7.2 CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5576
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)
CVE-2015-5577
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5578
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5579
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5580
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5581
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5582
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5584
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5587
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5588
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-6676
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-6677
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-6678
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-6679
5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)
CVE-2015-6682
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8044
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8415
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8416
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8417
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8418
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8419
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8420
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8421
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8422
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8423
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8424
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8425
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8426
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8427
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8428
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8429
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8430
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8431
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8432
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8433
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8434
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8435
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8436
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8437
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8438
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8439
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8440
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8441
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8442
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8443
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8444
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8445
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8446
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8447
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8448
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8449
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8450
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8451
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8452
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8453
5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N)
CVE-2015-8454
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8455
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8456
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8457
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8459
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8460
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8634
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8635
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8636
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8638
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8639
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8640
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8641
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8642
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8643
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8644
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8645
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8646
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8647
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8648
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8649
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8650
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8651
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2016-0777
3.5 CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N
4.0 (AV:N/AC:L/Au:S/C:P/I:N/A:N)
CVE-2016-0778
5.5 CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L
4.6 (AV:N/AC:H/Au:S/C:P/I:P/A:P)
CVE-2016-1907
5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)
CVE-2016-2183
5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)
CVE-2016-4366
7.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVE-2016-8516
3.3 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
4.0 (AV:N/AC:L/Au:S/C:N/I:N/A:P)
CVE-2016-8517
6.8 CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N
7.9 (AV:N/AC:M/Au:S/C:C/I:C/A:N)
CVE-2016-8518
7.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.8 (AV:N/AC:L/Au:N/C:N/I:C/A:N)
CVE-2016-8531
6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
6.4 (AV:N/AC:L/Au:N/C:P/I:P/A:N)
CVE-2016-8532
6.3 CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:H/A:N
7.0 (AV:N/AC:M/Au:S/C:P/I:C/A:N)
CVE-2016-8533
5.7 CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N
6.8 (AV:N/AC:L/Au:S/C:C/I:N/A:N)
CVE-2016-8534
3.5 CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N
3.5 (AV:N/AC:M/Au:S/C:P/I:N/A:N)
CVE-2016-8535
4.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
4.0 (AV:N/AC:L/Au:S/C:N/I:P/A:N)
CVE-2017-5780
6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
7.8 (AV:N/AC:L/Au:N/C:C/I:N/A:N)
CVE-2017-5781
3.9 CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N
5.0 (AV:L/AC:M/Au:S/C:P/I:C/A:N)
CVE-2017-5782
5.6 CVSS:3.0/AV:P/AC:H/PR:H/UI:R/S:U/C:L/I:H/A:H
5.8 (AV:N/AC:M/Au:N/C:P/I:P/A:N)
CVE-2017-5783
5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N)
CVE-2017-5784
6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
5.8 (AV:N/AC:M/Au:N/C:P/I:P/A:N)
CVE-2017-5785
6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
6.4 (AV:N/AC:L/Au:N/C:P/I:P/A:N)
Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499
RESOLUTION
HPE has provided the following software updates to resolve the
vulnerabilities in the HPE Matrix Operating Environment (MOE). The update kit
applicable to the HPE Matrix Operating Environment (MOE) 7.6 is available at
the following location:
*
<https://h20392.www2.hpe.com/portal/swdepot/displayProductInfo.do?productNumb
r=HPID>
HPE has addressed these vulnerabilities for the impacted software components
bundled with HPE Matrix Operating Environment in the following HPE Security
Bulletins:
**HPE Systems Insight Manager (SIM)**
HPE Security Bulletin: HPSBMU03668
*
<https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05356388>
HISTORY
Version:1 (rev.1) - 3 February 2017 Initial release
Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.
Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-alert@hpe.com.
Report: To report a potential security vulnerability for any HPE supported
product:
Web form: https://www.hpe.com/info/report-security-vulnerability
Email: security-alert@hpe.com
Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice
Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive
Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.
3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX
Copyright 2016 Hewlett Packard Enterprise
Hewlett Packard Enterprise shall not be liable for technical or editorial
errors or omissions contained herein. The information provided is provided
"as is" without warranty of any kind. To the extent permitted by law, neither
HP or its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice. Hewlett
Packard Enterprise and the names of Hewlett Packard Enterprise products
referenced herein are trademarks of Hewlett Packard Enterprise in the United
States and other countries. Other product and company names mentioned herein
may be trademarks of their respective owners
| VAR-201508-0299 | CVE-2015-5132 | Adobe Flash Player and Adobe AIR Vulnerable to buffer overflow |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
Buffer overflow in Adobe Flash Player before 18.0.0.232 on Windows and OS X and before 11.2.202.508 on Linux, Adobe AIR before 18.0.0.199, Adobe AIR SDK before 18.0.0.199, and Adobe AIR SDK & Compiler before 18.0.0.199 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-5131 and CVE-2015-5133. This vulnerability CVE-2015-5131 and CVE-2015-5133 Is a different vulnerability.An attacker could execute arbitrary code. The following products and versions are affected: Adobe Flash Player Desktop Runtime 18.0.0.209 and earlier versions and Adobe Flash Player Extended Support Release 13.0.0.309 and earlier versions based on Windows and Macintosh platforms, Adobe Flash Player for Windows, Macintosh and Linux platforms Google Chrome 18.0.0.209 and earlier, Adobe Flash Player for Microsoft Edge and Internet Explorer 11 on Windows 10 18.0.0.209 and earlier, Adobe Flash Player for Internet Explorer 10 and 11 18.0.0.209 on Windows 8.0 and 8.1 and previous versions, Adobe Flash Player for Linux 11.2.202.491 and previous versions based on Linux platforms, AIR Desktop Runtime 18.0.0.180 and previous versions based on Windows and Macintosh platforms, and AIR SDK 18.0 based on Windows, Macintosh, Android and iOS platforms. 0.180 and earlier and AIR SDK & Compiler 18.0.0.180 and earlier. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Critical: flash-plugin security update
Advisory ID: RHSA-2015:1603-01
Product: Red Hat Enterprise Linux Supplementary
Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1603.html
Issue date: 2015-08-12
CVE Names: CVE-2015-5127 CVE-2015-5128 CVE-2015-5129
CVE-2015-5130 CVE-2015-5131 CVE-2015-5132
CVE-2015-5133 CVE-2015-5134 CVE-2015-5539
CVE-2015-5540 CVE-2015-5541 CVE-2015-5544
CVE-2015-5545 CVE-2015-5546 CVE-2015-5547
CVE-2015-5548 CVE-2015-5549 CVE-2015-5550
CVE-2015-5551 CVE-2015-5552 CVE-2015-5553
CVE-2015-5554 CVE-2015-5555 CVE-2015-5556
CVE-2015-5557 CVE-2015-5558 CVE-2015-5559
CVE-2015-5560 CVE-2015-5561 CVE-2015-5562
CVE-2015-5563 CVE-2015-5564
=====================================================================
1. Summary:
An updated Adobe Flash Player package that fixes multiple security issues
is now available for Red Hat Enterprise Linux 5 and 6 Supplementary.
Red Hat Product Security has rated this update as having Critical security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Desktop Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64
3. Description:
The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash
Player web browser plug-in. These
vulnerabilities are detailed in the Adobe Security Bulletin APSB15-19
listed in the References section.
Multiple flaws were found in the way flash-plugin displayed certain SWF
content. An attacker could use these flaws to create a specially crafted
SWF file that would cause flash-plugin to crash or, potentially, execute
arbitrary code when the victim loaded a page containing the malicious SWF
content. (CVE-2015-5127, CVE-2015-5128, CVE-2015-5129, CVE-2015-5130,
CVE-2015-5131, CVE-2015-5132, CVE-2015-5133, CVE-2015-5134, CVE-2015-5539,
CVE-2015-5540, CVE-2015-5541, CVE-2015-5544, CVE-2015-5545, CVE-2015-5546,
CVE-2015-5547, CVE-2015-5548, CVE-2015-5549, CVE-2015-5550, CVE-2015-5551,
CVE-2015-5552, CVE-2015-5553, CVE-2015-5554, CVE-2015-5555, CVE-2015-5556,
CVE-2015-5557, CVE-2015-5558, CVE-2015-5559, CVE-2015-5560, CVE-2015-5561,
CVE-2015-5562, CVE-2015-5563, CVE-2015-5564)
All users of Adobe Flash Player should install this updated package, which
upgrades Flash Player to version 11.2.202.508.
4. Solution:
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1252697 - flash-plugin: multiple code execution flaws (APSB15-19)
6. Package List:
Red Hat Enterprise Linux Desktop Supplementary (v. 5):
i386:
flash-plugin-11.2.202.508-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.508-1.el5.i386.rpm
Red Hat Enterprise Linux Server Supplementary (v. 5):
i386:
flash-plugin-11.2.202.508-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.508-1.el5.i386.rpm
Red Hat Enterprise Linux Desktop Supplementary (v. 6):
i386:
flash-plugin-11.2.202.508-1.el6_7.i686.rpm
x86_64:
flash-plugin-11.2.202.508-1.el6_7.i686.rpm
Red Hat Enterprise Linux Server Supplementary (v. 6):
i386:
flash-plugin-11.2.202.508-1.el6_7.i686.rpm
x86_64:
flash-plugin-11.2.202.508-1.el6_7.i686.rpm
Red Hat Enterprise Linux Workstation Supplementary (v. 6):
i386:
flash-plugin-11.2.202.508-1.el6_7.i686.rpm
x86_64:
flash-plugin-11.2.202.508-1.el6_7.i686.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2015-5127
https://access.redhat.com/security/cve/CVE-2015-5128
https://access.redhat.com/security/cve/CVE-2015-5129
https://access.redhat.com/security/cve/CVE-2015-5130
https://access.redhat.com/security/cve/CVE-2015-5131
https://access.redhat.com/security/cve/CVE-2015-5132
https://access.redhat.com/security/cve/CVE-2015-5133
https://access.redhat.com/security/cve/CVE-2015-5134
https://access.redhat.com/security/cve/CVE-2015-5539
https://access.redhat.com/security/cve/CVE-2015-5540
https://access.redhat.com/security/cve/CVE-2015-5541
https://access.redhat.com/security/cve/CVE-2015-5544
https://access.redhat.com/security/cve/CVE-2015-5545
https://access.redhat.com/security/cve/CVE-2015-5546
https://access.redhat.com/security/cve/CVE-2015-5547
https://access.redhat.com/security/cve/CVE-2015-5548
https://access.redhat.com/security/cve/CVE-2015-5549
https://access.redhat.com/security/cve/CVE-2015-5550
https://access.redhat.com/security/cve/CVE-2015-5551
https://access.redhat.com/security/cve/CVE-2015-5552
https://access.redhat.com/security/cve/CVE-2015-5553
https://access.redhat.com/security/cve/CVE-2015-5554
https://access.redhat.com/security/cve/CVE-2015-5555
https://access.redhat.com/security/cve/CVE-2015-5556
https://access.redhat.com/security/cve/CVE-2015-5557
https://access.redhat.com/security/cve/CVE-2015-5558
https://access.redhat.com/security/cve/CVE-2015-5559
https://access.redhat.com/security/cve/CVE-2015-5560
https://access.redhat.com/security/cve/CVE-2015-5561
https://access.redhat.com/security/cve/CVE-2015-5562
https://access.redhat.com/security/cve/CVE-2015-5563
https://access.redhat.com/security/cve/CVE-2015-5564
https://access.redhat.com/security/updates/classification/#critical
https://helpx.adobe.com/security/products/flash-player/apsb15-19.html
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2015 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iD8DBQFVy2mAXlSAg2UNWIIRAty7AKCcTl+pzRlPMcYb+ESu7xg0C9nkVwCfbcNj
SwY72oO+5brzzyYR9NLDDnE=
=izmD
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
.
Background
==========
The Adobe Flash Player is a renderer for the SWF file format, which is
commonly used to provide interactive websites.
Please review the CVE identifiers referenced below for details.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All Adobe Flash Player users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot -v ">=www-plugins/adobe-flash-11.2.202.508"
References
==========
[ 1 ] CVE-2015-3107
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3107
[ 2 ] CVE-2015-5122
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5122
[ 3 ] CVE-2015-5123
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5123
[ 4 ] CVE-2015-5124
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5124
[ 5 ] CVE-2015-5125
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5125
[ 6 ] CVE-2015-5127
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5127
[ 7 ] CVE-2015-5129
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5129
[ 8 ] CVE-2015-5130
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5130
[ 9 ] CVE-2015-5131
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5131
[ 10 ] CVE-2015-5132
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5132
[ 11 ] CVE-2015-5133
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5133
[ 12 ] CVE-2015-5134
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5134
[ 13 ] CVE-2015-5539
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5539
[ 14 ] CVE-2015-5540
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5540
[ 15 ] CVE-2015-5541
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5541
[ 16 ] CVE-2015-5544
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5544
[ 17 ] CVE-2015-5545
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5545
[ 18 ] CVE-2015-5546
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5546
[ 19 ] CVE-2015-5547
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5547
[ 20 ] CVE-2015-5548
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5548
[ 21 ] CVE-2015-5549
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5549
[ 22 ] CVE-2015-5550
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5550
[ 23 ] CVE-2015-5551
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5551
[ 24 ] CVE-2015-5552
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5552
[ 25 ] CVE-2015-5553
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5553
[ 26 ] CVE-2015-5554
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5554
[ 27 ] CVE-2015-5555
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5555
[ 28 ] CVE-2015-5556
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5556
[ 29 ] CVE-2015-5557
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5557
[ 30 ] CVE-2015-5558
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5558
[ 31 ] CVE-2015-5559
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5559
[ 32 ] CVE-2015-5560
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5560
[ 33 ] CVE-2015-5561
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5561
[ 34 ] CVE-2015-5562
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5562
[ 35 ] CVE-2015-5563
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5563
[ 36 ] CVE-2015-5564
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5564
[ 37 ] CVE-2015-5965
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5965
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/201508-01
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2015 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05385680
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: c05385680
Version: 1
HPSBMU03692 rev.1 - HPE Matrix Operating Environment, Multiple Remote
Vulnerabilities
NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.
Release Date: 2017-02-03
Last Updated: 2017-02-03
Potential Security Impact: Remote: Bypass Security Restrictions, Cross-Site
Request Forgery (CSRF), Cross-Site Scripting (XSS), Denial of Service (DoS),
Disclosure of Information, Execution of Arbitrary Code
Source: Hewlett Packard Enterprise, Product Security Response Team
VULNERABILITY SUMMARY
Multiple potential security vulnerabilities have been identified in HPE
Matrix Operating Enviroment (MOE) on Windows. The vulnerabilities could be
exploited remotely resulting in the Bypass of Security Restrictions,
cross-site request forgery (CSRF), cross-site scripting (XSS), Denial of
Service (DoS), Disclosure of Information, and Execution of Arbitrary Code.
References:
- CVE-2016-8531 - Information Disclosure - VSE
- CVE-2016-8532 - XSS - VCEM
- CVE-2016-8533 - Priviledge Escalation - VCEM
- CVE-2016-8534 - Privilege Elevation - VSE
- CVE-2016-8535 - Http Parameter Pollution - VCEM
- CVE-2017-5780 - Clickjacking - MRM
- CVE-2017-5781 - CSRF - VSE
- CVE-2017-5782 - HSTS Header Missing - IO
- CVE-2017-5783 - Clickjacking - SPM
- CVE-2017-5784 - HSTS Header Missing - SPM
- CVE-2017-5785 - Information Disclosure - SPM
- CVE-2015-5127 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5129 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5130 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5131 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5132 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5133 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5134 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5539 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5540 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5541 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5544 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5545 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5546 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5547 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5548 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5549 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5550 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5551 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5552 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5553 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5555 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5556 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5557 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5558 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5559 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5560 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5561 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5562 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5563 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5564 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5565 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5566 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5575 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5576 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5580 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5574 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5588 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5570 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5572 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-6678 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5571 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5582 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5584 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5587 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5579 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5568 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-6679 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-6682 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-6677 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5573 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5578 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5577 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-6676 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5581 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8415 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8416 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8417 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8418 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8419 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8420 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8421 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8422 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8423 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8424 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8425 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8426 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8427 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8428 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8429 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8430 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8431 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8432 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8433 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8434 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8435 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8436 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8437 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8438 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8439 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8440 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8441 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8442 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8443 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8444 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8445 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8446 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8447 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8448 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8449 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8450 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8451 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8452 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8453 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8454 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8455 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8456 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8457 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8044 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8459 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8460 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8634 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8635 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8636 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8638 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8639 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8640 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8641 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8642 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8643 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8644 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8645 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8646 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8647 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8648 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8649 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8650 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8651 - Adobe Flash - unauthorized disclosure of information
- CVE-2016-2183 - Sweet32, DES, 3DES
- CVE-2016-0777 - OpenSSH, unauthorized disclosure of information
- CVE-2016-0778 - OpenSSH, unauthorized disclosure of information
- CVE-2016-1907 - OpenSSH, unauthorized disclosure of information
- CVE-2009-5028 - Namazu, unauthorized disclosure of information
- CVE-2011-4345 - Namazu, unauthorized disclosure of information
- CVE-2015-5254 - Apache ActiveMQ unauthorized disclosure of information
- CVE-2016-4366 - HPE SIM, unauthorized disclosure of information
- CVE-2015-5554 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5567 - Adobe Flash - unauthorized disclosure of information
- CVE-2016-8517 - HPE SIM, Cross-site Scripting (XSS)
- CVE-2016-8516 - HPE SIM, Denial of Service
- CVE-2016-8518 - HPE SIM, Denial of Service
SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
- HP Matrix Operating Environment Software 7.6
- HP Systems Insight Manager (HP SIM), Software 7.6
BACKGROUND
CVSS Base Metrics
=================
Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector
CVE-2009-5028
7.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVE-2011-4345
3.7 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
2.6 (AV:N/AC:H/Au:N/C:N/I:P/A:N)
CVE-2015-5127
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5129
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5130
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5131
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5132
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5133
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5134
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5254
7.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVE-2015-5539
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5540
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5541
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5544
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5545
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5546
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5547
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5548
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5549
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5550
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5551
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5552
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5553
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5554
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5555
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5556
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5557
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5558
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5559
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5560
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5561
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5562
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5563
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5564
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5565
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5566
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5567
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5568
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5570
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5571
5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N)
CVE-2015-5572
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)
CVE-2015-5573
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5574
7.2 CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5575
7.2 CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5576
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)
CVE-2015-5577
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5578
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5579
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5580
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5581
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5582
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5584
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5587
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5588
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-6676
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-6677
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-6678
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-6679
5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)
CVE-2015-6682
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8044
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8415
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8416
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8417
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8418
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8419
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8420
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8421
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8422
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8423
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8424
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8425
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8426
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8427
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8428
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8429
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8430
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8431
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8432
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8433
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8434
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8435
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8436
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8437
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8438
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8439
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8440
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8441
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8442
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8443
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8444
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8445
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8446
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8447
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8448
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8449
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8450
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8451
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8452
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8453
5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N)
CVE-2015-8454
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8455
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8456
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8457
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8459
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8460
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8634
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8635
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8636
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8638
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8639
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8640
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8641
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8642
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8643
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8644
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8645
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8646
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8647
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8648
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8649
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8650
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8651
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2016-0777
3.5 CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N
4.0 (AV:N/AC:L/Au:S/C:P/I:N/A:N)
CVE-2016-0778
5.5 CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L
4.6 (AV:N/AC:H/Au:S/C:P/I:P/A:P)
CVE-2016-1907
5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)
CVE-2016-2183
5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)
CVE-2016-4366
7.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVE-2016-8516
3.3 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
4.0 (AV:N/AC:L/Au:S/C:N/I:N/A:P)
CVE-2016-8517
6.8 CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N
7.9 (AV:N/AC:M/Au:S/C:C/I:C/A:N)
CVE-2016-8518
7.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.8 (AV:N/AC:L/Au:N/C:N/I:C/A:N)
CVE-2016-8531
6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
6.4 (AV:N/AC:L/Au:N/C:P/I:P/A:N)
CVE-2016-8532
6.3 CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:H/A:N
7.0 (AV:N/AC:M/Au:S/C:P/I:C/A:N)
CVE-2016-8533
5.7 CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N
6.8 (AV:N/AC:L/Au:S/C:C/I:N/A:N)
CVE-2016-8534
3.5 CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N
3.5 (AV:N/AC:M/Au:S/C:P/I:N/A:N)
CVE-2016-8535
4.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
4.0 (AV:N/AC:L/Au:S/C:N/I:P/A:N)
CVE-2017-5780
6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
7.8 (AV:N/AC:L/Au:N/C:C/I:N/A:N)
CVE-2017-5781
3.9 CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N
5.0 (AV:L/AC:M/Au:S/C:P/I:C/A:N)
CVE-2017-5782
5.6 CVSS:3.0/AV:P/AC:H/PR:H/UI:R/S:U/C:L/I:H/A:H
5.8 (AV:N/AC:M/Au:N/C:P/I:P/A:N)
CVE-2017-5783
5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N)
CVE-2017-5784
6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
5.8 (AV:N/AC:M/Au:N/C:P/I:P/A:N)
CVE-2017-5785
6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
6.4 (AV:N/AC:L/Au:N/C:P/I:P/A:N)
Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499
RESOLUTION
HPE has provided the following software updates to resolve the
vulnerabilities in the HPE Matrix Operating Environment (MOE). The update kit
applicable to the HPE Matrix Operating Environment (MOE) 7.6 is available at
the following location:
*
<https://h20392.www2.hpe.com/portal/swdepot/displayProductInfo.do?productNumb
r=HPID>
HPE has addressed these vulnerabilities for the impacted software components
bundled with HPE Matrix Operating Environment in the following HPE Security
Bulletins:
**HPE Systems Insight Manager (SIM)**
HPE Security Bulletin: HPSBMU03668
*
<https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05356388>
HISTORY
Version:1 (rev.1) - 3 February 2017 Initial release
Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.
Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-alert@hpe.com.
Report: To report a potential security vulnerability for any HPE supported
product:
Web form: https://www.hpe.com/info/report-security-vulnerability
Email: security-alert@hpe.com
Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice
Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive
Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.
3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX
Copyright 2016 Hewlett Packard Enterprise
Hewlett Packard Enterprise shall not be liable for technical or editorial
errors or omissions contained herein. The information provided is provided
"as is" without warranty of any kind. To the extent permitted by law, neither
HP or its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice. Hewlett
Packard Enterprise and the names of Hewlett Packard Enterprise products
referenced herein are trademarks of Hewlett Packard Enterprise in the United
States and other countries. Other product and company names mentioned herein
may be trademarks of their respective owners
| VAR-201508-0297 | CVE-2015-5130 | Adobe Flash Player and Adobe AIR Vulnerable to arbitrary code execution |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
Use-after-free vulnerability in Adobe Flash Player before 18.0.0.232 on Windows and OS X and before 11.2.202.508 on Linux, Adobe AIR before 18.0.0.199, Adobe AIR SDK before 18.0.0.199, and Adobe AIR SDK & Compiler before 18.0.0.199 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-5127, CVE-2015-5134, CVE-2015-5539, CVE-2015-5540, CVE-2015-5550, CVE-2015-5551, CVE-2015-5556, CVE-2015-5557, CVE-2015-5559, CVE-2015-5561, CVE-2015-5563, CVE-2015-5564, and CVE-2015-5565. This vulnerability CVE-2015-5127 , CVE-2015-5134 , CVE-2015-5539 , CVE-2015-5540 , CVE-2015-5550 , CVE-2015-5551 , CVE-2015-5556 , CVE-2015-5557 , CVE-2015-5559 , CVE-2015-5561 , CVE-2015-5563 , CVE-2015-5564 ,and CVE-2015-5565 Is a different vulnerability. Supplementary information : CWE Vulnerability type by CWE-416: Use-after-free ( Use of freed memory ) Has been identified. http://cwe.mitre.org/data/definitions/416.htmlAn attacker could execute arbitrary code. Failed exploit attempts will likely cause a denial-of-service condition. A use-after-free vulnerability exists in several Adobe products. The following products and versions are affected: Adobe Flash Player Desktop Runtime 18.0.0.209 and earlier versions and Adobe Flash Player Extended Support Release 13.0.0.309 and earlier versions based on Windows and Macintosh platforms, Adobe Flash Player for Windows, Macintosh and Linux platforms Google Chrome 18.0.0.209 and earlier, Adobe Flash Player for Microsoft Edge and Internet Explorer 11 on Windows 10 18.0.0.209 and earlier, Adobe Flash Player for Internet Explorer 10 and 11 18.0.0.209 on Windows 8.0 and 8.1 and previous versions, Adobe Flash Player for Linux 11.2.202.491 and previous versions based on Linux platforms, AIR Desktop Runtime 18.0.0.180 and previous versions based on Windows and Macintosh platforms, and AIR SDK 18.0 based on Windows, Macintosh, Android and iOS platforms. 0.180 and earlier and AIR SDK & Compiler 18.0.0.180 and earlier. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Critical: flash-plugin security update
Advisory ID: RHSA-2015:1603-01
Product: Red Hat Enterprise Linux Supplementary
Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1603.html
Issue date: 2015-08-12
CVE Names: CVE-2015-5127 CVE-2015-5128 CVE-2015-5129
CVE-2015-5130 CVE-2015-5131 CVE-2015-5132
CVE-2015-5133 CVE-2015-5134 CVE-2015-5539
CVE-2015-5540 CVE-2015-5541 CVE-2015-5544
CVE-2015-5545 CVE-2015-5546 CVE-2015-5547
CVE-2015-5548 CVE-2015-5549 CVE-2015-5550
CVE-2015-5551 CVE-2015-5552 CVE-2015-5553
CVE-2015-5554 CVE-2015-5555 CVE-2015-5556
CVE-2015-5557 CVE-2015-5558 CVE-2015-5559
CVE-2015-5560 CVE-2015-5561 CVE-2015-5562
CVE-2015-5563 CVE-2015-5564
=====================================================================
1. Summary:
An updated Adobe Flash Player package that fixes multiple security issues
is now available for Red Hat Enterprise Linux 5 and 6 Supplementary.
Red Hat Product Security has rated this update as having Critical security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Desktop Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64
3. Description:
The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash
Player web browser plug-in. These
vulnerabilities are detailed in the Adobe Security Bulletin APSB15-19
listed in the References section.
Multiple flaws were found in the way flash-plugin displayed certain SWF
content. An attacker could use these flaws to create a specially crafted
SWF file that would cause flash-plugin to crash or, potentially, execute
arbitrary code when the victim loaded a page containing the malicious SWF
content. (CVE-2015-5127, CVE-2015-5128, CVE-2015-5129, CVE-2015-5130,
CVE-2015-5131, CVE-2015-5132, CVE-2015-5133, CVE-2015-5134, CVE-2015-5539,
CVE-2015-5540, CVE-2015-5541, CVE-2015-5544, CVE-2015-5545, CVE-2015-5546,
CVE-2015-5547, CVE-2015-5548, CVE-2015-5549, CVE-2015-5550, CVE-2015-5551,
CVE-2015-5552, CVE-2015-5553, CVE-2015-5554, CVE-2015-5555, CVE-2015-5556,
CVE-2015-5557, CVE-2015-5558, CVE-2015-5559, CVE-2015-5560, CVE-2015-5561,
CVE-2015-5562, CVE-2015-5563, CVE-2015-5564)
All users of Adobe Flash Player should install this updated package, which
upgrades Flash Player to version 11.2.202.508.
4. Solution:
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1252697 - flash-plugin: multiple code execution flaws (APSB15-19)
6. Package List:
Red Hat Enterprise Linux Desktop Supplementary (v. 5):
i386:
flash-plugin-11.2.202.508-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.508-1.el5.i386.rpm
Red Hat Enterprise Linux Server Supplementary (v. 5):
i386:
flash-plugin-11.2.202.508-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.508-1.el5.i386.rpm
Red Hat Enterprise Linux Desktop Supplementary (v. 6):
i386:
flash-plugin-11.2.202.508-1.el6_7.i686.rpm
x86_64:
flash-plugin-11.2.202.508-1.el6_7.i686.rpm
Red Hat Enterprise Linux Server Supplementary (v. 6):
i386:
flash-plugin-11.2.202.508-1.el6_7.i686.rpm
x86_64:
flash-plugin-11.2.202.508-1.el6_7.i686.rpm
Red Hat Enterprise Linux Workstation Supplementary (v. 6):
i386:
flash-plugin-11.2.202.508-1.el6_7.i686.rpm
x86_64:
flash-plugin-11.2.202.508-1.el6_7.i686.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2015-5127
https://access.redhat.com/security/cve/CVE-2015-5128
https://access.redhat.com/security/cve/CVE-2015-5129
https://access.redhat.com/security/cve/CVE-2015-5130
https://access.redhat.com/security/cve/CVE-2015-5131
https://access.redhat.com/security/cve/CVE-2015-5132
https://access.redhat.com/security/cve/CVE-2015-5133
https://access.redhat.com/security/cve/CVE-2015-5134
https://access.redhat.com/security/cve/CVE-2015-5539
https://access.redhat.com/security/cve/CVE-2015-5540
https://access.redhat.com/security/cve/CVE-2015-5541
https://access.redhat.com/security/cve/CVE-2015-5544
https://access.redhat.com/security/cve/CVE-2015-5545
https://access.redhat.com/security/cve/CVE-2015-5546
https://access.redhat.com/security/cve/CVE-2015-5547
https://access.redhat.com/security/cve/CVE-2015-5548
https://access.redhat.com/security/cve/CVE-2015-5549
https://access.redhat.com/security/cve/CVE-2015-5550
https://access.redhat.com/security/cve/CVE-2015-5551
https://access.redhat.com/security/cve/CVE-2015-5552
https://access.redhat.com/security/cve/CVE-2015-5553
https://access.redhat.com/security/cve/CVE-2015-5554
https://access.redhat.com/security/cve/CVE-2015-5555
https://access.redhat.com/security/cve/CVE-2015-5556
https://access.redhat.com/security/cve/CVE-2015-5557
https://access.redhat.com/security/cve/CVE-2015-5558
https://access.redhat.com/security/cve/CVE-2015-5559
https://access.redhat.com/security/cve/CVE-2015-5560
https://access.redhat.com/security/cve/CVE-2015-5561
https://access.redhat.com/security/cve/CVE-2015-5562
https://access.redhat.com/security/cve/CVE-2015-5563
https://access.redhat.com/security/cve/CVE-2015-5564
https://access.redhat.com/security/updates/classification/#critical
https://helpx.adobe.com/security/products/flash-player/apsb15-19.html
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2015 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iD8DBQFVy2mAXlSAg2UNWIIRAty7AKCcTl+pzRlPMcYb+ESu7xg0C9nkVwCfbcNj
SwY72oO+5brzzyYR9NLDDnE=
=izmD
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
.
Background
==========
The Adobe Flash Player is a renderer for the SWF file format, which is
commonly used to provide interactive websites.
Please review the CVE identifiers referenced below for details.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All Adobe Flash Player users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot -v ">=www-plugins/adobe-flash-11.2.202.508"
References
==========
[ 1 ] CVE-2015-3107
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3107
[ 2 ] CVE-2015-5122
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5122
[ 3 ] CVE-2015-5123
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5123
[ 4 ] CVE-2015-5124
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5124
[ 5 ] CVE-2015-5125
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5125
[ 6 ] CVE-2015-5127
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5127
[ 7 ] CVE-2015-5129
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5129
[ 8 ] CVE-2015-5130
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5130
[ 9 ] CVE-2015-5131
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5131
[ 10 ] CVE-2015-5132
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5132
[ 11 ] CVE-2015-5133
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5133
[ 12 ] CVE-2015-5134
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5134
[ 13 ] CVE-2015-5539
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5539
[ 14 ] CVE-2015-5540
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5540
[ 15 ] CVE-2015-5541
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5541
[ 16 ] CVE-2015-5544
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5544
[ 17 ] CVE-2015-5545
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5545
[ 18 ] CVE-2015-5546
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5546
[ 19 ] CVE-2015-5547
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5547
[ 20 ] CVE-2015-5548
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5548
[ 21 ] CVE-2015-5549
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5549
[ 22 ] CVE-2015-5550
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5550
[ 23 ] CVE-2015-5551
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5551
[ 24 ] CVE-2015-5552
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5552
[ 25 ] CVE-2015-5553
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5553
[ 26 ] CVE-2015-5554
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5554
[ 27 ] CVE-2015-5555
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5555
[ 28 ] CVE-2015-5556
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5556
[ 29 ] CVE-2015-5557
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5557
[ 30 ] CVE-2015-5558
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5558
[ 31 ] CVE-2015-5559
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5559
[ 32 ] CVE-2015-5560
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5560
[ 33 ] CVE-2015-5561
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5561
[ 34 ] CVE-2015-5562
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5562
[ 35 ] CVE-2015-5563
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5563
[ 36 ] CVE-2015-5564
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5564
[ 37 ] CVE-2015-5965
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5965
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/201508-01
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2015 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05385680
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: c05385680
Version: 1
HPSBMU03692 rev.1 - HPE Matrix Operating Environment, Multiple Remote
Vulnerabilities
NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.
Release Date: 2017-02-03
Last Updated: 2017-02-03
Potential Security Impact: Remote: Bypass Security Restrictions, Cross-Site
Request Forgery (CSRF), Cross-Site Scripting (XSS), Denial of Service (DoS),
Disclosure of Information, Execution of Arbitrary Code
Source: Hewlett Packard Enterprise, Product Security Response Team
VULNERABILITY SUMMARY
Multiple potential security vulnerabilities have been identified in HPE
Matrix Operating Enviroment (MOE) on Windows. The vulnerabilities could be
exploited remotely resulting in the Bypass of Security Restrictions,
cross-site request forgery (CSRF), cross-site scripting (XSS), Denial of
Service (DoS), Disclosure of Information, and Execution of Arbitrary Code.
References:
- CVE-2016-8531 - Information Disclosure - VSE
- CVE-2016-8532 - XSS - VCEM
- CVE-2016-8533 - Priviledge Escalation - VCEM
- CVE-2016-8534 - Privilege Elevation - VSE
- CVE-2016-8535 - Http Parameter Pollution - VCEM
- CVE-2017-5780 - Clickjacking - MRM
- CVE-2017-5781 - CSRF - VSE
- CVE-2017-5782 - HSTS Header Missing - IO
- CVE-2017-5783 - Clickjacking - SPM
- CVE-2017-5784 - HSTS Header Missing - SPM
- CVE-2017-5785 - Information Disclosure - SPM
- CVE-2015-5127 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5129 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5130 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5131 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5132 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5133 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5134 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5539 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5540 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5541 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5544 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5545 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5546 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5547 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5548 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5549 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5550 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5551 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5552 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5553 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5555 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5556 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5557 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5558 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5559 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5560 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5561 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5562 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5563 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5564 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5565 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5566 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5575 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5576 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5580 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5574 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5588 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5570 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5572 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-6678 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5571 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5582 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5584 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5587 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5579 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5568 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-6679 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-6682 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-6677 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5573 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5578 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5577 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-6676 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5581 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8415 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8416 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8417 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8418 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8419 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8420 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8421 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8422 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8423 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8424 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8425 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8426 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8427 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8428 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8429 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8430 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8431 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8432 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8433 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8434 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8435 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8436 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8437 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8438 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8439 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8440 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8441 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8442 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8443 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8444 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8445 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8446 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8447 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8448 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8449 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8450 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8451 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8452 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8453 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8454 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8455 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8456 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8457 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8044 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8459 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8460 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8634 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8635 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8636 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8638 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8639 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8640 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8641 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8642 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8643 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8644 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8645 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8646 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8647 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8648 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8649 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8650 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8651 - Adobe Flash - unauthorized disclosure of information
- CVE-2016-2183 - Sweet32, DES, 3DES
- CVE-2016-0777 - OpenSSH, unauthorized disclosure of information
- CVE-2016-0778 - OpenSSH, unauthorized disclosure of information
- CVE-2016-1907 - OpenSSH, unauthorized disclosure of information
- CVE-2009-5028 - Namazu, unauthorized disclosure of information
- CVE-2011-4345 - Namazu, unauthorized disclosure of information
- CVE-2015-5254 - Apache ActiveMQ unauthorized disclosure of information
- CVE-2016-4366 - HPE SIM, unauthorized disclosure of information
- CVE-2015-5554 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5567 - Adobe Flash - unauthorized disclosure of information
- CVE-2016-8517 - HPE SIM, Cross-site Scripting (XSS)
- CVE-2016-8516 - HPE SIM, Denial of Service
- CVE-2016-8518 - HPE SIM, Denial of Service
SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
- HP Matrix Operating Environment Software 7.6
- HP Systems Insight Manager (HP SIM), Software 7.6
BACKGROUND
CVSS Base Metrics
=================
Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector
CVE-2009-5028
7.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVE-2011-4345
3.7 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
2.6 (AV:N/AC:H/Au:N/C:N/I:P/A:N)
CVE-2015-5127
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5129
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5130
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5131
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5132
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5133
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5134
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5254
7.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVE-2015-5539
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5540
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5541
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5544
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5545
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5546
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5547
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5548
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5549
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5550
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5551
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5552
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5553
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5554
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5555
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5556
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5557
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5558
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5559
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5560
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5561
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5562
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5563
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5564
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5565
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5566
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5567
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5568
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5570
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5571
5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N)
CVE-2015-5572
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)
CVE-2015-5573
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5574
7.2 CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5575
7.2 CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5576
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)
CVE-2015-5577
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5578
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5579
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5580
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5581
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5582
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5584
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5587
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5588
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-6676
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-6677
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-6678
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-6679
5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)
CVE-2015-6682
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8044
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8415
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8416
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8417
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8418
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8419
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8420
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8421
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8422
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8423
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8424
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8425
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8426
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8427
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8428
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8429
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8430
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8431
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8432
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8433
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8434
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8435
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8436
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8437
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8438
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8439
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8440
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8441
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8442
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8443
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8444
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8445
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8446
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8447
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8448
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8449
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8450
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8451
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8452
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8453
5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N)
CVE-2015-8454
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8455
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8456
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8457
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8459
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8460
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8634
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8635
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8636
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8638
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8639
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8640
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8641
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8642
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8643
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8644
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8645
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8646
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8647
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8648
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8649
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8650
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8651
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2016-0777
3.5 CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N
4.0 (AV:N/AC:L/Au:S/C:P/I:N/A:N)
CVE-2016-0778
5.5 CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L
4.6 (AV:N/AC:H/Au:S/C:P/I:P/A:P)
CVE-2016-1907
5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)
CVE-2016-2183
5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)
CVE-2016-4366
7.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVE-2016-8516
3.3 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
4.0 (AV:N/AC:L/Au:S/C:N/I:N/A:P)
CVE-2016-8517
6.8 CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N
7.9 (AV:N/AC:M/Au:S/C:C/I:C/A:N)
CVE-2016-8518
7.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.8 (AV:N/AC:L/Au:N/C:N/I:C/A:N)
CVE-2016-8531
6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
6.4 (AV:N/AC:L/Au:N/C:P/I:P/A:N)
CVE-2016-8532
6.3 CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:H/A:N
7.0 (AV:N/AC:M/Au:S/C:P/I:C/A:N)
CVE-2016-8533
5.7 CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N
6.8 (AV:N/AC:L/Au:S/C:C/I:N/A:N)
CVE-2016-8534
3.5 CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N
3.5 (AV:N/AC:M/Au:S/C:P/I:N/A:N)
CVE-2016-8535
4.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
4.0 (AV:N/AC:L/Au:S/C:N/I:P/A:N)
CVE-2017-5780
6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
7.8 (AV:N/AC:L/Au:N/C:C/I:N/A:N)
CVE-2017-5781
3.9 CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N
5.0 (AV:L/AC:M/Au:S/C:P/I:C/A:N)
CVE-2017-5782
5.6 CVSS:3.0/AV:P/AC:H/PR:H/UI:R/S:U/C:L/I:H/A:H
5.8 (AV:N/AC:M/Au:N/C:P/I:P/A:N)
CVE-2017-5783
5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N)
CVE-2017-5784
6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
5.8 (AV:N/AC:M/Au:N/C:P/I:P/A:N)
CVE-2017-5785
6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
6.4 (AV:N/AC:L/Au:N/C:P/I:P/A:N)
Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499
RESOLUTION
HPE has provided the following software updates to resolve the
vulnerabilities in the HPE Matrix Operating Environment (MOE). The update kit
applicable to the HPE Matrix Operating Environment (MOE) 7.6 is available at
the following location:
*
<https://h20392.www2.hpe.com/portal/swdepot/displayProductInfo.do?productNumb
r=HPID>
HPE has addressed these vulnerabilities for the impacted software components
bundled with HPE Matrix Operating Environment in the following HPE Security
Bulletins:
**HPE Systems Insight Manager (SIM)**
HPE Security Bulletin: HPSBMU03668
*
<https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05356388>
HISTORY
Version:1 (rev.1) - 3 February 2017 Initial release
Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.
Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-alert@hpe.com.
Report: To report a potential security vulnerability for any HPE supported
product:
Web form: https://www.hpe.com/info/report-security-vulnerability
Email: security-alert@hpe.com
Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice
Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive
Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.
3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX
Copyright 2016 Hewlett Packard Enterprise
Hewlett Packard Enterprise shall not be liable for technical or editorial
errors or omissions contained herein. The information provided is provided
"as is" without warranty of any kind. To the extent permitted by law, neither
HP or its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice. Hewlett
Packard Enterprise and the names of Hewlett Packard Enterprise products
referenced herein are trademarks of Hewlett Packard Enterprise in the United
States and other countries. Other product and company names mentioned herein
may be trademarks of their respective owners
| VAR-201508-0296 | CVE-2015-5129 | Adobe Flash Player and Adobe AIR Heap-based buffer overflow vulnerability |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
Heap-based buffer overflow in Adobe Flash Player before 18.0.0.232 on Windows and OS X and before 11.2.202.508 on Linux, Adobe AIR before 18.0.0.199, Adobe AIR SDK before 18.0.0.199, and Adobe AIR SDK & Compiler before 18.0.0.199 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-5541. This vulnerability CVE-2015-5541 Is a different vulnerability.An attacker could execute arbitrary code. Failed attempts will likely cause a denial-of-service condition. The following products and versions are affected: Adobe Flash Player Desktop Runtime 18.0.0.209 and earlier versions and Adobe Flash Player Extended Support Release 13.0.0.309 and earlier versions based on Windows and Macintosh platforms, Adobe Flash Player for Windows, Macintosh and Linux platforms Google Chrome 18.0.0.209 and earlier, Adobe Flash Player for Microsoft Edge and Internet Explorer 11 on Windows 10 18.0.0.209 and earlier, Adobe Flash Player for Internet Explorer 10 and 11 18.0.0.209 on Windows 8.0 and 8.1 and previous versions, Adobe Flash Player for Linux 11.2.202.491 and previous versions based on Linux platforms, AIR Desktop Runtime 18.0.0.180 and previous versions based on Windows and Macintosh platforms, and AIR SDK 18.0 based on Windows, Macintosh, Android and iOS platforms. 0.180 and earlier and AIR SDK & Compiler 18.0.0.180 and earlier. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Critical: flash-plugin security update
Advisory ID: RHSA-2015:1603-01
Product: Red Hat Enterprise Linux Supplementary
Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1603.html
Issue date: 2015-08-12
CVE Names: CVE-2015-5127 CVE-2015-5128 CVE-2015-5129
CVE-2015-5130 CVE-2015-5131 CVE-2015-5132
CVE-2015-5133 CVE-2015-5134 CVE-2015-5539
CVE-2015-5540 CVE-2015-5541 CVE-2015-5544
CVE-2015-5545 CVE-2015-5546 CVE-2015-5547
CVE-2015-5548 CVE-2015-5549 CVE-2015-5550
CVE-2015-5551 CVE-2015-5552 CVE-2015-5553
CVE-2015-5554 CVE-2015-5555 CVE-2015-5556
CVE-2015-5557 CVE-2015-5558 CVE-2015-5559
CVE-2015-5560 CVE-2015-5561 CVE-2015-5562
CVE-2015-5563 CVE-2015-5564
=====================================================================
1. Summary:
An updated Adobe Flash Player package that fixes multiple security issues
is now available for Red Hat Enterprise Linux 5 and 6 Supplementary.
Red Hat Product Security has rated this update as having Critical security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Desktop Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64
3. These
vulnerabilities are detailed in the Adobe Security Bulletin APSB15-19
listed in the References section.
Multiple flaws were found in the way flash-plugin displayed certain SWF
content. An attacker could use these flaws to create a specially crafted
SWF file that would cause flash-plugin to crash or, potentially, execute
arbitrary code when the victim loaded a page containing the malicious SWF
content. (CVE-2015-5127, CVE-2015-5128, CVE-2015-5129, CVE-2015-5130,
CVE-2015-5131, CVE-2015-5132, CVE-2015-5133, CVE-2015-5134, CVE-2015-5539,
CVE-2015-5540, CVE-2015-5541, CVE-2015-5544, CVE-2015-5545, CVE-2015-5546,
CVE-2015-5547, CVE-2015-5548, CVE-2015-5549, CVE-2015-5550, CVE-2015-5551,
CVE-2015-5552, CVE-2015-5553, CVE-2015-5554, CVE-2015-5555, CVE-2015-5556,
CVE-2015-5557, CVE-2015-5558, CVE-2015-5559, CVE-2015-5560, CVE-2015-5561,
CVE-2015-5562, CVE-2015-5563, CVE-2015-5564)
All users of Adobe Flash Player should install this updated package, which
upgrades Flash Player to version 11.2.202.508.
4. Solution:
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1252697 - flash-plugin: multiple code execution flaws (APSB15-19)
6. Package List:
Red Hat Enterprise Linux Desktop Supplementary (v. 5):
i386:
flash-plugin-11.2.202.508-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.508-1.el5.i386.rpm
Red Hat Enterprise Linux Server Supplementary (v. 5):
i386:
flash-plugin-11.2.202.508-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.508-1.el5.i386.rpm
Red Hat Enterprise Linux Desktop Supplementary (v. 6):
i386:
flash-plugin-11.2.202.508-1.el6_7.i686.rpm
x86_64:
flash-plugin-11.2.202.508-1.el6_7.i686.rpm
Red Hat Enterprise Linux Server Supplementary (v. 6):
i386:
flash-plugin-11.2.202.508-1.el6_7.i686.rpm
x86_64:
flash-plugin-11.2.202.508-1.el6_7.i686.rpm
Red Hat Enterprise Linux Workstation Supplementary (v. 6):
i386:
flash-plugin-11.2.202.508-1.el6_7.i686.rpm
x86_64:
flash-plugin-11.2.202.508-1.el6_7.i686.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2015-5127
https://access.redhat.com/security/cve/CVE-2015-5128
https://access.redhat.com/security/cve/CVE-2015-5129
https://access.redhat.com/security/cve/CVE-2015-5130
https://access.redhat.com/security/cve/CVE-2015-5131
https://access.redhat.com/security/cve/CVE-2015-5132
https://access.redhat.com/security/cve/CVE-2015-5133
https://access.redhat.com/security/cve/CVE-2015-5134
https://access.redhat.com/security/cve/CVE-2015-5539
https://access.redhat.com/security/cve/CVE-2015-5540
https://access.redhat.com/security/cve/CVE-2015-5541
https://access.redhat.com/security/cve/CVE-2015-5544
https://access.redhat.com/security/cve/CVE-2015-5545
https://access.redhat.com/security/cve/CVE-2015-5546
https://access.redhat.com/security/cve/CVE-2015-5547
https://access.redhat.com/security/cve/CVE-2015-5548
https://access.redhat.com/security/cve/CVE-2015-5549
https://access.redhat.com/security/cve/CVE-2015-5550
https://access.redhat.com/security/cve/CVE-2015-5551
https://access.redhat.com/security/cve/CVE-2015-5552
https://access.redhat.com/security/cve/CVE-2015-5553
https://access.redhat.com/security/cve/CVE-2015-5554
https://access.redhat.com/security/cve/CVE-2015-5555
https://access.redhat.com/security/cve/CVE-2015-5556
https://access.redhat.com/security/cve/CVE-2015-5557
https://access.redhat.com/security/cve/CVE-2015-5558
https://access.redhat.com/security/cve/CVE-2015-5559
https://access.redhat.com/security/cve/CVE-2015-5560
https://access.redhat.com/security/cve/CVE-2015-5561
https://access.redhat.com/security/cve/CVE-2015-5562
https://access.redhat.com/security/cve/CVE-2015-5563
https://access.redhat.com/security/cve/CVE-2015-5564
https://access.redhat.com/security/updates/classification/#critical
https://helpx.adobe.com/security/products/flash-player/apsb15-19.html
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2015 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iD8DBQFVy2mAXlSAg2UNWIIRAty7AKCcTl+pzRlPMcYb+ESu7xg0C9nkVwCfbcNj
SwY72oO+5brzzyYR9NLDDnE=
=izmD
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
.
Background
==========
The Adobe Flash Player is a renderer for the SWF file format, which is
commonly used to provide interactive websites.
Please review the CVE identifiers referenced below for details.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All Adobe Flash Player users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot -v ">=www-plugins/adobe-flash-11.2.202.508"
References
==========
[ 1 ] CVE-2015-3107
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3107
[ 2 ] CVE-2015-5122
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5122
[ 3 ] CVE-2015-5123
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5123
[ 4 ] CVE-2015-5124
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5124
[ 5 ] CVE-2015-5125
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5125
[ 6 ] CVE-2015-5127
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5127
[ 7 ] CVE-2015-5129
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5129
[ 8 ] CVE-2015-5130
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5130
[ 9 ] CVE-2015-5131
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5131
[ 10 ] CVE-2015-5132
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5132
[ 11 ] CVE-2015-5133
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5133
[ 12 ] CVE-2015-5134
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5134
[ 13 ] CVE-2015-5539
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5539
[ 14 ] CVE-2015-5540
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5540
[ 15 ] CVE-2015-5541
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5541
[ 16 ] CVE-2015-5544
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5544
[ 17 ] CVE-2015-5545
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5545
[ 18 ] CVE-2015-5546
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5546
[ 19 ] CVE-2015-5547
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5547
[ 20 ] CVE-2015-5548
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5548
[ 21 ] CVE-2015-5549
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5549
[ 22 ] CVE-2015-5550
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5550
[ 23 ] CVE-2015-5551
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5551
[ 24 ] CVE-2015-5552
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5552
[ 25 ] CVE-2015-5553
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5553
[ 26 ] CVE-2015-5554
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5554
[ 27 ] CVE-2015-5555
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5555
[ 28 ] CVE-2015-5556
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5556
[ 29 ] CVE-2015-5557
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5557
[ 30 ] CVE-2015-5558
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5558
[ 31 ] CVE-2015-5559
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5559
[ 32 ] CVE-2015-5560
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5560
[ 33 ] CVE-2015-5561
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5561
[ 34 ] CVE-2015-5562
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5562
[ 35 ] CVE-2015-5563
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5563
[ 36 ] CVE-2015-5564
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5564
[ 37 ] CVE-2015-5965
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5965
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/201508-01
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2015 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05385680
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: c05385680
Version: 1
HPSBMU03692 rev.1 - HPE Matrix Operating Environment, Multiple Remote
Vulnerabilities
NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.
Release Date: 2017-02-03
Last Updated: 2017-02-03
Potential Security Impact: Remote: Bypass Security Restrictions, Cross-Site
Request Forgery (CSRF), Cross-Site Scripting (XSS), Denial of Service (DoS),
Disclosure of Information, Execution of Arbitrary Code
Source: Hewlett Packard Enterprise, Product Security Response Team
VULNERABILITY SUMMARY
Multiple potential security vulnerabilities have been identified in HPE
Matrix Operating Enviroment (MOE) on Windows. The vulnerabilities could be
exploited remotely resulting in the Bypass of Security Restrictions,
cross-site request forgery (CSRF), cross-site scripting (XSS), Denial of
Service (DoS), Disclosure of Information, and Execution of Arbitrary Code.
References:
- CVE-2016-8531 - Information Disclosure - VSE
- CVE-2016-8532 - XSS - VCEM
- CVE-2016-8533 - Priviledge Escalation - VCEM
- CVE-2016-8534 - Privilege Elevation - VSE
- CVE-2016-8535 - Http Parameter Pollution - VCEM
- CVE-2017-5780 - Clickjacking - MRM
- CVE-2017-5781 - CSRF - VSE
- CVE-2017-5782 - HSTS Header Missing - IO
- CVE-2017-5783 - Clickjacking - SPM
- CVE-2017-5784 - HSTS Header Missing - SPM
- CVE-2017-5785 - Information Disclosure - SPM
- CVE-2015-5127 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5129 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5130 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5131 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5132 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5133 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5134 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5539 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5540 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5541 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5544 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5545 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5546 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5547 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5548 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5549 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5550 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5551 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5552 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5553 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5555 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5556 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5557 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5558 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5559 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5560 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5561 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5562 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5563 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5564 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5565 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5566 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5575 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5576 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5580 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5574 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5588 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5570 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5572 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-6678 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5571 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5582 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5584 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5587 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5579 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5568 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-6679 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-6682 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-6677 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5573 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5578 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5577 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-6676 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5581 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8415 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8416 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8417 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8418 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8419 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8420 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8421 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8422 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8423 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8424 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8425 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8426 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8427 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8428 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8429 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8430 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8431 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8432 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8433 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8434 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8435 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8436 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8437 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8438 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8439 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8440 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8441 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8442 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8443 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8444 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8445 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8446 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8447 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8448 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8449 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8450 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8451 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8452 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8453 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8454 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8455 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8456 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8457 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8044 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8459 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8460 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8634 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8635 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8636 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8638 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8639 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8640 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8641 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8642 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8643 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8644 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8645 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8646 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8647 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8648 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8649 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8650 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8651 - Adobe Flash - unauthorized disclosure of information
- CVE-2016-2183 - Sweet32, DES, 3DES
- CVE-2016-0777 - OpenSSH, unauthorized disclosure of information
- CVE-2016-0778 - OpenSSH, unauthorized disclosure of information
- CVE-2016-1907 - OpenSSH, unauthorized disclosure of information
- CVE-2009-5028 - Namazu, unauthorized disclosure of information
- CVE-2011-4345 - Namazu, unauthorized disclosure of information
- CVE-2015-5254 - Apache ActiveMQ unauthorized disclosure of information
- CVE-2016-4366 - HPE SIM, unauthorized disclosure of information
- CVE-2015-5554 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5567 - Adobe Flash - unauthorized disclosure of information
- CVE-2016-8517 - HPE SIM, Cross-site Scripting (XSS)
- CVE-2016-8516 - HPE SIM, Denial of Service
- CVE-2016-8518 - HPE SIM, Denial of Service
SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
- HP Matrix Operating Environment Software 7.6
- HP Systems Insight Manager (HP SIM), Software 7.6
BACKGROUND
CVSS Base Metrics
=================
Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector
CVE-2009-5028
7.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVE-2011-4345
3.7 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
2.6 (AV:N/AC:H/Au:N/C:N/I:P/A:N)
CVE-2015-5127
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5129
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5130
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5131
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5132
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5133
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5134
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5254
7.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVE-2015-5539
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5540
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5541
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5544
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5545
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5546
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5547
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5548
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5549
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5550
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5551
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5552
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5553
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5554
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5555
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5556
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5557
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5558
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5559
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5560
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5561
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5562
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5563
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5564
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5565
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5566
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5567
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5568
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5570
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5571
5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N)
CVE-2015-5572
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)
CVE-2015-5573
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5574
7.2 CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5575
7.2 CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5576
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)
CVE-2015-5577
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5578
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5579
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5580
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5581
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5582
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5584
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5587
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5588
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-6676
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-6677
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-6678
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-6679
5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)
CVE-2015-6682
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8044
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8415
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8416
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8417
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8418
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8419
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8420
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8421
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8422
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8423
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8424
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8425
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8426
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8427
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8428
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8429
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8430
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8431
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8432
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8433
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8434
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8435
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8436
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8437
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8438
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8439
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8440
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8441
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8442
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8443
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8444
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8445
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8446
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8447
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8448
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8449
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8450
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8451
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8452
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8453
5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N)
CVE-2015-8454
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8455
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8456
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8457
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8459
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8460
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8634
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8635
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8636
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8638
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8639
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8640
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8641
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8642
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8643
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8644
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8645
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8646
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8647
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8648
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8649
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8650
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8651
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2016-0777
3.5 CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N
4.0 (AV:N/AC:L/Au:S/C:P/I:N/A:N)
CVE-2016-0778
5.5 CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L
4.6 (AV:N/AC:H/Au:S/C:P/I:P/A:P)
CVE-2016-1907
5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)
CVE-2016-2183
5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)
CVE-2016-4366
7.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVE-2016-8516
3.3 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
4.0 (AV:N/AC:L/Au:S/C:N/I:N/A:P)
CVE-2016-8517
6.8 CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N
7.9 (AV:N/AC:M/Au:S/C:C/I:C/A:N)
CVE-2016-8518
7.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.8 (AV:N/AC:L/Au:N/C:N/I:C/A:N)
CVE-2016-8531
6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
6.4 (AV:N/AC:L/Au:N/C:P/I:P/A:N)
CVE-2016-8532
6.3 CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:H/A:N
7.0 (AV:N/AC:M/Au:S/C:P/I:C/A:N)
CVE-2016-8533
5.7 CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N
6.8 (AV:N/AC:L/Au:S/C:C/I:N/A:N)
CVE-2016-8534
3.5 CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N
3.5 (AV:N/AC:M/Au:S/C:P/I:N/A:N)
CVE-2016-8535
4.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
4.0 (AV:N/AC:L/Au:S/C:N/I:P/A:N)
CVE-2017-5780
6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
7.8 (AV:N/AC:L/Au:N/C:C/I:N/A:N)
CVE-2017-5781
3.9 CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N
5.0 (AV:L/AC:M/Au:S/C:P/I:C/A:N)
CVE-2017-5782
5.6 CVSS:3.0/AV:P/AC:H/PR:H/UI:R/S:U/C:L/I:H/A:H
5.8 (AV:N/AC:M/Au:N/C:P/I:P/A:N)
CVE-2017-5783
5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N)
CVE-2017-5784
6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
5.8 (AV:N/AC:M/Au:N/C:P/I:P/A:N)
CVE-2017-5785
6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
6.4 (AV:N/AC:L/Au:N/C:P/I:P/A:N)
Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499
RESOLUTION
HPE has provided the following software updates to resolve the
vulnerabilities in the HPE Matrix Operating Environment (MOE). The update kit
applicable to the HPE Matrix Operating Environment (MOE) 7.6 is available at
the following location:
*
<https://h20392.www2.hpe.com/portal/swdepot/displayProductInfo.do?productNumb
r=HPID>
HPE has addressed these vulnerabilities for the impacted software components
bundled with HPE Matrix Operating Environment in the following HPE Security
Bulletins:
**HPE Systems Insight Manager (SIM)**
HPE Security Bulletin: HPSBMU03668
*
<https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05356388>
HISTORY
Version:1 (rev.1) - 3 February 2017 Initial release
Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.
Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-alert@hpe.com.
Report: To report a potential security vulnerability for any HPE supported
product:
Web form: https://www.hpe.com/info/report-security-vulnerability
Email: security-alert@hpe.com
Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice
Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive
Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.
3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX
Copyright 2016 Hewlett Packard Enterprise
Hewlett Packard Enterprise shall not be liable for technical or editorial
errors or omissions contained herein. The information provided is provided
"as is" without warranty of any kind. To the extent permitted by law, neither
HP or its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice. Hewlett
Packard Enterprise and the names of Hewlett Packard Enterprise products
referenced herein are trademarks of Hewlett Packard Enterprise in the United
States and other countries. Other product and company names mentioned herein
may be trademarks of their respective owners
| VAR-201508-0295 | CVE-2015-5127 | Adobe Flash Player and Adobe AIR Vulnerable to arbitrary code execution |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
Use-after-free vulnerability in Adobe Flash Player before 18.0.0.232 on Windows and OS X and before 11.2.202.508 on Linux, Adobe AIR before 18.0.0.199, Adobe AIR SDK before 18.0.0.199, and Adobe AIR SDK & Compiler before 18.0.0.199 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-5130, CVE-2015-5134, CVE-2015-5539, CVE-2015-5540, CVE-2015-5550, CVE-2015-5551, CVE-2015-5556, CVE-2015-5557, CVE-2015-5559, CVE-2015-5561, CVE-2015-5563, CVE-2015-5564, and CVE-2015-5565. This vulnerability CVE-2015-5130 , CVE-2015-5134 , CVE-2015-5539 , CVE-2015-5540 , CVE-2015-5550 , CVE-2015-5551 , CVE-2015-5556 , CVE-2015-5557 , CVE-2015-5559 , CVE-2015-5561 , CVE-2015-5563 , CVE-2015-5564 ,and CVE-2015-5565 Is a different vulnerability. Supplementary information : CWE Vulnerability type by CWE-416: Use-after-free ( Use of freed memory ) Has been identified. http://cwe.mitre.org/data/definitions/416.htmlAn attacker could execute arbitrary code. Failed exploit attempts will likely cause a denial-of-service condition. A use-after-free vulnerability exists in several Adobe products. The following products and versions are affected: Adobe Flash Player Desktop Runtime 18.0.0.209 and earlier versions and Adobe Flash Player Extended Support Release 13.0.0.309 and earlier versions based on Windows and Macintosh platforms, Adobe Flash Player for Windows, Macintosh and Linux platforms Google Chrome 18.0.0.209 and earlier, Adobe Flash Player for Microsoft Edge and Internet Explorer 11 on Windows 10 18.0.0.209 and earlier, Adobe Flash Player for Internet Explorer 10 and 11 18.0.0.209 on Windows 8.0 and 8.1 and previous versions, Adobe Flash Player for Linux 11.2.202.491 and previous versions based on Linux platforms, AIR Desktop Runtime 18.0.0.180 and previous versions based on Windows and Macintosh platforms, and AIR SDK 18.0 based on Windows, Macintosh, Android and iOS platforms. 0.180 and earlier and AIR SDK & Compiler 18.0.0.180 and earlier. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Critical: flash-plugin security update
Advisory ID: RHSA-2015:1603-01
Product: Red Hat Enterprise Linux Supplementary
Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1603.html
Issue date: 2015-08-12
CVE Names: CVE-2015-5127 CVE-2015-5128 CVE-2015-5129
CVE-2015-5130 CVE-2015-5131 CVE-2015-5132
CVE-2015-5133 CVE-2015-5134 CVE-2015-5539
CVE-2015-5540 CVE-2015-5541 CVE-2015-5544
CVE-2015-5545 CVE-2015-5546 CVE-2015-5547
CVE-2015-5548 CVE-2015-5549 CVE-2015-5550
CVE-2015-5551 CVE-2015-5552 CVE-2015-5553
CVE-2015-5554 CVE-2015-5555 CVE-2015-5556
CVE-2015-5557 CVE-2015-5558 CVE-2015-5559
CVE-2015-5560 CVE-2015-5561 CVE-2015-5562
CVE-2015-5563 CVE-2015-5564
=====================================================================
1. Summary:
An updated Adobe Flash Player package that fixes multiple security issues
is now available for Red Hat Enterprise Linux 5 and 6 Supplementary.
Red Hat Product Security has rated this update as having Critical security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Desktop Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64
3. Description:
The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash
Player web browser plug-in. These
vulnerabilities are detailed in the Adobe Security Bulletin APSB15-19
listed in the References section.
Multiple flaws were found in the way flash-plugin displayed certain SWF
content. An attacker could use these flaws to create a specially crafted
SWF file that would cause flash-plugin to crash or, potentially, execute
arbitrary code when the victim loaded a page containing the malicious SWF
content. (CVE-2015-5127, CVE-2015-5128, CVE-2015-5129, CVE-2015-5130,
CVE-2015-5131, CVE-2015-5132, CVE-2015-5133, CVE-2015-5134, CVE-2015-5539,
CVE-2015-5540, CVE-2015-5541, CVE-2015-5544, CVE-2015-5545, CVE-2015-5546,
CVE-2015-5547, CVE-2015-5548, CVE-2015-5549, CVE-2015-5550, CVE-2015-5551,
CVE-2015-5552, CVE-2015-5553, CVE-2015-5554, CVE-2015-5555, CVE-2015-5556,
CVE-2015-5557, CVE-2015-5558, CVE-2015-5559, CVE-2015-5560, CVE-2015-5561,
CVE-2015-5562, CVE-2015-5563, CVE-2015-5564)
All users of Adobe Flash Player should install this updated package, which
upgrades Flash Player to version 11.2.202.508.
4. Solution:
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1252697 - flash-plugin: multiple code execution flaws (APSB15-19)
6. Package List:
Red Hat Enterprise Linux Desktop Supplementary (v. 5):
i386:
flash-plugin-11.2.202.508-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.508-1.el5.i386.rpm
Red Hat Enterprise Linux Server Supplementary (v. 5):
i386:
flash-plugin-11.2.202.508-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.508-1.el5.i386.rpm
Red Hat Enterprise Linux Desktop Supplementary (v. 6):
i386:
flash-plugin-11.2.202.508-1.el6_7.i686.rpm
x86_64:
flash-plugin-11.2.202.508-1.el6_7.i686.rpm
Red Hat Enterprise Linux Server Supplementary (v. 6):
i386:
flash-plugin-11.2.202.508-1.el6_7.i686.rpm
x86_64:
flash-plugin-11.2.202.508-1.el6_7.i686.rpm
Red Hat Enterprise Linux Workstation Supplementary (v. 6):
i386:
flash-plugin-11.2.202.508-1.el6_7.i686.rpm
x86_64:
flash-plugin-11.2.202.508-1.el6_7.i686.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2015-5127
https://access.redhat.com/security/cve/CVE-2015-5128
https://access.redhat.com/security/cve/CVE-2015-5129
https://access.redhat.com/security/cve/CVE-2015-5130
https://access.redhat.com/security/cve/CVE-2015-5131
https://access.redhat.com/security/cve/CVE-2015-5132
https://access.redhat.com/security/cve/CVE-2015-5133
https://access.redhat.com/security/cve/CVE-2015-5134
https://access.redhat.com/security/cve/CVE-2015-5539
https://access.redhat.com/security/cve/CVE-2015-5540
https://access.redhat.com/security/cve/CVE-2015-5541
https://access.redhat.com/security/cve/CVE-2015-5544
https://access.redhat.com/security/cve/CVE-2015-5545
https://access.redhat.com/security/cve/CVE-2015-5546
https://access.redhat.com/security/cve/CVE-2015-5547
https://access.redhat.com/security/cve/CVE-2015-5548
https://access.redhat.com/security/cve/CVE-2015-5549
https://access.redhat.com/security/cve/CVE-2015-5550
https://access.redhat.com/security/cve/CVE-2015-5551
https://access.redhat.com/security/cve/CVE-2015-5552
https://access.redhat.com/security/cve/CVE-2015-5553
https://access.redhat.com/security/cve/CVE-2015-5554
https://access.redhat.com/security/cve/CVE-2015-5555
https://access.redhat.com/security/cve/CVE-2015-5556
https://access.redhat.com/security/cve/CVE-2015-5557
https://access.redhat.com/security/cve/CVE-2015-5558
https://access.redhat.com/security/cve/CVE-2015-5559
https://access.redhat.com/security/cve/CVE-2015-5560
https://access.redhat.com/security/cve/CVE-2015-5561
https://access.redhat.com/security/cve/CVE-2015-5562
https://access.redhat.com/security/cve/CVE-2015-5563
https://access.redhat.com/security/cve/CVE-2015-5564
https://access.redhat.com/security/updates/classification/#critical
https://helpx.adobe.com/security/products/flash-player/apsb15-19.html
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2015 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iD8DBQFVy2mAXlSAg2UNWIIRAty7AKCcTl+pzRlPMcYb+ESu7xg0C9nkVwCfbcNj
SwY72oO+5brzzyYR9NLDDnE=
=izmD
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
.
Background
==========
The Adobe Flash Player is a renderer for the SWF file format, which is
commonly used to provide interactive websites.
Please review the CVE identifiers referenced below for details.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All Adobe Flash Player users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot -v ">=www-plugins/adobe-flash-11.2.202.508"
References
==========
[ 1 ] CVE-2015-3107
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3107
[ 2 ] CVE-2015-5122
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5122
[ 3 ] CVE-2015-5123
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5123
[ 4 ] CVE-2015-5124
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5124
[ 5 ] CVE-2015-5125
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5125
[ 6 ] CVE-2015-5127
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5127
[ 7 ] CVE-2015-5129
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5129
[ 8 ] CVE-2015-5130
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5130
[ 9 ] CVE-2015-5131
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5131
[ 10 ] CVE-2015-5132
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5132
[ 11 ] CVE-2015-5133
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5133
[ 12 ] CVE-2015-5134
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5134
[ 13 ] CVE-2015-5539
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5539
[ 14 ] CVE-2015-5540
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5540
[ 15 ] CVE-2015-5541
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5541
[ 16 ] CVE-2015-5544
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5544
[ 17 ] CVE-2015-5545
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5545
[ 18 ] CVE-2015-5546
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5546
[ 19 ] CVE-2015-5547
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5547
[ 20 ] CVE-2015-5548
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5548
[ 21 ] CVE-2015-5549
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5549
[ 22 ] CVE-2015-5550
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5550
[ 23 ] CVE-2015-5551
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5551
[ 24 ] CVE-2015-5552
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5552
[ 25 ] CVE-2015-5553
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5553
[ 26 ] CVE-2015-5554
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5554
[ 27 ] CVE-2015-5555
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5555
[ 28 ] CVE-2015-5556
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5556
[ 29 ] CVE-2015-5557
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5557
[ 30 ] CVE-2015-5558
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5558
[ 31 ] CVE-2015-5559
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5559
[ 32 ] CVE-2015-5560
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5560
[ 33 ] CVE-2015-5561
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5561
[ 34 ] CVE-2015-5562
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5562
[ 35 ] CVE-2015-5563
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5563
[ 36 ] CVE-2015-5564
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5564
[ 37 ] CVE-2015-5965
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5965
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/201508-01
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2015 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05385680
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: c05385680
Version: 1
HPSBMU03692 rev.1 - HPE Matrix Operating Environment, Multiple Remote
Vulnerabilities
NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.
Release Date: 2017-02-03
Last Updated: 2017-02-03
Potential Security Impact: Remote: Bypass Security Restrictions, Cross-Site
Request Forgery (CSRF), Cross-Site Scripting (XSS), Denial of Service (DoS),
Disclosure of Information, Execution of Arbitrary Code
Source: Hewlett Packard Enterprise, Product Security Response Team
VULNERABILITY SUMMARY
Multiple potential security vulnerabilities have been identified in HPE
Matrix Operating Enviroment (MOE) on Windows. The vulnerabilities could be
exploited remotely resulting in the Bypass of Security Restrictions,
cross-site request forgery (CSRF), cross-site scripting (XSS), Denial of
Service (DoS), Disclosure of Information, and Execution of Arbitrary Code.
References:
- CVE-2016-8531 - Information Disclosure - VSE
- CVE-2016-8532 - XSS - VCEM
- CVE-2016-8533 - Priviledge Escalation - VCEM
- CVE-2016-8534 - Privilege Elevation - VSE
- CVE-2016-8535 - Http Parameter Pollution - VCEM
- CVE-2017-5780 - Clickjacking - MRM
- CVE-2017-5781 - CSRF - VSE
- CVE-2017-5782 - HSTS Header Missing - IO
- CVE-2017-5783 - Clickjacking - SPM
- CVE-2017-5784 - HSTS Header Missing - SPM
- CVE-2017-5785 - Information Disclosure - SPM
- CVE-2015-5127 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5129 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5130 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5131 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5132 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5133 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5134 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5539 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5540 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5541 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5544 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5545 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5546 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5547 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5548 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5549 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5550 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5551 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5552 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5553 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5555 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5556 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5557 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5558 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5559 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5560 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5561 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5562 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5563 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5564 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5565 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5566 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5575 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5576 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5580 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5574 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5588 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5570 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5572 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-6678 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5571 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5582 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5584 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5587 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5579 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5568 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-6679 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-6682 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-6677 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5573 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5578 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5577 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-6676 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5581 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8415 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8416 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8417 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8418 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8419 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8420 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8421 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8422 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8423 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8424 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8425 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8426 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8427 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8428 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8429 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8430 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8431 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8432 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8433 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8434 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8435 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8436 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8437 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8438 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8439 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8440 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8441 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8442 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8443 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8444 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8445 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8446 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8447 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8448 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8449 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8450 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8451 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8452 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8453 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8454 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8455 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8456 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8457 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8044 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8459 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8460 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8634 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8635 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8636 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8638 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8639 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8640 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8641 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8642 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8643 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8644 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8645 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8646 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8647 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8648 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8649 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8650 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8651 - Adobe Flash - unauthorized disclosure of information
- CVE-2016-2183 - Sweet32, DES, 3DES
- CVE-2016-0777 - OpenSSH, unauthorized disclosure of information
- CVE-2016-0778 - OpenSSH, unauthorized disclosure of information
- CVE-2016-1907 - OpenSSH, unauthorized disclosure of information
- CVE-2009-5028 - Namazu, unauthorized disclosure of information
- CVE-2011-4345 - Namazu, unauthorized disclosure of information
- CVE-2015-5254 - Apache ActiveMQ unauthorized disclosure of information
- CVE-2016-4366 - HPE SIM, unauthorized disclosure of information
- CVE-2015-5554 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5567 - Adobe Flash - unauthorized disclosure of information
- CVE-2016-8517 - HPE SIM, Cross-site Scripting (XSS)
- CVE-2016-8516 - HPE SIM, Denial of Service
- CVE-2016-8518 - HPE SIM, Denial of Service
SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
- HP Matrix Operating Environment Software 7.6
- HP Systems Insight Manager (HP SIM), Software 7.6
BACKGROUND
CVSS Base Metrics
=================
Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector
CVE-2009-5028
7.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVE-2011-4345
3.7 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
2.6 (AV:N/AC:H/Au:N/C:N/I:P/A:N)
CVE-2015-5127
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5129
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5130
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5131
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5132
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5133
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5134
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5254
7.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVE-2015-5539
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5540
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5541
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5544
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5545
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5546
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5547
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5548
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5549
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5550
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5551
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5552
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5553
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5554
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5555
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5556
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5557
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5558
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5559
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5560
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5561
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5562
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5563
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5564
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5565
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5566
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5567
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5568
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5570
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5571
5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N)
CVE-2015-5572
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)
CVE-2015-5573
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5574
7.2 CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5575
7.2 CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5576
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)
CVE-2015-5577
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5578
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5579
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5580
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5581
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5582
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5584
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5587
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5588
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-6676
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-6677
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-6678
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-6679
5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)
CVE-2015-6682
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8044
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8415
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8416
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8417
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8418
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8419
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8420
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8421
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8422
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8423
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8424
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8425
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8426
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8427
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8428
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8429
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8430
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8431
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8432
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8433
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8434
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8435
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8436
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8437
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8438
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8439
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8440
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8441
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8442
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8443
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8444
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8445
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8446
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8447
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8448
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8449
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8450
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8451
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8452
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8453
5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N)
CVE-2015-8454
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8455
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8456
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8457
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8459
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8460
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8634
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8635
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8636
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8638
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8639
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8640
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8641
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8642
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8643
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8644
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8645
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8646
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8647
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8648
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8649
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8650
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8651
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2016-0777
3.5 CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N
4.0 (AV:N/AC:L/Au:S/C:P/I:N/A:N)
CVE-2016-0778
5.5 CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L
4.6 (AV:N/AC:H/Au:S/C:P/I:P/A:P)
CVE-2016-1907
5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)
CVE-2016-2183
5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)
CVE-2016-4366
7.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVE-2016-8516
3.3 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
4.0 (AV:N/AC:L/Au:S/C:N/I:N/A:P)
CVE-2016-8517
6.8 CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N
7.9 (AV:N/AC:M/Au:S/C:C/I:C/A:N)
CVE-2016-8518
7.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.8 (AV:N/AC:L/Au:N/C:N/I:C/A:N)
CVE-2016-8531
6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
6.4 (AV:N/AC:L/Au:N/C:P/I:P/A:N)
CVE-2016-8532
6.3 CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:H/A:N
7.0 (AV:N/AC:M/Au:S/C:P/I:C/A:N)
CVE-2016-8533
5.7 CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N
6.8 (AV:N/AC:L/Au:S/C:C/I:N/A:N)
CVE-2016-8534
3.5 CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N
3.5 (AV:N/AC:M/Au:S/C:P/I:N/A:N)
CVE-2016-8535
4.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
4.0 (AV:N/AC:L/Au:S/C:N/I:P/A:N)
CVE-2017-5780
6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
7.8 (AV:N/AC:L/Au:N/C:C/I:N/A:N)
CVE-2017-5781
3.9 CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N
5.0 (AV:L/AC:M/Au:S/C:P/I:C/A:N)
CVE-2017-5782
5.6 CVSS:3.0/AV:P/AC:H/PR:H/UI:R/S:U/C:L/I:H/A:H
5.8 (AV:N/AC:M/Au:N/C:P/I:P/A:N)
CVE-2017-5783
5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N)
CVE-2017-5784
6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
5.8 (AV:N/AC:M/Au:N/C:P/I:P/A:N)
CVE-2017-5785
6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
6.4 (AV:N/AC:L/Au:N/C:P/I:P/A:N)
Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499
RESOLUTION
HPE has provided the following software updates to resolve the
vulnerabilities in the HPE Matrix Operating Environment (MOE). The update kit
applicable to the HPE Matrix Operating Environment (MOE) 7.6 is available at
the following location:
*
<https://h20392.www2.hpe.com/portal/swdepot/displayProductInfo.do?productNumb
r=HPID>
HPE has addressed these vulnerabilities for the impacted software components
bundled with HPE Matrix Operating Environment in the following HPE Security
Bulletins:
**HPE Systems Insight Manager (SIM)**
HPE Security Bulletin: HPSBMU03668
*
<https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05356388>
HISTORY
Version:1 (rev.1) - 3 February 2017 Initial release
Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.
Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-alert@hpe.com.
Report: To report a potential security vulnerability for any HPE supported
product:
Web form: https://www.hpe.com/info/report-security-vulnerability
Email: security-alert@hpe.com
Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice
Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive
Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.
3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX
Copyright 2016 Hewlett Packard Enterprise
Hewlett Packard Enterprise shall not be liable for technical or editorial
errors or omissions contained herein. The information provided is provided
"as is" without warranty of any kind. To the extent permitted by law, neither
HP or its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice. Hewlett
Packard Enterprise and the names of Hewlett Packard Enterprise products
referenced herein are trademarks of Hewlett Packard Enterprise in the United
States and other countries. Other product and company names mentioned herein
may be trademarks of their respective owners
| VAR-201508-0265 | CVE-2015-5550 | Adobe Flash Player and Adobe AIR Vulnerable to arbitrary code execution |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
Use-after-free vulnerability in Adobe Flash Player before 18.0.0.232 on Windows and OS X and before 11.2.202.508 on Linux, Adobe AIR before 18.0.0.199, Adobe AIR SDK before 18.0.0.199, and Adobe AIR SDK & Compiler before 18.0.0.199 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-5127, CVE-2015-5130, CVE-2015-5134, CVE-2015-5539, CVE-2015-5540, CVE-2015-5551, CVE-2015-5556, CVE-2015-5557, CVE-2015-5559, CVE-2015-5561, CVE-2015-5563, CVE-2015-5564, and CVE-2015-5565. This vulnerability CVE-2015-5127 , CVE-2015-5130 , CVE-2015-5134 , CVE-2015-5539 , CVE-2015-5540 , CVE-2015-5551 , CVE-2015-5556 , CVE-2015-5557 , CVE-2015-5559 , CVE-2015-5561 , CVE-2015-5563 , CVE-2015-5564 ,and CVE-2015-5565 Is a different vulnerability. Supplementary information : CWE Vulnerability type by CWE-416: Use-after-free ( Use of freed memory ) Has been identified. http://cwe.mitre.org/data/definitions/416.htmlAn attacker could execute arbitrary code. Failed exploit attempts will likely cause a denial-of-service condition. A use-after-free vulnerability exists in several Adobe products. The following products and versions are affected: Adobe Flash Player Desktop Runtime 18.0.0.209 and earlier versions and Adobe Flash Player Extended Support Release 13.0.0.309 and earlier versions based on Windows and Macintosh platforms, Adobe Flash Player for Windows, Macintosh and Linux platforms Google Chrome 18.0.0.209 and earlier, Adobe Flash Player for Microsoft Edge and Internet Explorer 11 on Windows 10 18.0.0.209 and earlier, Adobe Flash Player for Internet Explorer 10 and 11 18.0.0.209 on Windows 8.0 and 8.1 and previous versions, Adobe Flash Player for Linux 11.2.202.491 and previous versions based on Linux platforms, AIR Desktop Runtime 18.0.0.180 and previous versions based on Windows and Macintosh platforms, and AIR SDK 18.0 based on Windows, Macintosh, Android and iOS platforms. 0.180 and earlier and AIR SDK & Compiler 18.0.0.180 and earlier. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Critical: flash-plugin security update
Advisory ID: RHSA-2015:1603-01
Product: Red Hat Enterprise Linux Supplementary
Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1603.html
Issue date: 2015-08-12
CVE Names: CVE-2015-5127 CVE-2015-5128 CVE-2015-5129
CVE-2015-5130 CVE-2015-5131 CVE-2015-5132
CVE-2015-5133 CVE-2015-5134 CVE-2015-5539
CVE-2015-5540 CVE-2015-5541 CVE-2015-5544
CVE-2015-5545 CVE-2015-5546 CVE-2015-5547
CVE-2015-5548 CVE-2015-5549 CVE-2015-5550
CVE-2015-5551 CVE-2015-5552 CVE-2015-5553
CVE-2015-5554 CVE-2015-5555 CVE-2015-5556
CVE-2015-5557 CVE-2015-5558 CVE-2015-5559
CVE-2015-5560 CVE-2015-5561 CVE-2015-5562
CVE-2015-5563 CVE-2015-5564
=====================================================================
1. Summary:
An updated Adobe Flash Player package that fixes multiple security issues
is now available for Red Hat Enterprise Linux 5 and 6 Supplementary.
Red Hat Product Security has rated this update as having Critical security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Desktop Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64
3. Description:
The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash
Player web browser plug-in. These
vulnerabilities are detailed in the Adobe Security Bulletin APSB15-19
listed in the References section.
Multiple flaws were found in the way flash-plugin displayed certain SWF
content. An attacker could use these flaws to create a specially crafted
SWF file that would cause flash-plugin to crash or, potentially, execute
arbitrary code when the victim loaded a page containing the malicious SWF
content. (CVE-2015-5127, CVE-2015-5128, CVE-2015-5129, CVE-2015-5130,
CVE-2015-5131, CVE-2015-5132, CVE-2015-5133, CVE-2015-5134, CVE-2015-5539,
CVE-2015-5540, CVE-2015-5541, CVE-2015-5544, CVE-2015-5545, CVE-2015-5546,
CVE-2015-5547, CVE-2015-5548, CVE-2015-5549, CVE-2015-5550, CVE-2015-5551,
CVE-2015-5552, CVE-2015-5553, CVE-2015-5554, CVE-2015-5555, CVE-2015-5556,
CVE-2015-5557, CVE-2015-5558, CVE-2015-5559, CVE-2015-5560, CVE-2015-5561,
CVE-2015-5562, CVE-2015-5563, CVE-2015-5564)
All users of Adobe Flash Player should install this updated package, which
upgrades Flash Player to version 11.2.202.508.
4. Solution:
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1252697 - flash-plugin: multiple code execution flaws (APSB15-19)
6. Package List:
Red Hat Enterprise Linux Desktop Supplementary (v. 5):
i386:
flash-plugin-11.2.202.508-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.508-1.el5.i386.rpm
Red Hat Enterprise Linux Server Supplementary (v. 5):
i386:
flash-plugin-11.2.202.508-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.508-1.el5.i386.rpm
Red Hat Enterprise Linux Desktop Supplementary (v. 6):
i386:
flash-plugin-11.2.202.508-1.el6_7.i686.rpm
x86_64:
flash-plugin-11.2.202.508-1.el6_7.i686.rpm
Red Hat Enterprise Linux Server Supplementary (v. 6):
i386:
flash-plugin-11.2.202.508-1.el6_7.i686.rpm
x86_64:
flash-plugin-11.2.202.508-1.el6_7.i686.rpm
Red Hat Enterprise Linux Workstation Supplementary (v. 6):
i386:
flash-plugin-11.2.202.508-1.el6_7.i686.rpm
x86_64:
flash-plugin-11.2.202.508-1.el6_7.i686.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2015-5127
https://access.redhat.com/security/cve/CVE-2015-5128
https://access.redhat.com/security/cve/CVE-2015-5129
https://access.redhat.com/security/cve/CVE-2015-5130
https://access.redhat.com/security/cve/CVE-2015-5131
https://access.redhat.com/security/cve/CVE-2015-5132
https://access.redhat.com/security/cve/CVE-2015-5133
https://access.redhat.com/security/cve/CVE-2015-5134
https://access.redhat.com/security/cve/CVE-2015-5539
https://access.redhat.com/security/cve/CVE-2015-5540
https://access.redhat.com/security/cve/CVE-2015-5541
https://access.redhat.com/security/cve/CVE-2015-5544
https://access.redhat.com/security/cve/CVE-2015-5545
https://access.redhat.com/security/cve/CVE-2015-5546
https://access.redhat.com/security/cve/CVE-2015-5547
https://access.redhat.com/security/cve/CVE-2015-5548
https://access.redhat.com/security/cve/CVE-2015-5549
https://access.redhat.com/security/cve/CVE-2015-5550
https://access.redhat.com/security/cve/CVE-2015-5551
https://access.redhat.com/security/cve/CVE-2015-5552
https://access.redhat.com/security/cve/CVE-2015-5553
https://access.redhat.com/security/cve/CVE-2015-5554
https://access.redhat.com/security/cve/CVE-2015-5555
https://access.redhat.com/security/cve/CVE-2015-5556
https://access.redhat.com/security/cve/CVE-2015-5557
https://access.redhat.com/security/cve/CVE-2015-5558
https://access.redhat.com/security/cve/CVE-2015-5559
https://access.redhat.com/security/cve/CVE-2015-5560
https://access.redhat.com/security/cve/CVE-2015-5561
https://access.redhat.com/security/cve/CVE-2015-5562
https://access.redhat.com/security/cve/CVE-2015-5563
https://access.redhat.com/security/cve/CVE-2015-5564
https://access.redhat.com/security/updates/classification/#critical
https://helpx.adobe.com/security/products/flash-player/apsb15-19.html
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2015 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iD8DBQFVy2mAXlSAg2UNWIIRAty7AKCcTl+pzRlPMcYb+ESu7xg0C9nkVwCfbcNj
SwY72oO+5brzzyYR9NLDDnE=
=izmD
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
.
Background
==========
The Adobe Flash Player is a renderer for the SWF file format, which is
commonly used to provide interactive websites.
Please review the CVE identifiers referenced below for details.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All Adobe Flash Player users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot -v ">=www-plugins/adobe-flash-11.2.202.508"
References
==========
[ 1 ] CVE-2015-3107
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3107
[ 2 ] CVE-2015-5122
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5122
[ 3 ] CVE-2015-5123
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5123
[ 4 ] CVE-2015-5124
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5124
[ 5 ] CVE-2015-5125
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5125
[ 6 ] CVE-2015-5127
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5127
[ 7 ] CVE-2015-5129
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5129
[ 8 ] CVE-2015-5130
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5130
[ 9 ] CVE-2015-5131
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5131
[ 10 ] CVE-2015-5132
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5132
[ 11 ] CVE-2015-5133
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5133
[ 12 ] CVE-2015-5134
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5134
[ 13 ] CVE-2015-5539
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5539
[ 14 ] CVE-2015-5540
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5540
[ 15 ] CVE-2015-5541
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5541
[ 16 ] CVE-2015-5544
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5544
[ 17 ] CVE-2015-5545
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5545
[ 18 ] CVE-2015-5546
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5546
[ 19 ] CVE-2015-5547
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5547
[ 20 ] CVE-2015-5548
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5548
[ 21 ] CVE-2015-5549
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5549
[ 22 ] CVE-2015-5550
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5550
[ 23 ] CVE-2015-5551
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5551
[ 24 ] CVE-2015-5552
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5552
[ 25 ] CVE-2015-5553
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5553
[ 26 ] CVE-2015-5554
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5554
[ 27 ] CVE-2015-5555
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5555
[ 28 ] CVE-2015-5556
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5556
[ 29 ] CVE-2015-5557
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5557
[ 30 ] CVE-2015-5558
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5558
[ 31 ] CVE-2015-5559
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5559
[ 32 ] CVE-2015-5560
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5560
[ 33 ] CVE-2015-5561
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5561
[ 34 ] CVE-2015-5562
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5562
[ 35 ] CVE-2015-5563
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5563
[ 36 ] CVE-2015-5564
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5564
[ 37 ] CVE-2015-5965
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5965
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/201508-01
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2015 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05385680
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: c05385680
Version: 1
HPSBMU03692 rev.1 - HPE Matrix Operating Environment, Multiple Remote
Vulnerabilities
NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.
Release Date: 2017-02-03
Last Updated: 2017-02-03
Potential Security Impact: Remote: Bypass Security Restrictions, Cross-Site
Request Forgery (CSRF), Cross-Site Scripting (XSS), Denial of Service (DoS),
Disclosure of Information, Execution of Arbitrary Code
Source: Hewlett Packard Enterprise, Product Security Response Team
VULNERABILITY SUMMARY
Multiple potential security vulnerabilities have been identified in HPE
Matrix Operating Enviroment (MOE) on Windows. The vulnerabilities could be
exploited remotely resulting in the Bypass of Security Restrictions,
cross-site request forgery (CSRF), cross-site scripting (XSS), Denial of
Service (DoS), Disclosure of Information, and Execution of Arbitrary Code.
References:
- CVE-2016-8531 - Information Disclosure - VSE
- CVE-2016-8532 - XSS - VCEM
- CVE-2016-8533 - Priviledge Escalation - VCEM
- CVE-2016-8534 - Privilege Elevation - VSE
- CVE-2016-8535 - Http Parameter Pollution - VCEM
- CVE-2017-5780 - Clickjacking - MRM
- CVE-2017-5781 - CSRF - VSE
- CVE-2017-5782 - HSTS Header Missing - IO
- CVE-2017-5783 - Clickjacking - SPM
- CVE-2017-5784 - HSTS Header Missing - SPM
- CVE-2017-5785 - Information Disclosure - SPM
- CVE-2015-5127 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5129 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5130 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5131 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5132 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5133 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5134 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5539 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5540 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5541 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5544 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5545 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5546 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5547 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5548 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5549 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5550 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5551 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5552 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5553 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5555 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5556 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5557 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5558 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5559 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5560 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5561 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5562 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5563 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5564 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5565 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5566 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5575 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5576 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5580 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5574 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5588 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5570 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5572 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-6678 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5571 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5582 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5584 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5587 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5579 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5568 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-6679 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-6682 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-6677 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5573 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5578 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5577 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-6676 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5581 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8415 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8416 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8417 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8418 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8419 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8420 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8421 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8422 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8423 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8424 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8425 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8426 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8427 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8428 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8429 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8430 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8431 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8432 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8433 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8434 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8435 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8436 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8437 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8438 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8439 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8440 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8441 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8442 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8443 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8444 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8445 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8446 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8447 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8448 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8449 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8450 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8451 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8452 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8453 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8454 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8455 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8456 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8457 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8044 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8459 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8460 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8634 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8635 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8636 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8638 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8639 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8640 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8641 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8642 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8643 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8644 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8645 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8646 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8647 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8648 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8649 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8650 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8651 - Adobe Flash - unauthorized disclosure of information
- CVE-2016-2183 - Sweet32, DES, 3DES
- CVE-2016-0777 - OpenSSH, unauthorized disclosure of information
- CVE-2016-0778 - OpenSSH, unauthorized disclosure of information
- CVE-2016-1907 - OpenSSH, unauthorized disclosure of information
- CVE-2009-5028 - Namazu, unauthorized disclosure of information
- CVE-2011-4345 - Namazu, unauthorized disclosure of information
- CVE-2015-5254 - Apache ActiveMQ unauthorized disclosure of information
- CVE-2016-4366 - HPE SIM, unauthorized disclosure of information
- CVE-2015-5554 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5567 - Adobe Flash - unauthorized disclosure of information
- CVE-2016-8517 - HPE SIM, Cross-site Scripting (XSS)
- CVE-2016-8516 - HPE SIM, Denial of Service
- CVE-2016-8518 - HPE SIM, Denial of Service
SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
- HP Matrix Operating Environment Software 7.6
- HP Systems Insight Manager (HP SIM), Software 7.6
BACKGROUND
CVSS Base Metrics
=================
Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector
CVE-2009-5028
7.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVE-2011-4345
3.7 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
2.6 (AV:N/AC:H/Au:N/C:N/I:P/A:N)
CVE-2015-5127
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5129
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5130
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5131
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5132
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5133
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5134
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5254
7.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVE-2015-5539
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5540
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5541
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5544
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5545
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5546
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5547
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5548
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5549
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5550
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5551
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5552
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5553
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5554
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5555
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5556
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5557
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5558
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5559
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5560
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5561
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5562
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5563
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5564
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5565
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5566
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5567
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5568
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5570
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5571
5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N)
CVE-2015-5572
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)
CVE-2015-5573
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5574
7.2 CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5575
7.2 CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5576
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)
CVE-2015-5577
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5578
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5579
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5580
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5581
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5582
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5584
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5587
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5588
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-6676
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-6677
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-6678
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-6679
5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)
CVE-2015-6682
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8044
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8415
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8416
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8417
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8418
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8419
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8420
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8421
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8422
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8423
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8424
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8425
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8426
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8427
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8428
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8429
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8430
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8431
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8432
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8433
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8434
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8435
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8436
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8437
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8438
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8439
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8440
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8441
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8442
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8443
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8444
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8445
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8446
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8447
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8448
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8449
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8450
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8451
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8452
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8453
5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N)
CVE-2015-8454
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8455
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8456
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8457
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8459
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8460
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8634
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8635
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8636
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8638
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8639
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8640
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8641
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8642
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8643
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8644
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8645
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8646
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8647
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8648
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8649
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8650
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8651
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2016-0777
3.5 CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N
4.0 (AV:N/AC:L/Au:S/C:P/I:N/A:N)
CVE-2016-0778
5.5 CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L
4.6 (AV:N/AC:H/Au:S/C:P/I:P/A:P)
CVE-2016-1907
5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)
CVE-2016-2183
5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)
CVE-2016-4366
7.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVE-2016-8516
3.3 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
4.0 (AV:N/AC:L/Au:S/C:N/I:N/A:P)
CVE-2016-8517
6.8 CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N
7.9 (AV:N/AC:M/Au:S/C:C/I:C/A:N)
CVE-2016-8518
7.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.8 (AV:N/AC:L/Au:N/C:N/I:C/A:N)
CVE-2016-8531
6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
6.4 (AV:N/AC:L/Au:N/C:P/I:P/A:N)
CVE-2016-8532
6.3 CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:H/A:N
7.0 (AV:N/AC:M/Au:S/C:P/I:C/A:N)
CVE-2016-8533
5.7 CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N
6.8 (AV:N/AC:L/Au:S/C:C/I:N/A:N)
CVE-2016-8534
3.5 CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N
3.5 (AV:N/AC:M/Au:S/C:P/I:N/A:N)
CVE-2016-8535
4.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
4.0 (AV:N/AC:L/Au:S/C:N/I:P/A:N)
CVE-2017-5780
6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
7.8 (AV:N/AC:L/Au:N/C:C/I:N/A:N)
CVE-2017-5781
3.9 CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N
5.0 (AV:L/AC:M/Au:S/C:P/I:C/A:N)
CVE-2017-5782
5.6 CVSS:3.0/AV:P/AC:H/PR:H/UI:R/S:U/C:L/I:H/A:H
5.8 (AV:N/AC:M/Au:N/C:P/I:P/A:N)
CVE-2017-5783
5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N)
CVE-2017-5784
6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
5.8 (AV:N/AC:M/Au:N/C:P/I:P/A:N)
CVE-2017-5785
6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
6.4 (AV:N/AC:L/Au:N/C:P/I:P/A:N)
Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499
RESOLUTION
HPE has provided the following software updates to resolve the
vulnerabilities in the HPE Matrix Operating Environment (MOE). The update kit
applicable to the HPE Matrix Operating Environment (MOE) 7.6 is available at
the following location:
*
<https://h20392.www2.hpe.com/portal/swdepot/displayProductInfo.do?productNumb
r=HPID>
HPE has addressed these vulnerabilities for the impacted software components
bundled with HPE Matrix Operating Environment in the following HPE Security
Bulletins:
**HPE Systems Insight Manager (SIM)**
HPE Security Bulletin: HPSBMU03668
*
<https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05356388>
HISTORY
Version:1 (rev.1) - 3 February 2017 Initial release
Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.
Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-alert@hpe.com.
Report: To report a potential security vulnerability for any HPE supported
product:
Web form: https://www.hpe.com/info/report-security-vulnerability
Email: security-alert@hpe.com
Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice
Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive
Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.
3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX
Copyright 2016 Hewlett Packard Enterprise
Hewlett Packard Enterprise shall not be liable for technical or editorial
errors or omissions contained herein. The information provided is provided
"as is" without warranty of any kind. To the extent permitted by law, neither
HP or its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice. Hewlett
Packard Enterprise and the names of Hewlett Packard Enterprise products
referenced herein are trademarks of Hewlett Packard Enterprise in the United
States and other countries. Other product and company names mentioned herein
may be trademarks of their respective owners
| VAR-201508-0260 | CVE-2015-5545 | Adobe Flash Player and Adobe AIR Vulnerable to arbitrary code execution |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
Adobe Flash Player before 18.0.0.232 on Windows and OS X and before 11.2.202.508 on Linux, Adobe AIR before 18.0.0.199, Adobe AIR SDK before 18.0.0.199, and Adobe AIR SDK & Compiler before 18.0.0.199 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-5544, CVE-2015-5546, CVE-2015-5547, CVE-2015-5548, CVE-2015-5549, CVE-2015-5552, and CVE-2015-5553. This vulnerability CVE-2015-5544 , CVE-2015-5546 , CVE-2015-5547 , CVE-2015-5548 , CVE-2015-5549 , CVE-2015-5552 ,and CVE-2015-5553 Is a different vulnerability.An attacker could execute arbitrary code or cause a denial of service ( Memory corruption ) There is a possibility of being put into a state. Failed exploit attempts will likely result in denial-of-service conditions. The following products and versions are affected: Adobe Flash Player Desktop Runtime 18.0.0.209 and earlier versions and Adobe Flash Player Extended Support Release 13.0.0.309 and earlier versions based on Windows and Macintosh platforms, Adobe Flash Player for Windows, Macintosh and Linux platforms Google Chrome 18.0.0.209 and earlier, Adobe Flash Player for Microsoft Edge and Internet Explorer 11 on Windows 10 18.0.0.209 and earlier, Adobe Flash Player for Internet Explorer 10 and 11 18.0.0.209 on Windows 8.0 and 8.1 and previous versions, Adobe Flash Player for Linux 11.2.202.491 and previous versions based on Linux platforms, AIR Desktop Runtime 18.0.0.180 and previous versions based on Windows and Macintosh platforms, and AIR SDK 18.0 based on Windows, Macintosh, Android and iOS platforms. 0.180 and earlier and AIR SDK & Compiler 18.0.0.180 and earlier. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Critical: flash-plugin security update
Advisory ID: RHSA-2015:1603-01
Product: Red Hat Enterprise Linux Supplementary
Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1603.html
Issue date: 2015-08-12
CVE Names: CVE-2015-5127 CVE-2015-5128 CVE-2015-5129
CVE-2015-5130 CVE-2015-5131 CVE-2015-5132
CVE-2015-5133 CVE-2015-5134 CVE-2015-5539
CVE-2015-5540 CVE-2015-5541 CVE-2015-5544
CVE-2015-5545 CVE-2015-5546 CVE-2015-5547
CVE-2015-5548 CVE-2015-5549 CVE-2015-5550
CVE-2015-5551 CVE-2015-5552 CVE-2015-5553
CVE-2015-5554 CVE-2015-5555 CVE-2015-5556
CVE-2015-5557 CVE-2015-5558 CVE-2015-5559
CVE-2015-5560 CVE-2015-5561 CVE-2015-5562
CVE-2015-5563 CVE-2015-5564
=====================================================================
1. Summary:
An updated Adobe Flash Player package that fixes multiple security issues
is now available for Red Hat Enterprise Linux 5 and 6 Supplementary.
Red Hat Product Security has rated this update as having Critical security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Desktop Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64
3. Description:
The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash
Player web browser plug-in. These
vulnerabilities are detailed in the Adobe Security Bulletin APSB15-19
listed in the References section.
Multiple flaws were found in the way flash-plugin displayed certain SWF
content. An attacker could use these flaws to create a specially crafted
SWF file that would cause flash-plugin to crash or, potentially, execute
arbitrary code when the victim loaded a page containing the malicious SWF
content.
4. Solution:
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1252697 - flash-plugin: multiple code execution flaws (APSB15-19)
6. Package List:
Red Hat Enterprise Linux Desktop Supplementary (v. 5):
i386:
flash-plugin-11.2.202.508-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.508-1.el5.i386.rpm
Red Hat Enterprise Linux Server Supplementary (v. 5):
i386:
flash-plugin-11.2.202.508-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.508-1.el5.i386.rpm
Red Hat Enterprise Linux Desktop Supplementary (v. 6):
i386:
flash-plugin-11.2.202.508-1.el6_7.i686.rpm
x86_64:
flash-plugin-11.2.202.508-1.el6_7.i686.rpm
Red Hat Enterprise Linux Server Supplementary (v. 6):
i386:
flash-plugin-11.2.202.508-1.el6_7.i686.rpm
x86_64:
flash-plugin-11.2.202.508-1.el6_7.i686.rpm
Red Hat Enterprise Linux Workstation Supplementary (v. 6):
i386:
flash-plugin-11.2.202.508-1.el6_7.i686.rpm
x86_64:
flash-plugin-11.2.202.508-1.el6_7.i686.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2015-5127
https://access.redhat.com/security/cve/CVE-2015-5128
https://access.redhat.com/security/cve/CVE-2015-5129
https://access.redhat.com/security/cve/CVE-2015-5130
https://access.redhat.com/security/cve/CVE-2015-5131
https://access.redhat.com/security/cve/CVE-2015-5132
https://access.redhat.com/security/cve/CVE-2015-5133
https://access.redhat.com/security/cve/CVE-2015-5134
https://access.redhat.com/security/cve/CVE-2015-5539
https://access.redhat.com/security/cve/CVE-2015-5540
https://access.redhat.com/security/cve/CVE-2015-5541
https://access.redhat.com/security/cve/CVE-2015-5544
https://access.redhat.com/security/cve/CVE-2015-5545
https://access.redhat.com/security/cve/CVE-2015-5546
https://access.redhat.com/security/cve/CVE-2015-5547
https://access.redhat.com/security/cve/CVE-2015-5548
https://access.redhat.com/security/cve/CVE-2015-5549
https://access.redhat.com/security/cve/CVE-2015-5550
https://access.redhat.com/security/cve/CVE-2015-5551
https://access.redhat.com/security/cve/CVE-2015-5552
https://access.redhat.com/security/cve/CVE-2015-5553
https://access.redhat.com/security/cve/CVE-2015-5554
https://access.redhat.com/security/cve/CVE-2015-5555
https://access.redhat.com/security/cve/CVE-2015-5556
https://access.redhat.com/security/cve/CVE-2015-5557
https://access.redhat.com/security/cve/CVE-2015-5558
https://access.redhat.com/security/cve/CVE-2015-5559
https://access.redhat.com/security/cve/CVE-2015-5560
https://access.redhat.com/security/cve/CVE-2015-5561
https://access.redhat.com/security/cve/CVE-2015-5562
https://access.redhat.com/security/cve/CVE-2015-5563
https://access.redhat.com/security/cve/CVE-2015-5564
https://access.redhat.com/security/updates/classification/#critical
https://helpx.adobe.com/security/products/flash-player/apsb15-19.html
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2015 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iD8DBQFVy2mAXlSAg2UNWIIRAty7AKCcTl+pzRlPMcYb+ESu7xg0C9nkVwCfbcNj
SwY72oO+5brzzyYR9NLDDnE=
=izmD
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
.
Background
==========
The Adobe Flash Player is a renderer for the SWF file format, which is
commonly used to provide interactive websites.
Please review the CVE identifiers referenced below for details.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All Adobe Flash Player users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot -v ">=www-plugins/adobe-flash-11.2.202.508"
References
==========
[ 1 ] CVE-2015-3107
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3107
[ 2 ] CVE-2015-5122
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5122
[ 3 ] CVE-2015-5123
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5123
[ 4 ] CVE-2015-5124
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5124
[ 5 ] CVE-2015-5125
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5125
[ 6 ] CVE-2015-5127
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5127
[ 7 ] CVE-2015-5129
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5129
[ 8 ] CVE-2015-5130
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5130
[ 9 ] CVE-2015-5131
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5131
[ 10 ] CVE-2015-5132
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5132
[ 11 ] CVE-2015-5133
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5133
[ 12 ] CVE-2015-5134
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5134
[ 13 ] CVE-2015-5539
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5539
[ 14 ] CVE-2015-5540
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5540
[ 15 ] CVE-2015-5541
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5541
[ 16 ] CVE-2015-5544
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5544
[ 17 ] CVE-2015-5545
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5545
[ 18 ] CVE-2015-5546
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5546
[ 19 ] CVE-2015-5547
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5547
[ 20 ] CVE-2015-5548
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5548
[ 21 ] CVE-2015-5549
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5549
[ 22 ] CVE-2015-5550
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5550
[ 23 ] CVE-2015-5551
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5551
[ 24 ] CVE-2015-5552
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5552
[ 25 ] CVE-2015-5553
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5553
[ 26 ] CVE-2015-5554
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5554
[ 27 ] CVE-2015-5555
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5555
[ 28 ] CVE-2015-5556
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5556
[ 29 ] CVE-2015-5557
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5557
[ 30 ] CVE-2015-5558
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5558
[ 31 ] CVE-2015-5559
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5559
[ 32 ] CVE-2015-5560
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5560
[ 33 ] CVE-2015-5561
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5561
[ 34 ] CVE-2015-5562
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5562
[ 35 ] CVE-2015-5563
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5563
[ 36 ] CVE-2015-5564
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5564
[ 37 ] CVE-2015-5965
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5965
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/201508-01
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2015 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05385680
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: c05385680
Version: 1
HPSBMU03692 rev.1 - HPE Matrix Operating Environment, Multiple Remote
Vulnerabilities
NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.
Release Date: 2017-02-03
Last Updated: 2017-02-03
Potential Security Impact: Remote: Bypass Security Restrictions, Cross-Site
Request Forgery (CSRF), Cross-Site Scripting (XSS), Denial of Service (DoS),
Disclosure of Information, Execution of Arbitrary Code
Source: Hewlett Packard Enterprise, Product Security Response Team
VULNERABILITY SUMMARY
Multiple potential security vulnerabilities have been identified in HPE
Matrix Operating Enviroment (MOE) on Windows. The vulnerabilities could be
exploited remotely resulting in the Bypass of Security Restrictions,
cross-site request forgery (CSRF), cross-site scripting (XSS), Denial of
Service (DoS), Disclosure of Information, and Execution of Arbitrary Code.
References:
- CVE-2016-8531 - Information Disclosure - VSE
- CVE-2016-8532 - XSS - VCEM
- CVE-2016-8533 - Priviledge Escalation - VCEM
- CVE-2016-8534 - Privilege Elevation - VSE
- CVE-2016-8535 - Http Parameter Pollution - VCEM
- CVE-2017-5780 - Clickjacking - MRM
- CVE-2017-5781 - CSRF - VSE
- CVE-2017-5782 - HSTS Header Missing - IO
- CVE-2017-5783 - Clickjacking - SPM
- CVE-2017-5784 - HSTS Header Missing - SPM
- CVE-2017-5785 - Information Disclosure - SPM
- CVE-2015-5127 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5129 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5130 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5131 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5132 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5133 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5134 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5539 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5540 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5541 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5544 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5545 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5546 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5547 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5548 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5549 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5550 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5551 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5552 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5553 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5555 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5556 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5557 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5558 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5559 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5560 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5561 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5562 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5563 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5564 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5565 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5566 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5575 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5576 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5580 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5574 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5588 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5570 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5572 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-6678 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5571 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5582 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5584 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5587 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5579 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5568 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-6679 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-6682 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-6677 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5573 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5578 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5577 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-6676 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5581 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8415 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8416 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8417 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8418 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8419 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8420 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8421 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8422 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8423 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8424 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8425 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8426 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8427 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8428 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8429 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8430 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8431 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8432 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8433 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8434 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8435 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8436 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8437 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8438 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8439 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8440 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8441 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8442 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8443 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8444 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8445 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8446 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8447 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8448 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8449 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8450 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8451 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8452 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8453 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8454 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8455 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8456 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8457 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8044 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8459 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8460 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8634 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8635 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8636 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8638 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8639 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8640 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8641 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8642 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8643 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8644 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8645 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8646 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8647 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8648 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8649 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8650 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8651 - Adobe Flash - unauthorized disclosure of information
- CVE-2016-2183 - Sweet32, DES, 3DES
- CVE-2016-0777 - OpenSSH, unauthorized disclosure of information
- CVE-2016-0778 - OpenSSH, unauthorized disclosure of information
- CVE-2016-1907 - OpenSSH, unauthorized disclosure of information
- CVE-2009-5028 - Namazu, unauthorized disclosure of information
- CVE-2011-4345 - Namazu, unauthorized disclosure of information
- CVE-2015-5254 - Apache ActiveMQ unauthorized disclosure of information
- CVE-2016-4366 - HPE SIM, unauthorized disclosure of information
- CVE-2015-5554 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5567 - Adobe Flash - unauthorized disclosure of information
- CVE-2016-8517 - HPE SIM, Cross-site Scripting (XSS)
- CVE-2016-8516 - HPE SIM, Denial of Service
- CVE-2016-8518 - HPE SIM, Denial of Service
SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
- HP Matrix Operating Environment Software 7.6
- HP Systems Insight Manager (HP SIM), Software 7.6
BACKGROUND
CVSS Base Metrics
=================
Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector
CVE-2009-5028
7.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVE-2011-4345
3.7 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
2.6 (AV:N/AC:H/Au:N/C:N/I:P/A:N)
CVE-2015-5127
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5129
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5130
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5131
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5132
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5133
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5134
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5254
7.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVE-2015-5539
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5540
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5541
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5544
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5545
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5546
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5547
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5548
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5549
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5550
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5551
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5552
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5553
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5554
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5555
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5556
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5557
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5558
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5559
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5560
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5561
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5562
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5563
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5564
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5565
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5566
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5567
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5568
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5570
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5571
5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N)
CVE-2015-5572
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)
CVE-2015-5573
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5574
7.2 CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5575
7.2 CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5576
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)
CVE-2015-5577
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5578
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5579
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5580
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5581
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5582
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5584
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5587
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5588
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-6676
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-6677
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-6678
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-6679
5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)
CVE-2015-6682
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8044
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8415
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8416
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8417
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8418
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8419
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8420
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8421
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8422
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8423
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8424
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8425
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8426
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8427
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8428
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8429
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8430
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8431
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8432
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8433
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8434
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8435
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8436
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8437
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8438
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8439
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8440
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8441
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8442
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8443
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8444
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8445
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8446
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8447
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8448
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8449
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8450
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8451
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8452
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8453
5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N)
CVE-2015-8454
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8455
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8456
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8457
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8459
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8460
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8634
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8635
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8636
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8638
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8639
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8640
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8641
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8642
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8643
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8644
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8645
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8646
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8647
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8648
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8649
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8650
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8651
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2016-0777
3.5 CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N
4.0 (AV:N/AC:L/Au:S/C:P/I:N/A:N)
CVE-2016-0778
5.5 CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L
4.6 (AV:N/AC:H/Au:S/C:P/I:P/A:P)
CVE-2016-1907
5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)
CVE-2016-2183
5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)
CVE-2016-4366
7.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVE-2016-8516
3.3 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
4.0 (AV:N/AC:L/Au:S/C:N/I:N/A:P)
CVE-2016-8517
6.8 CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N
7.9 (AV:N/AC:M/Au:S/C:C/I:C/A:N)
CVE-2016-8518
7.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.8 (AV:N/AC:L/Au:N/C:N/I:C/A:N)
CVE-2016-8531
6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
6.4 (AV:N/AC:L/Au:N/C:P/I:P/A:N)
CVE-2016-8532
6.3 CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:H/A:N
7.0 (AV:N/AC:M/Au:S/C:P/I:C/A:N)
CVE-2016-8533
5.7 CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N
6.8 (AV:N/AC:L/Au:S/C:C/I:N/A:N)
CVE-2016-8534
3.5 CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N
3.5 (AV:N/AC:M/Au:S/C:P/I:N/A:N)
CVE-2016-8535
4.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
4.0 (AV:N/AC:L/Au:S/C:N/I:P/A:N)
CVE-2017-5780
6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
7.8 (AV:N/AC:L/Au:N/C:C/I:N/A:N)
CVE-2017-5781
3.9 CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N
5.0 (AV:L/AC:M/Au:S/C:P/I:C/A:N)
CVE-2017-5782
5.6 CVSS:3.0/AV:P/AC:H/PR:H/UI:R/S:U/C:L/I:H/A:H
5.8 (AV:N/AC:M/Au:N/C:P/I:P/A:N)
CVE-2017-5783
5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N)
CVE-2017-5784
6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
5.8 (AV:N/AC:M/Au:N/C:P/I:P/A:N)
CVE-2017-5785
6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
6.4 (AV:N/AC:L/Au:N/C:P/I:P/A:N)
Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499
RESOLUTION
HPE has provided the following software updates to resolve the
vulnerabilities in the HPE Matrix Operating Environment (MOE). The update kit
applicable to the HPE Matrix Operating Environment (MOE) 7.6 is available at
the following location:
*
<https://h20392.www2.hpe.com/portal/swdepot/displayProductInfo.do?productNumb
r=HPID>
HPE has addressed these vulnerabilities for the impacted software components
bundled with HPE Matrix Operating Environment in the following HPE Security
Bulletins:
**HPE Systems Insight Manager (SIM)**
HPE Security Bulletin: HPSBMU03668
*
<https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05356388>
HISTORY
Version:1 (rev.1) - 3 February 2017 Initial release
Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.
Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-alert@hpe.com.
Report: To report a potential security vulnerability for any HPE supported
product:
Web form: https://www.hpe.com/info/report-security-vulnerability
Email: security-alert@hpe.com
Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice
Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive
Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.
3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX
Copyright 2016 Hewlett Packard Enterprise
Hewlett Packard Enterprise shall not be liable for technical or editorial
errors or omissions contained herein. The information provided is provided
"as is" without warranty of any kind. To the extent permitted by law, neither
HP or its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice. Hewlett
Packard Enterprise and the names of Hewlett Packard Enterprise products
referenced herein are trademarks of Hewlett Packard Enterprise in the United
States and other countries. Other product and company names mentioned herein
may be trademarks of their respective owners
| VAR-201508-0264 | CVE-2015-5549 | Adobe Flash Player and Adobe AIR Vulnerable to arbitrary code execution |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
Adobe Flash Player before 18.0.0.232 on Windows and OS X and before 11.2.202.508 on Linux, Adobe AIR before 18.0.0.199, Adobe AIR SDK before 18.0.0.199, and Adobe AIR SDK & Compiler before 18.0.0.199 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-5544, CVE-2015-5545, CVE-2015-5546, CVE-2015-5547, CVE-2015-5548, CVE-2015-5552, and CVE-2015-5553. This vulnerability CVE-2015-5544 , CVE-2015-5545 , CVE-2015-5546 , CVE-2015-5547 , CVE-2015-5548 , CVE-2015-5552 ,and CVE-2015-5553 Is a different vulnerability.An attacker could execute arbitrary code or cause a denial of service ( Memory corruption ) There is a possibility of being put into a state. Failed exploit attempts will likely result in denial-of-service conditions. The following products and versions are affected: Adobe Flash Player Desktop Runtime 18.0.0.209 and earlier versions and Adobe Flash Player Extended Support Release 13.0.0.309 and earlier versions based on Windows and Macintosh platforms, Adobe Flash Player for Windows, Macintosh and Linux platforms Google Chrome 18.0.0.209 and earlier, Adobe Flash Player for Microsoft Edge and Internet Explorer 11 on Windows 10 18.0.0.209 and earlier, Adobe Flash Player for Internet Explorer 10 and 11 18.0.0.209 on Windows 8.0 and 8.1 and previous versions, Adobe Flash Player for Linux 11.2.202.491 and previous versions based on Linux platforms, AIR Desktop Runtime 18.0.0.180 and previous versions based on Windows and Macintosh platforms, and AIR SDK 18.0 based on Windows, Macintosh, Android and iOS platforms. 0.180 and earlier and AIR SDK & Compiler 18.0.0.180 and earlier. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Critical: flash-plugin security update
Advisory ID: RHSA-2015:1603-01
Product: Red Hat Enterprise Linux Supplementary
Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1603.html
Issue date: 2015-08-12
CVE Names: CVE-2015-5127 CVE-2015-5128 CVE-2015-5129
CVE-2015-5130 CVE-2015-5131 CVE-2015-5132
CVE-2015-5133 CVE-2015-5134 CVE-2015-5539
CVE-2015-5540 CVE-2015-5541 CVE-2015-5544
CVE-2015-5545 CVE-2015-5546 CVE-2015-5547
CVE-2015-5548 CVE-2015-5549 CVE-2015-5550
CVE-2015-5551 CVE-2015-5552 CVE-2015-5553
CVE-2015-5554 CVE-2015-5555 CVE-2015-5556
CVE-2015-5557 CVE-2015-5558 CVE-2015-5559
CVE-2015-5560 CVE-2015-5561 CVE-2015-5562
CVE-2015-5563 CVE-2015-5564
=====================================================================
1. Summary:
An updated Adobe Flash Player package that fixes multiple security issues
is now available for Red Hat Enterprise Linux 5 and 6 Supplementary.
Red Hat Product Security has rated this update as having Critical security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Desktop Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64
3. Description:
The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash
Player web browser plug-in. These
vulnerabilities are detailed in the Adobe Security Bulletin APSB15-19
listed in the References section.
Multiple flaws were found in the way flash-plugin displayed certain SWF
content. An attacker could use these flaws to create a specially crafted
SWF file that would cause flash-plugin to crash or, potentially, execute
arbitrary code when the victim loaded a page containing the malicious SWF
content.
4. Solution:
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1252697 - flash-plugin: multiple code execution flaws (APSB15-19)
6. Package List:
Red Hat Enterprise Linux Desktop Supplementary (v. 5):
i386:
flash-plugin-11.2.202.508-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.508-1.el5.i386.rpm
Red Hat Enterprise Linux Server Supplementary (v. 5):
i386:
flash-plugin-11.2.202.508-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.508-1.el5.i386.rpm
Red Hat Enterprise Linux Desktop Supplementary (v. 6):
i386:
flash-plugin-11.2.202.508-1.el6_7.i686.rpm
x86_64:
flash-plugin-11.2.202.508-1.el6_7.i686.rpm
Red Hat Enterprise Linux Server Supplementary (v. 6):
i386:
flash-plugin-11.2.202.508-1.el6_7.i686.rpm
x86_64:
flash-plugin-11.2.202.508-1.el6_7.i686.rpm
Red Hat Enterprise Linux Workstation Supplementary (v. 6):
i386:
flash-plugin-11.2.202.508-1.el6_7.i686.rpm
x86_64:
flash-plugin-11.2.202.508-1.el6_7.i686.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2015-5127
https://access.redhat.com/security/cve/CVE-2015-5128
https://access.redhat.com/security/cve/CVE-2015-5129
https://access.redhat.com/security/cve/CVE-2015-5130
https://access.redhat.com/security/cve/CVE-2015-5131
https://access.redhat.com/security/cve/CVE-2015-5132
https://access.redhat.com/security/cve/CVE-2015-5133
https://access.redhat.com/security/cve/CVE-2015-5134
https://access.redhat.com/security/cve/CVE-2015-5539
https://access.redhat.com/security/cve/CVE-2015-5540
https://access.redhat.com/security/cve/CVE-2015-5541
https://access.redhat.com/security/cve/CVE-2015-5544
https://access.redhat.com/security/cve/CVE-2015-5545
https://access.redhat.com/security/cve/CVE-2015-5546
https://access.redhat.com/security/cve/CVE-2015-5547
https://access.redhat.com/security/cve/CVE-2015-5548
https://access.redhat.com/security/cve/CVE-2015-5549
https://access.redhat.com/security/cve/CVE-2015-5550
https://access.redhat.com/security/cve/CVE-2015-5551
https://access.redhat.com/security/cve/CVE-2015-5552
https://access.redhat.com/security/cve/CVE-2015-5553
https://access.redhat.com/security/cve/CVE-2015-5554
https://access.redhat.com/security/cve/CVE-2015-5555
https://access.redhat.com/security/cve/CVE-2015-5556
https://access.redhat.com/security/cve/CVE-2015-5557
https://access.redhat.com/security/cve/CVE-2015-5558
https://access.redhat.com/security/cve/CVE-2015-5559
https://access.redhat.com/security/cve/CVE-2015-5560
https://access.redhat.com/security/cve/CVE-2015-5561
https://access.redhat.com/security/cve/CVE-2015-5562
https://access.redhat.com/security/cve/CVE-2015-5563
https://access.redhat.com/security/cve/CVE-2015-5564
https://access.redhat.com/security/updates/classification/#critical
https://helpx.adobe.com/security/products/flash-player/apsb15-19.html
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2015 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iD8DBQFVy2mAXlSAg2UNWIIRAty7AKCcTl+pzRlPMcYb+ESu7xg0C9nkVwCfbcNj
SwY72oO+5brzzyYR9NLDDnE=
=izmD
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
.
Background
==========
The Adobe Flash Player is a renderer for the SWF file format, which is
commonly used to provide interactive websites.
Please review the CVE identifiers referenced below for details.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All Adobe Flash Player users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot -v ">=www-plugins/adobe-flash-11.2.202.508"
References
==========
[ 1 ] CVE-2015-3107
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3107
[ 2 ] CVE-2015-5122
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5122
[ 3 ] CVE-2015-5123
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5123
[ 4 ] CVE-2015-5124
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5124
[ 5 ] CVE-2015-5125
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5125
[ 6 ] CVE-2015-5127
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5127
[ 7 ] CVE-2015-5129
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5129
[ 8 ] CVE-2015-5130
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5130
[ 9 ] CVE-2015-5131
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5131
[ 10 ] CVE-2015-5132
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5132
[ 11 ] CVE-2015-5133
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5133
[ 12 ] CVE-2015-5134
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5134
[ 13 ] CVE-2015-5539
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5539
[ 14 ] CVE-2015-5540
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5540
[ 15 ] CVE-2015-5541
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5541
[ 16 ] CVE-2015-5544
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5544
[ 17 ] CVE-2015-5545
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5545
[ 18 ] CVE-2015-5546
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5546
[ 19 ] CVE-2015-5547
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5547
[ 20 ] CVE-2015-5548
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5548
[ 21 ] CVE-2015-5549
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5549
[ 22 ] CVE-2015-5550
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5550
[ 23 ] CVE-2015-5551
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5551
[ 24 ] CVE-2015-5552
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5552
[ 25 ] CVE-2015-5553
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5553
[ 26 ] CVE-2015-5554
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5554
[ 27 ] CVE-2015-5555
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5555
[ 28 ] CVE-2015-5556
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5556
[ 29 ] CVE-2015-5557
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5557
[ 30 ] CVE-2015-5558
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5558
[ 31 ] CVE-2015-5559
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5559
[ 32 ] CVE-2015-5560
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5560
[ 33 ] CVE-2015-5561
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5561
[ 34 ] CVE-2015-5562
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5562
[ 35 ] CVE-2015-5563
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5563
[ 36 ] CVE-2015-5564
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5564
[ 37 ] CVE-2015-5965
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5965
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/201508-01
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2015 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05385680
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: c05385680
Version: 1
HPSBMU03692 rev.1 - HPE Matrix Operating Environment, Multiple Remote
Vulnerabilities
NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.
Release Date: 2017-02-03
Last Updated: 2017-02-03
Potential Security Impact: Remote: Bypass Security Restrictions, Cross-Site
Request Forgery (CSRF), Cross-Site Scripting (XSS), Denial of Service (DoS),
Disclosure of Information, Execution of Arbitrary Code
Source: Hewlett Packard Enterprise, Product Security Response Team
VULNERABILITY SUMMARY
Multiple potential security vulnerabilities have been identified in HPE
Matrix Operating Enviroment (MOE) on Windows. The vulnerabilities could be
exploited remotely resulting in the Bypass of Security Restrictions,
cross-site request forgery (CSRF), cross-site scripting (XSS), Denial of
Service (DoS), Disclosure of Information, and Execution of Arbitrary Code.
References:
- CVE-2016-8531 - Information Disclosure - VSE
- CVE-2016-8532 - XSS - VCEM
- CVE-2016-8533 - Priviledge Escalation - VCEM
- CVE-2016-8534 - Privilege Elevation - VSE
- CVE-2016-8535 - Http Parameter Pollution - VCEM
- CVE-2017-5780 - Clickjacking - MRM
- CVE-2017-5781 - CSRF - VSE
- CVE-2017-5782 - HSTS Header Missing - IO
- CVE-2017-5783 - Clickjacking - SPM
- CVE-2017-5784 - HSTS Header Missing - SPM
- CVE-2017-5785 - Information Disclosure - SPM
- CVE-2015-5127 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5129 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5130 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5131 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5132 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5133 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5134 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5539 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5540 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5541 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5544 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5545 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5546 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5547 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5548 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5549 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5550 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5551 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5552 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5553 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5555 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5556 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5557 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5558 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5559 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5560 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5561 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5562 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5563 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5564 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5565 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5566 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5575 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5576 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5580 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5574 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5588 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5570 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5572 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-6678 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5571 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5582 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5584 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5587 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5579 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5568 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-6679 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-6682 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-6677 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5573 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5578 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5577 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-6676 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5581 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8415 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8416 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8417 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8418 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8419 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8420 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8421 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8422 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8423 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8424 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8425 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8426 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8427 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8428 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8429 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8430 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8431 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8432 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8433 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8434 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8435 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8436 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8437 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8438 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8439 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8440 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8441 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8442 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8443 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8444 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8445 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8446 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8447 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8448 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8449 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8450 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8451 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8452 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8453 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8454 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8455 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8456 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8457 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8044 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8459 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8460 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8634 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8635 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8636 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8638 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8639 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8640 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8641 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8642 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8643 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8644 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8645 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8646 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8647 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8648 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8649 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8650 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8651 - Adobe Flash - unauthorized disclosure of information
- CVE-2016-2183 - Sweet32, DES, 3DES
- CVE-2016-0777 - OpenSSH, unauthorized disclosure of information
- CVE-2016-0778 - OpenSSH, unauthorized disclosure of information
- CVE-2016-1907 - OpenSSH, unauthorized disclosure of information
- CVE-2009-5028 - Namazu, unauthorized disclosure of information
- CVE-2011-4345 - Namazu, unauthorized disclosure of information
- CVE-2015-5254 - Apache ActiveMQ unauthorized disclosure of information
- CVE-2016-4366 - HPE SIM, unauthorized disclosure of information
- CVE-2015-5554 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5567 - Adobe Flash - unauthorized disclosure of information
- CVE-2016-8517 - HPE SIM, Cross-site Scripting (XSS)
- CVE-2016-8516 - HPE SIM, Denial of Service
- CVE-2016-8518 - HPE SIM, Denial of Service
SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
- HP Matrix Operating Environment Software 7.6
- HP Systems Insight Manager (HP SIM), Software 7.6
BACKGROUND
CVSS Base Metrics
=================
Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector
CVE-2009-5028
7.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVE-2011-4345
3.7 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
2.6 (AV:N/AC:H/Au:N/C:N/I:P/A:N)
CVE-2015-5127
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5129
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5130
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5131
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5132
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5133
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5134
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5254
7.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVE-2015-5539
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5540
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5541
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5544
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5545
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5546
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5547
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5548
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5549
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5550
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5551
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5552
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5553
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5554
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5555
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5556
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5557
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5558
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5559
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5560
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5561
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5562
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5563
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5564
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5565
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5566
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5567
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5568
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5570
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5571
5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N)
CVE-2015-5572
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)
CVE-2015-5573
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5574
7.2 CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5575
7.2 CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5576
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)
CVE-2015-5577
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5578
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5579
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5580
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5581
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5582
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5584
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5587
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5588
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-6676
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-6677
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-6678
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-6679
5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)
CVE-2015-6682
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8044
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8415
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8416
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8417
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8418
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8419
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8420
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8421
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8422
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8423
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8424
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8425
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8426
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8427
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8428
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8429
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8430
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8431
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8432
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8433
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8434
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8435
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8436
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8437
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8438
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8439
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8440
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8441
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8442
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8443
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8444
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8445
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8446
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8447
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8448
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8449
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8450
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8451
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8452
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8453
5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N)
CVE-2015-8454
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8455
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8456
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8457
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8459
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8460
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8634
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8635
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8636
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8638
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8639
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8640
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8641
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8642
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8643
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8644
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8645
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8646
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8647
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8648
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8649
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8650
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8651
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2016-0777
3.5 CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N
4.0 (AV:N/AC:L/Au:S/C:P/I:N/A:N)
CVE-2016-0778
5.5 CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L
4.6 (AV:N/AC:H/Au:S/C:P/I:P/A:P)
CVE-2016-1907
5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)
CVE-2016-2183
5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)
CVE-2016-4366
7.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVE-2016-8516
3.3 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
4.0 (AV:N/AC:L/Au:S/C:N/I:N/A:P)
CVE-2016-8517
6.8 CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N
7.9 (AV:N/AC:M/Au:S/C:C/I:C/A:N)
CVE-2016-8518
7.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.8 (AV:N/AC:L/Au:N/C:N/I:C/A:N)
CVE-2016-8531
6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
6.4 (AV:N/AC:L/Au:N/C:P/I:P/A:N)
CVE-2016-8532
6.3 CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:H/A:N
7.0 (AV:N/AC:M/Au:S/C:P/I:C/A:N)
CVE-2016-8533
5.7 CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N
6.8 (AV:N/AC:L/Au:S/C:C/I:N/A:N)
CVE-2016-8534
3.5 CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N
3.5 (AV:N/AC:M/Au:S/C:P/I:N/A:N)
CVE-2016-8535
4.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
4.0 (AV:N/AC:L/Au:S/C:N/I:P/A:N)
CVE-2017-5780
6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
7.8 (AV:N/AC:L/Au:N/C:C/I:N/A:N)
CVE-2017-5781
3.9 CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N
5.0 (AV:L/AC:M/Au:S/C:P/I:C/A:N)
CVE-2017-5782
5.6 CVSS:3.0/AV:P/AC:H/PR:H/UI:R/S:U/C:L/I:H/A:H
5.8 (AV:N/AC:M/Au:N/C:P/I:P/A:N)
CVE-2017-5783
5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N)
CVE-2017-5784
6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
5.8 (AV:N/AC:M/Au:N/C:P/I:P/A:N)
CVE-2017-5785
6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
6.4 (AV:N/AC:L/Au:N/C:P/I:P/A:N)
Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499
RESOLUTION
HPE has provided the following software updates to resolve the
vulnerabilities in the HPE Matrix Operating Environment (MOE). The update kit
applicable to the HPE Matrix Operating Environment (MOE) 7.6 is available at
the following location:
*
<https://h20392.www2.hpe.com/portal/swdepot/displayProductInfo.do?productNumb
r=HPID>
HPE has addressed these vulnerabilities for the impacted software components
bundled with HPE Matrix Operating Environment in the following HPE Security
Bulletins:
**HPE Systems Insight Manager (SIM)**
HPE Security Bulletin: HPSBMU03668
*
<https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05356388>
HISTORY
Version:1 (rev.1) - 3 February 2017 Initial release
Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.
Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-alert@hpe.com.
Report: To report a potential security vulnerability for any HPE supported
product:
Web form: https://www.hpe.com/info/report-security-vulnerability
Email: security-alert@hpe.com
Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice
Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive
Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.
3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX
Copyright 2016 Hewlett Packard Enterprise
Hewlett Packard Enterprise shall not be liable for technical or editorial
errors or omissions contained herein. The information provided is provided
"as is" without warranty of any kind. To the extent permitted by law, neither
HP or its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice. Hewlett
Packard Enterprise and the names of Hewlett Packard Enterprise products
referenced herein are trademarks of Hewlett Packard Enterprise in the United
States and other countries. Other product and company names mentioned herein
may be trademarks of their respective owners
| VAR-201508-0263 | CVE-2015-5548 | Adobe Flash Player and Adobe AIR Vulnerable to arbitrary code execution |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
Adobe Flash Player before 18.0.0.232 on Windows and OS X and before 11.2.202.508 on Linux, Adobe AIR before 18.0.0.199, Adobe AIR SDK before 18.0.0.199, and Adobe AIR SDK & Compiler before 18.0.0.199 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-5544, CVE-2015-5545, CVE-2015-5546, CVE-2015-5547, CVE-2015-5549, CVE-2015-5552, and CVE-2015-5553. This vulnerability CVE-2015-5544 , CVE-2015-5545 , CVE-2015-5546 , CVE-2015-5547 , CVE-2015-5549 , CVE-2015-5552 ,and CVE-2015-5553 Is a different vulnerability.An attacker could execute arbitrary code or cause a denial of service ( Memory corruption ) There is a possibility of being put into a state. Failed exploit attempts will likely result in denial-of-service conditions. The following products and versions are affected: Adobe Flash Player Desktop Runtime 18.0.0.209 and earlier versions and Adobe Flash Player Extended Support Release 13.0.0.309 and earlier versions based on Windows and Macintosh platforms, Adobe Flash Player for Windows, Macintosh and Linux platforms Google Chrome 18.0.0.209 and earlier, Adobe Flash Player for Microsoft Edge and Internet Explorer 11 on Windows 10 18.0.0.209 and earlier, Adobe Flash Player for Internet Explorer 10 and 11 18.0.0.209 on Windows 8.0 and 8.1 and previous versions, Adobe Flash Player for Linux 11.2.202.491 and previous versions based on Linux platforms, AIR Desktop Runtime 18.0.0.180 and previous versions based on Windows and Macintosh platforms, and AIR SDK 18.0 based on Windows, Macintosh, Android and iOS platforms. 0.180 and earlier and AIR SDK & Compiler 18.0.0.180 and earlier. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Critical: flash-plugin security update
Advisory ID: RHSA-2015:1603-01
Product: Red Hat Enterprise Linux Supplementary
Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1603.html
Issue date: 2015-08-12
CVE Names: CVE-2015-5127 CVE-2015-5128 CVE-2015-5129
CVE-2015-5130 CVE-2015-5131 CVE-2015-5132
CVE-2015-5133 CVE-2015-5134 CVE-2015-5539
CVE-2015-5540 CVE-2015-5541 CVE-2015-5544
CVE-2015-5545 CVE-2015-5546 CVE-2015-5547
CVE-2015-5548 CVE-2015-5549 CVE-2015-5550
CVE-2015-5551 CVE-2015-5552 CVE-2015-5553
CVE-2015-5554 CVE-2015-5555 CVE-2015-5556
CVE-2015-5557 CVE-2015-5558 CVE-2015-5559
CVE-2015-5560 CVE-2015-5561 CVE-2015-5562
CVE-2015-5563 CVE-2015-5564
=====================================================================
1. Summary:
An updated Adobe Flash Player package that fixes multiple security issues
is now available for Red Hat Enterprise Linux 5 and 6 Supplementary.
Red Hat Product Security has rated this update as having Critical security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Desktop Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64
3. Description:
The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash
Player web browser plug-in. These
vulnerabilities are detailed in the Adobe Security Bulletin APSB15-19
listed in the References section.
Multiple flaws were found in the way flash-plugin displayed certain SWF
content. An attacker could use these flaws to create a specially crafted
SWF file that would cause flash-plugin to crash or, potentially, execute
arbitrary code when the victim loaded a page containing the malicious SWF
content.
4. Solution:
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1252697 - flash-plugin: multiple code execution flaws (APSB15-19)
6. Package List:
Red Hat Enterprise Linux Desktop Supplementary (v. 5):
i386:
flash-plugin-11.2.202.508-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.508-1.el5.i386.rpm
Red Hat Enterprise Linux Server Supplementary (v. 5):
i386:
flash-plugin-11.2.202.508-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.508-1.el5.i386.rpm
Red Hat Enterprise Linux Desktop Supplementary (v. 6):
i386:
flash-plugin-11.2.202.508-1.el6_7.i686.rpm
x86_64:
flash-plugin-11.2.202.508-1.el6_7.i686.rpm
Red Hat Enterprise Linux Server Supplementary (v. 6):
i386:
flash-plugin-11.2.202.508-1.el6_7.i686.rpm
x86_64:
flash-plugin-11.2.202.508-1.el6_7.i686.rpm
Red Hat Enterprise Linux Workstation Supplementary (v. 6):
i386:
flash-plugin-11.2.202.508-1.el6_7.i686.rpm
x86_64:
flash-plugin-11.2.202.508-1.el6_7.i686.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2015-5127
https://access.redhat.com/security/cve/CVE-2015-5128
https://access.redhat.com/security/cve/CVE-2015-5129
https://access.redhat.com/security/cve/CVE-2015-5130
https://access.redhat.com/security/cve/CVE-2015-5131
https://access.redhat.com/security/cve/CVE-2015-5132
https://access.redhat.com/security/cve/CVE-2015-5133
https://access.redhat.com/security/cve/CVE-2015-5134
https://access.redhat.com/security/cve/CVE-2015-5539
https://access.redhat.com/security/cve/CVE-2015-5540
https://access.redhat.com/security/cve/CVE-2015-5541
https://access.redhat.com/security/cve/CVE-2015-5544
https://access.redhat.com/security/cve/CVE-2015-5545
https://access.redhat.com/security/cve/CVE-2015-5546
https://access.redhat.com/security/cve/CVE-2015-5547
https://access.redhat.com/security/cve/CVE-2015-5548
https://access.redhat.com/security/cve/CVE-2015-5549
https://access.redhat.com/security/cve/CVE-2015-5550
https://access.redhat.com/security/cve/CVE-2015-5551
https://access.redhat.com/security/cve/CVE-2015-5552
https://access.redhat.com/security/cve/CVE-2015-5553
https://access.redhat.com/security/cve/CVE-2015-5554
https://access.redhat.com/security/cve/CVE-2015-5555
https://access.redhat.com/security/cve/CVE-2015-5556
https://access.redhat.com/security/cve/CVE-2015-5557
https://access.redhat.com/security/cve/CVE-2015-5558
https://access.redhat.com/security/cve/CVE-2015-5559
https://access.redhat.com/security/cve/CVE-2015-5560
https://access.redhat.com/security/cve/CVE-2015-5561
https://access.redhat.com/security/cve/CVE-2015-5562
https://access.redhat.com/security/cve/CVE-2015-5563
https://access.redhat.com/security/cve/CVE-2015-5564
https://access.redhat.com/security/updates/classification/#critical
https://helpx.adobe.com/security/products/flash-player/apsb15-19.html
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2015 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iD8DBQFVy2mAXlSAg2UNWIIRAty7AKCcTl+pzRlPMcYb+ESu7xg0C9nkVwCfbcNj
SwY72oO+5brzzyYR9NLDDnE=
=izmD
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
.
Background
==========
The Adobe Flash Player is a renderer for the SWF file format, which is
commonly used to provide interactive websites.
Please review the CVE identifiers referenced below for details.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All Adobe Flash Player users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot -v ">=www-plugins/adobe-flash-11.2.202.508"
References
==========
[ 1 ] CVE-2015-3107
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3107
[ 2 ] CVE-2015-5122
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5122
[ 3 ] CVE-2015-5123
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5123
[ 4 ] CVE-2015-5124
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5124
[ 5 ] CVE-2015-5125
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5125
[ 6 ] CVE-2015-5127
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5127
[ 7 ] CVE-2015-5129
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5129
[ 8 ] CVE-2015-5130
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5130
[ 9 ] CVE-2015-5131
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5131
[ 10 ] CVE-2015-5132
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5132
[ 11 ] CVE-2015-5133
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5133
[ 12 ] CVE-2015-5134
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5134
[ 13 ] CVE-2015-5539
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5539
[ 14 ] CVE-2015-5540
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5540
[ 15 ] CVE-2015-5541
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5541
[ 16 ] CVE-2015-5544
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5544
[ 17 ] CVE-2015-5545
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5545
[ 18 ] CVE-2015-5546
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5546
[ 19 ] CVE-2015-5547
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5547
[ 20 ] CVE-2015-5548
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5548
[ 21 ] CVE-2015-5549
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5549
[ 22 ] CVE-2015-5550
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5550
[ 23 ] CVE-2015-5551
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5551
[ 24 ] CVE-2015-5552
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5552
[ 25 ] CVE-2015-5553
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5553
[ 26 ] CVE-2015-5554
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5554
[ 27 ] CVE-2015-5555
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5555
[ 28 ] CVE-2015-5556
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5556
[ 29 ] CVE-2015-5557
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5557
[ 30 ] CVE-2015-5558
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5558
[ 31 ] CVE-2015-5559
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5559
[ 32 ] CVE-2015-5560
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5560
[ 33 ] CVE-2015-5561
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5561
[ 34 ] CVE-2015-5562
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5562
[ 35 ] CVE-2015-5563
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5563
[ 36 ] CVE-2015-5564
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5564
[ 37 ] CVE-2015-5965
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5965
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/201508-01
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2015 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05385680
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: c05385680
Version: 1
HPSBMU03692 rev.1 - HPE Matrix Operating Environment, Multiple Remote
Vulnerabilities
NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.
Release Date: 2017-02-03
Last Updated: 2017-02-03
Potential Security Impact: Remote: Bypass Security Restrictions, Cross-Site
Request Forgery (CSRF), Cross-Site Scripting (XSS), Denial of Service (DoS),
Disclosure of Information, Execution of Arbitrary Code
Source: Hewlett Packard Enterprise, Product Security Response Team
VULNERABILITY SUMMARY
Multiple potential security vulnerabilities have been identified in HPE
Matrix Operating Enviroment (MOE) on Windows. The vulnerabilities could be
exploited remotely resulting in the Bypass of Security Restrictions,
cross-site request forgery (CSRF), cross-site scripting (XSS), Denial of
Service (DoS), Disclosure of Information, and Execution of Arbitrary Code.
References:
- CVE-2016-8531 - Information Disclosure - VSE
- CVE-2016-8532 - XSS - VCEM
- CVE-2016-8533 - Priviledge Escalation - VCEM
- CVE-2016-8534 - Privilege Elevation - VSE
- CVE-2016-8535 - Http Parameter Pollution - VCEM
- CVE-2017-5780 - Clickjacking - MRM
- CVE-2017-5781 - CSRF - VSE
- CVE-2017-5782 - HSTS Header Missing - IO
- CVE-2017-5783 - Clickjacking - SPM
- CVE-2017-5784 - HSTS Header Missing - SPM
- CVE-2017-5785 - Information Disclosure - SPM
- CVE-2015-5127 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5129 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5130 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5131 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5132 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5133 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5134 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5539 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5540 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5541 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5544 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5545 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5546 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5547 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5548 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5549 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5550 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5551 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5552 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5553 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5555 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5556 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5557 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5558 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5559 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5560 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5561 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5562 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5563 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5564 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5565 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5566 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5575 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5576 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5580 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5574 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5588 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5570 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5572 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-6678 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5571 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5582 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5584 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5587 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5579 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5568 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-6679 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-6682 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-6677 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5573 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5578 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5577 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-6676 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5581 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8415 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8416 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8417 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8418 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8419 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8420 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8421 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8422 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8423 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8424 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8425 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8426 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8427 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8428 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8429 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8430 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8431 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8432 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8433 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8434 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8435 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8436 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8437 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8438 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8439 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8440 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8441 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8442 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8443 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8444 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8445 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8446 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8447 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8448 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8449 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8450 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8451 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8452 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8453 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8454 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8455 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8456 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8457 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8044 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8459 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8460 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8634 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8635 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8636 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8638 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8639 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8640 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8641 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8642 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8643 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8644 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8645 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8646 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8647 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8648 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8649 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8650 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8651 - Adobe Flash - unauthorized disclosure of information
- CVE-2016-2183 - Sweet32, DES, 3DES
- CVE-2016-0777 - OpenSSH, unauthorized disclosure of information
- CVE-2016-0778 - OpenSSH, unauthorized disclosure of information
- CVE-2016-1907 - OpenSSH, unauthorized disclosure of information
- CVE-2009-5028 - Namazu, unauthorized disclosure of information
- CVE-2011-4345 - Namazu, unauthorized disclosure of information
- CVE-2015-5254 - Apache ActiveMQ unauthorized disclosure of information
- CVE-2016-4366 - HPE SIM, unauthorized disclosure of information
- CVE-2015-5554 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5567 - Adobe Flash - unauthorized disclosure of information
- CVE-2016-8517 - HPE SIM, Cross-site Scripting (XSS)
- CVE-2016-8516 - HPE SIM, Denial of Service
- CVE-2016-8518 - HPE SIM, Denial of Service
SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
- HP Matrix Operating Environment Software 7.6
- HP Systems Insight Manager (HP SIM), Software 7.6
BACKGROUND
CVSS Base Metrics
=================
Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector
CVE-2009-5028
7.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVE-2011-4345
3.7 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
2.6 (AV:N/AC:H/Au:N/C:N/I:P/A:N)
CVE-2015-5127
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5129
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5130
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5131
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5132
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5133
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5134
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5254
7.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVE-2015-5539
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5540
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5541
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5544
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5545
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5546
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5547
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5548
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5549
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5550
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5551
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5552
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5553
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5554
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5555
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5556
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5557
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5558
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5559
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5560
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5561
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5562
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5563
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5564
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5565
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5566
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5567
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5568
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5570
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5571
5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N)
CVE-2015-5572
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)
CVE-2015-5573
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5574
7.2 CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5575
7.2 CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5576
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)
CVE-2015-5577
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5578
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5579
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5580
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5581
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5582
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5584
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5587
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5588
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-6676
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-6677
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-6678
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-6679
5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)
CVE-2015-6682
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8044
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8415
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8416
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8417
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8418
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8419
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8420
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8421
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8422
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8423
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8424
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8425
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8426
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8427
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8428
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8429
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8430
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8431
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8432
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8433
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8434
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8435
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8436
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8437
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8438
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8439
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8440
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8441
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8442
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8443
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8444
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8445
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8446
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8447
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8448
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8449
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8450
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8451
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8452
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8453
5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N)
CVE-2015-8454
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8455
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8456
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8457
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8459
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8460
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8634
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8635
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8636
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8638
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8639
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8640
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8641
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8642
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8643
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8644
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8645
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8646
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8647
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8648
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8649
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8650
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8651
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2016-0777
3.5 CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N
4.0 (AV:N/AC:L/Au:S/C:P/I:N/A:N)
CVE-2016-0778
5.5 CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L
4.6 (AV:N/AC:H/Au:S/C:P/I:P/A:P)
CVE-2016-1907
5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)
CVE-2016-2183
5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)
CVE-2016-4366
7.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVE-2016-8516
3.3 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
4.0 (AV:N/AC:L/Au:S/C:N/I:N/A:P)
CVE-2016-8517
6.8 CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N
7.9 (AV:N/AC:M/Au:S/C:C/I:C/A:N)
CVE-2016-8518
7.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.8 (AV:N/AC:L/Au:N/C:N/I:C/A:N)
CVE-2016-8531
6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
6.4 (AV:N/AC:L/Au:N/C:P/I:P/A:N)
CVE-2016-8532
6.3 CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:H/A:N
7.0 (AV:N/AC:M/Au:S/C:P/I:C/A:N)
CVE-2016-8533
5.7 CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N
6.8 (AV:N/AC:L/Au:S/C:C/I:N/A:N)
CVE-2016-8534
3.5 CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N
3.5 (AV:N/AC:M/Au:S/C:P/I:N/A:N)
CVE-2016-8535
4.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
4.0 (AV:N/AC:L/Au:S/C:N/I:P/A:N)
CVE-2017-5780
6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
7.8 (AV:N/AC:L/Au:N/C:C/I:N/A:N)
CVE-2017-5781
3.9 CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N
5.0 (AV:L/AC:M/Au:S/C:P/I:C/A:N)
CVE-2017-5782
5.6 CVSS:3.0/AV:P/AC:H/PR:H/UI:R/S:U/C:L/I:H/A:H
5.8 (AV:N/AC:M/Au:N/C:P/I:P/A:N)
CVE-2017-5783
5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N)
CVE-2017-5784
6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
5.8 (AV:N/AC:M/Au:N/C:P/I:P/A:N)
CVE-2017-5785
6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
6.4 (AV:N/AC:L/Au:N/C:P/I:P/A:N)
Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499
RESOLUTION
HPE has provided the following software updates to resolve the
vulnerabilities in the HPE Matrix Operating Environment (MOE). The update kit
applicable to the HPE Matrix Operating Environment (MOE) 7.6 is available at
the following location:
*
<https://h20392.www2.hpe.com/portal/swdepot/displayProductInfo.do?productNumb
r=HPID>
HPE has addressed these vulnerabilities for the impacted software components
bundled with HPE Matrix Operating Environment in the following HPE Security
Bulletins:
**HPE Systems Insight Manager (SIM)**
HPE Security Bulletin: HPSBMU03668
*
<https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05356388>
HISTORY
Version:1 (rev.1) - 3 February 2017 Initial release
Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.
Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-alert@hpe.com.
Report: To report a potential security vulnerability for any HPE supported
product:
Web form: https://www.hpe.com/info/report-security-vulnerability
Email: security-alert@hpe.com
Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice
Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive
Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.
3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX
Copyright 2016 Hewlett Packard Enterprise
Hewlett Packard Enterprise shall not be liable for technical or editorial
errors or omissions contained herein. The information provided is provided
"as is" without warranty of any kind. To the extent permitted by law, neither
HP or its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice. Hewlett
Packard Enterprise and the names of Hewlett Packard Enterprise products
referenced herein are trademarks of Hewlett Packard Enterprise in the United
States and other countries. Other product and company names mentioned herein
may be trademarks of their respective owners
| VAR-201508-0262 | CVE-2015-5547 | Adobe Flash Player and Adobe AIR Vulnerable to arbitrary code execution |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
Adobe Flash Player before 18.0.0.232 on Windows and OS X and before 11.2.202.508 on Linux, Adobe AIR before 18.0.0.199, Adobe AIR SDK before 18.0.0.199, and Adobe AIR SDK & Compiler before 18.0.0.199 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-5544, CVE-2015-5545, CVE-2015-5546, CVE-2015-5548, CVE-2015-5549, CVE-2015-5552, and CVE-2015-5553. This vulnerability CVE-2015-5544 , CVE-2015-5545 , CVE-2015-5546 , CVE-2015-5548 , CVE-2015-5549 , CVE-2015-5552 ,and CVE-2015-5553 Is a different vulnerability.An attacker could execute arbitrary code or cause a denial of service ( Memory corruption ) There is a possibility of being put into a state. Failed exploit attempts will likely result in denial-of-service conditions. The following products and versions are affected: Adobe Flash Player Desktop Runtime 18.0.0.209 and earlier versions and Adobe Flash Player Extended Support Release 13.0.0.309 and earlier versions based on Windows and Macintosh platforms, Adobe Flash Player for Windows, Macintosh and Linux platforms Google Chrome 18.0.0.209 and earlier, Adobe Flash Player for Microsoft Edge and Internet Explorer 11 on Windows 10 18.0.0.209 and earlier, Adobe Flash Player for Internet Explorer 10 and 11 18.0.0.209 on Windows 8.0 and 8.1 and previous versions, Adobe Flash Player for Linux 11.2.202.491 and previous versions based on Linux platforms, AIR Desktop Runtime 18.0.0.180 and previous versions based on Windows and Macintosh platforms, and AIR SDK 18.0 based on Windows, Macintosh, Android and iOS platforms. 0.180 and earlier and AIR SDK & Compiler 18.0.0.180 and earlier. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Critical: flash-plugin security update
Advisory ID: RHSA-2015:1603-01
Product: Red Hat Enterprise Linux Supplementary
Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1603.html
Issue date: 2015-08-12
CVE Names: CVE-2015-5127 CVE-2015-5128 CVE-2015-5129
CVE-2015-5130 CVE-2015-5131 CVE-2015-5132
CVE-2015-5133 CVE-2015-5134 CVE-2015-5539
CVE-2015-5540 CVE-2015-5541 CVE-2015-5544
CVE-2015-5545 CVE-2015-5546 CVE-2015-5547
CVE-2015-5548 CVE-2015-5549 CVE-2015-5550
CVE-2015-5551 CVE-2015-5552 CVE-2015-5553
CVE-2015-5554 CVE-2015-5555 CVE-2015-5556
CVE-2015-5557 CVE-2015-5558 CVE-2015-5559
CVE-2015-5560 CVE-2015-5561 CVE-2015-5562
CVE-2015-5563 CVE-2015-5564
=====================================================================
1. Summary:
An updated Adobe Flash Player package that fixes multiple security issues
is now available for Red Hat Enterprise Linux 5 and 6 Supplementary.
Red Hat Product Security has rated this update as having Critical security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Desktop Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64
3. Description:
The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash
Player web browser plug-in. These
vulnerabilities are detailed in the Adobe Security Bulletin APSB15-19
listed in the References section.
Multiple flaws were found in the way flash-plugin displayed certain SWF
content. An attacker could use these flaws to create a specially crafted
SWF file that would cause flash-plugin to crash or, potentially, execute
arbitrary code when the victim loaded a page containing the malicious SWF
content.
4. Solution:
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1252697 - flash-plugin: multiple code execution flaws (APSB15-19)
6. Package List:
Red Hat Enterprise Linux Desktop Supplementary (v. 5):
i386:
flash-plugin-11.2.202.508-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.508-1.el5.i386.rpm
Red Hat Enterprise Linux Server Supplementary (v. 5):
i386:
flash-plugin-11.2.202.508-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.508-1.el5.i386.rpm
Red Hat Enterprise Linux Desktop Supplementary (v. 6):
i386:
flash-plugin-11.2.202.508-1.el6_7.i686.rpm
x86_64:
flash-plugin-11.2.202.508-1.el6_7.i686.rpm
Red Hat Enterprise Linux Server Supplementary (v. 6):
i386:
flash-plugin-11.2.202.508-1.el6_7.i686.rpm
x86_64:
flash-plugin-11.2.202.508-1.el6_7.i686.rpm
Red Hat Enterprise Linux Workstation Supplementary (v. 6):
i386:
flash-plugin-11.2.202.508-1.el6_7.i686.rpm
x86_64:
flash-plugin-11.2.202.508-1.el6_7.i686.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2015-5127
https://access.redhat.com/security/cve/CVE-2015-5128
https://access.redhat.com/security/cve/CVE-2015-5129
https://access.redhat.com/security/cve/CVE-2015-5130
https://access.redhat.com/security/cve/CVE-2015-5131
https://access.redhat.com/security/cve/CVE-2015-5132
https://access.redhat.com/security/cve/CVE-2015-5133
https://access.redhat.com/security/cve/CVE-2015-5134
https://access.redhat.com/security/cve/CVE-2015-5539
https://access.redhat.com/security/cve/CVE-2015-5540
https://access.redhat.com/security/cve/CVE-2015-5541
https://access.redhat.com/security/cve/CVE-2015-5544
https://access.redhat.com/security/cve/CVE-2015-5545
https://access.redhat.com/security/cve/CVE-2015-5546
https://access.redhat.com/security/cve/CVE-2015-5547
https://access.redhat.com/security/cve/CVE-2015-5548
https://access.redhat.com/security/cve/CVE-2015-5549
https://access.redhat.com/security/cve/CVE-2015-5550
https://access.redhat.com/security/cve/CVE-2015-5551
https://access.redhat.com/security/cve/CVE-2015-5552
https://access.redhat.com/security/cve/CVE-2015-5553
https://access.redhat.com/security/cve/CVE-2015-5554
https://access.redhat.com/security/cve/CVE-2015-5555
https://access.redhat.com/security/cve/CVE-2015-5556
https://access.redhat.com/security/cve/CVE-2015-5557
https://access.redhat.com/security/cve/CVE-2015-5558
https://access.redhat.com/security/cve/CVE-2015-5559
https://access.redhat.com/security/cve/CVE-2015-5560
https://access.redhat.com/security/cve/CVE-2015-5561
https://access.redhat.com/security/cve/CVE-2015-5562
https://access.redhat.com/security/cve/CVE-2015-5563
https://access.redhat.com/security/cve/CVE-2015-5564
https://access.redhat.com/security/updates/classification/#critical
https://helpx.adobe.com/security/products/flash-player/apsb15-19.html
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2015 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iD8DBQFVy2mAXlSAg2UNWIIRAty7AKCcTl+pzRlPMcYb+ESu7xg0C9nkVwCfbcNj
SwY72oO+5brzzyYR9NLDDnE=
=izmD
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
.
Background
==========
The Adobe Flash Player is a renderer for the SWF file format, which is
commonly used to provide interactive websites.
Please review the CVE identifiers referenced below for details.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All Adobe Flash Player users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot -v ">=www-plugins/adobe-flash-11.2.202.508"
References
==========
[ 1 ] CVE-2015-3107
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3107
[ 2 ] CVE-2015-5122
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5122
[ 3 ] CVE-2015-5123
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5123
[ 4 ] CVE-2015-5124
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5124
[ 5 ] CVE-2015-5125
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5125
[ 6 ] CVE-2015-5127
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5127
[ 7 ] CVE-2015-5129
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5129
[ 8 ] CVE-2015-5130
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5130
[ 9 ] CVE-2015-5131
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5131
[ 10 ] CVE-2015-5132
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5132
[ 11 ] CVE-2015-5133
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5133
[ 12 ] CVE-2015-5134
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5134
[ 13 ] CVE-2015-5539
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5539
[ 14 ] CVE-2015-5540
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5540
[ 15 ] CVE-2015-5541
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5541
[ 16 ] CVE-2015-5544
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5544
[ 17 ] CVE-2015-5545
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5545
[ 18 ] CVE-2015-5546
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5546
[ 19 ] CVE-2015-5547
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5547
[ 20 ] CVE-2015-5548
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5548
[ 21 ] CVE-2015-5549
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5549
[ 22 ] CVE-2015-5550
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5550
[ 23 ] CVE-2015-5551
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5551
[ 24 ] CVE-2015-5552
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5552
[ 25 ] CVE-2015-5553
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5553
[ 26 ] CVE-2015-5554
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5554
[ 27 ] CVE-2015-5555
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5555
[ 28 ] CVE-2015-5556
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5556
[ 29 ] CVE-2015-5557
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5557
[ 30 ] CVE-2015-5558
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5558
[ 31 ] CVE-2015-5559
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5559
[ 32 ] CVE-2015-5560
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5560
[ 33 ] CVE-2015-5561
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5561
[ 34 ] CVE-2015-5562
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5562
[ 35 ] CVE-2015-5563
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5563
[ 36 ] CVE-2015-5564
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5564
[ 37 ] CVE-2015-5965
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5965
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/201508-01
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2015 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05385680
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: c05385680
Version: 1
HPSBMU03692 rev.1 - HPE Matrix Operating Environment, Multiple Remote
Vulnerabilities
NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.
Release Date: 2017-02-03
Last Updated: 2017-02-03
Potential Security Impact: Remote: Bypass Security Restrictions, Cross-Site
Request Forgery (CSRF), Cross-Site Scripting (XSS), Denial of Service (DoS),
Disclosure of Information, Execution of Arbitrary Code
Source: Hewlett Packard Enterprise, Product Security Response Team
VULNERABILITY SUMMARY
Multiple potential security vulnerabilities have been identified in HPE
Matrix Operating Enviroment (MOE) on Windows. The vulnerabilities could be
exploited remotely resulting in the Bypass of Security Restrictions,
cross-site request forgery (CSRF), cross-site scripting (XSS), Denial of
Service (DoS), Disclosure of Information, and Execution of Arbitrary Code.
References:
- CVE-2016-8531 - Information Disclosure - VSE
- CVE-2016-8532 - XSS - VCEM
- CVE-2016-8533 - Priviledge Escalation - VCEM
- CVE-2016-8534 - Privilege Elevation - VSE
- CVE-2016-8535 - Http Parameter Pollution - VCEM
- CVE-2017-5780 - Clickjacking - MRM
- CVE-2017-5781 - CSRF - VSE
- CVE-2017-5782 - HSTS Header Missing - IO
- CVE-2017-5783 - Clickjacking - SPM
- CVE-2017-5784 - HSTS Header Missing - SPM
- CVE-2017-5785 - Information Disclosure - SPM
- CVE-2015-5127 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5129 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5130 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5131 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5132 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5133 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5134 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5539 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5540 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5541 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5544 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5545 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5546 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5547 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5548 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5549 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5550 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5551 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5552 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5553 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5555 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5556 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5557 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5558 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5559 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5560 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5561 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5562 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5563 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5564 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5565 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5566 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5575 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5576 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5580 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5574 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5588 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5570 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5572 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-6678 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5571 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5582 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5584 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5587 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5579 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5568 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-6679 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-6682 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-6677 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5573 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5578 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5577 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-6676 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5581 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8415 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8416 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8417 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8418 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8419 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8420 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8421 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8422 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8423 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8424 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8425 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8426 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8427 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8428 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8429 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8430 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8431 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8432 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8433 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8434 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8435 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8436 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8437 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8438 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8439 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8440 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8441 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8442 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8443 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8444 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8445 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8446 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8447 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8448 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8449 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8450 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8451 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8452 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8453 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8454 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8455 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8456 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8457 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8044 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8459 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8460 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8634 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8635 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8636 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8638 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8639 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8640 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8641 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8642 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8643 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8644 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8645 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8646 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8647 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8648 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8649 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8650 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8651 - Adobe Flash - unauthorized disclosure of information
- CVE-2016-2183 - Sweet32, DES, 3DES
- CVE-2016-0777 - OpenSSH, unauthorized disclosure of information
- CVE-2016-0778 - OpenSSH, unauthorized disclosure of information
- CVE-2016-1907 - OpenSSH, unauthorized disclosure of information
- CVE-2009-5028 - Namazu, unauthorized disclosure of information
- CVE-2011-4345 - Namazu, unauthorized disclosure of information
- CVE-2015-5254 - Apache ActiveMQ unauthorized disclosure of information
- CVE-2016-4366 - HPE SIM, unauthorized disclosure of information
- CVE-2015-5554 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5567 - Adobe Flash - unauthorized disclosure of information
- CVE-2016-8517 - HPE SIM, Cross-site Scripting (XSS)
- CVE-2016-8516 - HPE SIM, Denial of Service
- CVE-2016-8518 - HPE SIM, Denial of Service
SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
- HP Matrix Operating Environment Software 7.6
- HP Systems Insight Manager (HP SIM), Software 7.6
BACKGROUND
CVSS Base Metrics
=================
Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector
CVE-2009-5028
7.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVE-2011-4345
3.7 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
2.6 (AV:N/AC:H/Au:N/C:N/I:P/A:N)
CVE-2015-5127
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5129
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5130
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5131
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5132
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5133
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5134
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5254
7.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVE-2015-5539
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5540
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5541
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5544
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5545
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5546
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5547
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5548
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5549
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5550
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5551
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5552
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5553
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5554
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5555
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5556
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5557
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5558
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5559
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5560
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5561
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5562
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5563
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5564
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5565
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5566
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5567
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5568
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5570
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5571
5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N)
CVE-2015-5572
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)
CVE-2015-5573
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5574
7.2 CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5575
7.2 CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5576
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)
CVE-2015-5577
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5578
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5579
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5580
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5581
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5582
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5584
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5587
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5588
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-6676
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-6677
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-6678
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-6679
5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)
CVE-2015-6682
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8044
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8415
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8416
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8417
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8418
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8419
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8420
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8421
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8422
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8423
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8424
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8425
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8426
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8427
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8428
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8429
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8430
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8431
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8432
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8433
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8434
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8435
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8436
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8437
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8438
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8439
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8440
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8441
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8442
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8443
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8444
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8445
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8446
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8447
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8448
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8449
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8450
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8451
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8452
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8453
5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N)
CVE-2015-8454
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8455
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8456
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8457
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8459
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8460
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8634
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8635
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8636
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8638
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8639
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8640
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8641
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8642
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8643
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8644
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8645
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8646
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8647
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8648
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8649
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8650
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8651
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2016-0777
3.5 CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N
4.0 (AV:N/AC:L/Au:S/C:P/I:N/A:N)
CVE-2016-0778
5.5 CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L
4.6 (AV:N/AC:H/Au:S/C:P/I:P/A:P)
CVE-2016-1907
5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)
CVE-2016-2183
5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)
CVE-2016-4366
7.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVE-2016-8516
3.3 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
4.0 (AV:N/AC:L/Au:S/C:N/I:N/A:P)
CVE-2016-8517
6.8 CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N
7.9 (AV:N/AC:M/Au:S/C:C/I:C/A:N)
CVE-2016-8518
7.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.8 (AV:N/AC:L/Au:N/C:N/I:C/A:N)
CVE-2016-8531
6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
6.4 (AV:N/AC:L/Au:N/C:P/I:P/A:N)
CVE-2016-8532
6.3 CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:H/A:N
7.0 (AV:N/AC:M/Au:S/C:P/I:C/A:N)
CVE-2016-8533
5.7 CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N
6.8 (AV:N/AC:L/Au:S/C:C/I:N/A:N)
CVE-2016-8534
3.5 CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N
3.5 (AV:N/AC:M/Au:S/C:P/I:N/A:N)
CVE-2016-8535
4.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
4.0 (AV:N/AC:L/Au:S/C:N/I:P/A:N)
CVE-2017-5780
6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
7.8 (AV:N/AC:L/Au:N/C:C/I:N/A:N)
CVE-2017-5781
3.9 CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N
5.0 (AV:L/AC:M/Au:S/C:P/I:C/A:N)
CVE-2017-5782
5.6 CVSS:3.0/AV:P/AC:H/PR:H/UI:R/S:U/C:L/I:H/A:H
5.8 (AV:N/AC:M/Au:N/C:P/I:P/A:N)
CVE-2017-5783
5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N)
CVE-2017-5784
6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
5.8 (AV:N/AC:M/Au:N/C:P/I:P/A:N)
CVE-2017-5785
6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
6.4 (AV:N/AC:L/Au:N/C:P/I:P/A:N)
Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499
RESOLUTION
HPE has provided the following software updates to resolve the
vulnerabilities in the HPE Matrix Operating Environment (MOE). The update kit
applicable to the HPE Matrix Operating Environment (MOE) 7.6 is available at
the following location:
*
<https://h20392.www2.hpe.com/portal/swdepot/displayProductInfo.do?productNumb
r=HPID>
HPE has addressed these vulnerabilities for the impacted software components
bundled with HPE Matrix Operating Environment in the following HPE Security
Bulletins:
**HPE Systems Insight Manager (SIM)**
HPE Security Bulletin: HPSBMU03668
*
<https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05356388>
HISTORY
Version:1 (rev.1) - 3 February 2017 Initial release
Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.
Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-alert@hpe.com.
Report: To report a potential security vulnerability for any HPE supported
product:
Web form: https://www.hpe.com/info/report-security-vulnerability
Email: security-alert@hpe.com
Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice
Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive
Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.
3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX
Copyright 2016 Hewlett Packard Enterprise
Hewlett Packard Enterprise shall not be liable for technical or editorial
errors or omissions contained herein. The information provided is provided
"as is" without warranty of any kind. To the extent permitted by law, neither
HP or its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice. Hewlett
Packard Enterprise and the names of Hewlett Packard Enterprise products
referenced herein are trademarks of Hewlett Packard Enterprise in the United
States and other countries. Other product and company names mentioned herein
may be trademarks of their respective owners
| VAR-201508-0201 | CVE-2015-5369 | plural Pulse Connect Secure Vulnerabilities in products that allow man-in-the-middle attacks |
CVSS V2: 4.3 CVSS V3: - Severity: MEDIUM |
Pulse Connect Secure (aka PCS and formerly Juniper PCS) PSC6000, PCS6500, and MAG PSC360 8.1 before 8.1r5, 8.0 before 8.0r13, 7.4 before 7.4r13.5, and 7.1 before 7.1r22.2 and PPS 5.1 before 5.1R5 and 5.0 before 5.0R13, when Hardware Acceleration is enabled, does not properly validate the Finished TLS handshake message, which makes it easier for remote attackers to conduct man-in-the-middle attacks via a crafted Finished message. Supplementary information : CWE Vulnerability type by CWE-17: Code ( code ) Has been identified. http://cwe.mitre.org/data/definitions/17.htmlSkillfully crafted by a third party Finished Man-in-the-middle attacks via messages (man-in-the-middle attack) May be executed. Pulse Connect Secure (also known as PCS, formerly known as Juniper PCS) PSC6000, PCS6500, MAG PSC360 and PPS are all products of American Pulse Secure company. PCS is a set of SSL VPN solutions. PPS is a set of NAC and BYOD solutions. There are security vulnerabilities in several Pulse Secure PCS products. The following products and versions are affected: Pulse Secure PCS PSC6000, PCS6500, MAG PSC360 Version 8.1, Version 8.0, Version 7.4, Version 7.1, PPS Version 5.1
| VAR-201508-0261 | CVE-2015-5546 | Adobe Flash Player and Adobe AIR Vulnerable to arbitrary code execution |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
Adobe Flash Player before 18.0.0.232 on Windows and OS X and before 11.2.202.508 on Linux, Adobe AIR before 18.0.0.199, Adobe AIR SDK before 18.0.0.199, and Adobe AIR SDK & Compiler before 18.0.0.199 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-5544, CVE-2015-5545, CVE-2015-5547, CVE-2015-5548, CVE-2015-5549, CVE-2015-5552, and CVE-2015-5553. This vulnerability CVE-2015-5544 , CVE-2015-5545 , CVE-2015-5547 , CVE-2015-5548 , CVE-2015-5549 , CVE-2015-5552 ,and CVE-2015-5553 Is a different vulnerability.An attacker could execute arbitrary code or cause a denial of service ( Memory corruption ) There is a possibility of being put into a state. Failed exploit attempts will likely result in denial-of-service conditions. The following products and versions are affected: Adobe Flash Player Desktop Runtime 18.0.0.209 and earlier versions and Adobe Flash Player Extended Support Release 13.0.0.309 and earlier versions based on Windows and Macintosh platforms, Adobe Flash Player for Windows, Macintosh and Linux platforms Google Chrome 18.0.0.209 and earlier, Adobe Flash Player for Microsoft Edge and Internet Explorer 11 on Windows 10 18.0.0.209 and earlier, Adobe Flash Player for Internet Explorer 10 and 11 18.0.0.209 on Windows 8.0 and 8.1 and previous versions, Adobe Flash Player for Linux 11.2.202.491 and previous versions based on Linux platforms, AIR Desktop Runtime 18.0.0.180 and previous versions based on Windows and Macintosh platforms, and AIR SDK 18.0 based on Windows, Macintosh, Android and iOS platforms. 0.180 and earlier and AIR SDK & Compiler 18.0.0.180 and earlier. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Critical: flash-plugin security update
Advisory ID: RHSA-2015:1603-01
Product: Red Hat Enterprise Linux Supplementary
Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1603.html
Issue date: 2015-08-12
CVE Names: CVE-2015-5127 CVE-2015-5128 CVE-2015-5129
CVE-2015-5130 CVE-2015-5131 CVE-2015-5132
CVE-2015-5133 CVE-2015-5134 CVE-2015-5539
CVE-2015-5540 CVE-2015-5541 CVE-2015-5544
CVE-2015-5545 CVE-2015-5546 CVE-2015-5547
CVE-2015-5548 CVE-2015-5549 CVE-2015-5550
CVE-2015-5551 CVE-2015-5552 CVE-2015-5553
CVE-2015-5554 CVE-2015-5555 CVE-2015-5556
CVE-2015-5557 CVE-2015-5558 CVE-2015-5559
CVE-2015-5560 CVE-2015-5561 CVE-2015-5562
CVE-2015-5563 CVE-2015-5564
=====================================================================
1. Summary:
An updated Adobe Flash Player package that fixes multiple security issues
is now available for Red Hat Enterprise Linux 5 and 6 Supplementary.
Red Hat Product Security has rated this update as having Critical security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Desktop Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64
3. Description:
The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash
Player web browser plug-in. These
vulnerabilities are detailed in the Adobe Security Bulletin APSB15-19
listed in the References section.
Multiple flaws were found in the way flash-plugin displayed certain SWF
content. An attacker could use these flaws to create a specially crafted
SWF file that would cause flash-plugin to crash or, potentially, execute
arbitrary code when the victim loaded a page containing the malicious SWF
content.
4. Solution:
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1252697 - flash-plugin: multiple code execution flaws (APSB15-19)
6. Package List:
Red Hat Enterprise Linux Desktop Supplementary (v. 5):
i386:
flash-plugin-11.2.202.508-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.508-1.el5.i386.rpm
Red Hat Enterprise Linux Server Supplementary (v. 5):
i386:
flash-plugin-11.2.202.508-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.508-1.el5.i386.rpm
Red Hat Enterprise Linux Desktop Supplementary (v. 6):
i386:
flash-plugin-11.2.202.508-1.el6_7.i686.rpm
x86_64:
flash-plugin-11.2.202.508-1.el6_7.i686.rpm
Red Hat Enterprise Linux Server Supplementary (v. 6):
i386:
flash-plugin-11.2.202.508-1.el6_7.i686.rpm
x86_64:
flash-plugin-11.2.202.508-1.el6_7.i686.rpm
Red Hat Enterprise Linux Workstation Supplementary (v. 6):
i386:
flash-plugin-11.2.202.508-1.el6_7.i686.rpm
x86_64:
flash-plugin-11.2.202.508-1.el6_7.i686.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2015-5127
https://access.redhat.com/security/cve/CVE-2015-5128
https://access.redhat.com/security/cve/CVE-2015-5129
https://access.redhat.com/security/cve/CVE-2015-5130
https://access.redhat.com/security/cve/CVE-2015-5131
https://access.redhat.com/security/cve/CVE-2015-5132
https://access.redhat.com/security/cve/CVE-2015-5133
https://access.redhat.com/security/cve/CVE-2015-5134
https://access.redhat.com/security/cve/CVE-2015-5539
https://access.redhat.com/security/cve/CVE-2015-5540
https://access.redhat.com/security/cve/CVE-2015-5541
https://access.redhat.com/security/cve/CVE-2015-5544
https://access.redhat.com/security/cve/CVE-2015-5545
https://access.redhat.com/security/cve/CVE-2015-5546
https://access.redhat.com/security/cve/CVE-2015-5547
https://access.redhat.com/security/cve/CVE-2015-5548
https://access.redhat.com/security/cve/CVE-2015-5549
https://access.redhat.com/security/cve/CVE-2015-5550
https://access.redhat.com/security/cve/CVE-2015-5551
https://access.redhat.com/security/cve/CVE-2015-5552
https://access.redhat.com/security/cve/CVE-2015-5553
https://access.redhat.com/security/cve/CVE-2015-5554
https://access.redhat.com/security/cve/CVE-2015-5555
https://access.redhat.com/security/cve/CVE-2015-5556
https://access.redhat.com/security/cve/CVE-2015-5557
https://access.redhat.com/security/cve/CVE-2015-5558
https://access.redhat.com/security/cve/CVE-2015-5559
https://access.redhat.com/security/cve/CVE-2015-5560
https://access.redhat.com/security/cve/CVE-2015-5561
https://access.redhat.com/security/cve/CVE-2015-5562
https://access.redhat.com/security/cve/CVE-2015-5563
https://access.redhat.com/security/cve/CVE-2015-5564
https://access.redhat.com/security/updates/classification/#critical
https://helpx.adobe.com/security/products/flash-player/apsb15-19.html
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2015 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iD8DBQFVy2mAXlSAg2UNWIIRAty7AKCcTl+pzRlPMcYb+ESu7xg0C9nkVwCfbcNj
SwY72oO+5brzzyYR9NLDDnE=
=izmD
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
.
Background
==========
The Adobe Flash Player is a renderer for the SWF file format, which is
commonly used to provide interactive websites.
Please review the CVE identifiers referenced below for details.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All Adobe Flash Player users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot -v ">=www-plugins/adobe-flash-11.2.202.508"
References
==========
[ 1 ] CVE-2015-3107
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3107
[ 2 ] CVE-2015-5122
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5122
[ 3 ] CVE-2015-5123
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5123
[ 4 ] CVE-2015-5124
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5124
[ 5 ] CVE-2015-5125
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5125
[ 6 ] CVE-2015-5127
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5127
[ 7 ] CVE-2015-5129
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5129
[ 8 ] CVE-2015-5130
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5130
[ 9 ] CVE-2015-5131
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5131
[ 10 ] CVE-2015-5132
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5132
[ 11 ] CVE-2015-5133
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5133
[ 12 ] CVE-2015-5134
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5134
[ 13 ] CVE-2015-5539
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5539
[ 14 ] CVE-2015-5540
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5540
[ 15 ] CVE-2015-5541
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5541
[ 16 ] CVE-2015-5544
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5544
[ 17 ] CVE-2015-5545
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5545
[ 18 ] CVE-2015-5546
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5546
[ 19 ] CVE-2015-5547
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5547
[ 20 ] CVE-2015-5548
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5548
[ 21 ] CVE-2015-5549
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5549
[ 22 ] CVE-2015-5550
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5550
[ 23 ] CVE-2015-5551
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5551
[ 24 ] CVE-2015-5552
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5552
[ 25 ] CVE-2015-5553
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5553
[ 26 ] CVE-2015-5554
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5554
[ 27 ] CVE-2015-5555
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5555
[ 28 ] CVE-2015-5556
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5556
[ 29 ] CVE-2015-5557
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5557
[ 30 ] CVE-2015-5558
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5558
[ 31 ] CVE-2015-5559
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5559
[ 32 ] CVE-2015-5560
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5560
[ 33 ] CVE-2015-5561
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5561
[ 34 ] CVE-2015-5562
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5562
[ 35 ] CVE-2015-5563
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5563
[ 36 ] CVE-2015-5564
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5564
[ 37 ] CVE-2015-5965
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5965
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/201508-01
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2015 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05385680
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: c05385680
Version: 1
HPSBMU03692 rev.1 - HPE Matrix Operating Environment, Multiple Remote
Vulnerabilities
NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.
Release Date: 2017-02-03
Last Updated: 2017-02-03
Potential Security Impact: Remote: Bypass Security Restrictions, Cross-Site
Request Forgery (CSRF), Cross-Site Scripting (XSS), Denial of Service (DoS),
Disclosure of Information, Execution of Arbitrary Code
Source: Hewlett Packard Enterprise, Product Security Response Team
VULNERABILITY SUMMARY
Multiple potential security vulnerabilities have been identified in HPE
Matrix Operating Enviroment (MOE) on Windows. The vulnerabilities could be
exploited remotely resulting in the Bypass of Security Restrictions,
cross-site request forgery (CSRF), cross-site scripting (XSS), Denial of
Service (DoS), Disclosure of Information, and Execution of Arbitrary Code.
References:
- CVE-2016-8531 - Information Disclosure - VSE
- CVE-2016-8532 - XSS - VCEM
- CVE-2016-8533 - Priviledge Escalation - VCEM
- CVE-2016-8534 - Privilege Elevation - VSE
- CVE-2016-8535 - Http Parameter Pollution - VCEM
- CVE-2017-5780 - Clickjacking - MRM
- CVE-2017-5781 - CSRF - VSE
- CVE-2017-5782 - HSTS Header Missing - IO
- CVE-2017-5783 - Clickjacking - SPM
- CVE-2017-5784 - HSTS Header Missing - SPM
- CVE-2017-5785 - Information Disclosure - SPM
- CVE-2015-5127 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5129 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5130 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5131 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5132 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5133 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5134 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5539 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5540 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5541 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5544 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5545 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5546 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5547 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5548 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5549 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5550 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5551 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5552 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5553 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5555 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5556 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5557 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5558 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5559 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5560 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5561 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5562 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5563 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5564 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5565 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5566 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5575 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5576 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5580 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5574 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5588 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5570 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5572 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-6678 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5571 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5582 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5584 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5587 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5579 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5568 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-6679 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-6682 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-6677 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5573 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5578 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5577 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-6676 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5581 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8415 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8416 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8417 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8418 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8419 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8420 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8421 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8422 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8423 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8424 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8425 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8426 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8427 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8428 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8429 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8430 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8431 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8432 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8433 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8434 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8435 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8436 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8437 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8438 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8439 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8440 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8441 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8442 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8443 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8444 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8445 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8446 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8447 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8448 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8449 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8450 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8451 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8452 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8453 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8454 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8455 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8456 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8457 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8044 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8459 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8460 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8634 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8635 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8636 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8638 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8639 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8640 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8641 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8642 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8643 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8644 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8645 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8646 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8647 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8648 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8649 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8650 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-8651 - Adobe Flash - unauthorized disclosure of information
- CVE-2016-2183 - Sweet32, DES, 3DES
- CVE-2016-0777 - OpenSSH, unauthorized disclosure of information
- CVE-2016-0778 - OpenSSH, unauthorized disclosure of information
- CVE-2016-1907 - OpenSSH, unauthorized disclosure of information
- CVE-2009-5028 - Namazu, unauthorized disclosure of information
- CVE-2011-4345 - Namazu, unauthorized disclosure of information
- CVE-2015-5254 - Apache ActiveMQ unauthorized disclosure of information
- CVE-2016-4366 - HPE SIM, unauthorized disclosure of information
- CVE-2015-5554 - Adobe Flash - unauthorized disclosure of information
- CVE-2015-5567 - Adobe Flash - unauthorized disclosure of information
- CVE-2016-8517 - HPE SIM, Cross-site Scripting (XSS)
- CVE-2016-8516 - HPE SIM, Denial of Service
- CVE-2016-8518 - HPE SIM, Denial of Service
SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
- HP Matrix Operating Environment Software 7.6
- HP Systems Insight Manager (HP SIM), Software 7.6
BACKGROUND
CVSS Base Metrics
=================
Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector
CVE-2009-5028
7.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVE-2011-4345
3.7 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
2.6 (AV:N/AC:H/Au:N/C:N/I:P/A:N)
CVE-2015-5127
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5129
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5130
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5131
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5132
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5133
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5134
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5254
7.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVE-2015-5539
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5540
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5541
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5544
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5545
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5546
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5547
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5548
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5549
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5550
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5551
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5552
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5553
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5554
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5555
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5556
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5557
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5558
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5559
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5560
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5561
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5562
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5563
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5564
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5565
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5566
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5567
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5568
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5570
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5571
5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N)
CVE-2015-5572
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)
CVE-2015-5573
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5574
7.2 CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5575
7.2 CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5576
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)
CVE-2015-5577
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5578
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5579
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5580
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5581
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5582
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5584
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5587
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-5588
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-6676
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-6677
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-6678
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-6679
5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)
CVE-2015-6682
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8044
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8415
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8416
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8417
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8418
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8419
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8420
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8421
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8422
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8423
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8424
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8425
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8426
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8427
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8428
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8429
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8430
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8431
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8432
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8433
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8434
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8435
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8436
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8437
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8438
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8439
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8440
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8441
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8442
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8443
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8444
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8445
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8446
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8447
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8448
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8449
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8450
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8451
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8452
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8453
5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N)
CVE-2015-8454
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8455
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8456
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8457
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8459
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2015-8460
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8634
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8635
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8636
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8638
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8639
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8640
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8641
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8642
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8643
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8644
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8645
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8646
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8647
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8648
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8649
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8650
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2015-8651
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE-2016-0777
3.5 CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N
4.0 (AV:N/AC:L/Au:S/C:P/I:N/A:N)
CVE-2016-0778
5.5 CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L
4.6 (AV:N/AC:H/Au:S/C:P/I:P/A:P)
CVE-2016-1907
5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)
CVE-2016-2183
5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)
CVE-2016-4366
7.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVE-2016-8516
3.3 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
4.0 (AV:N/AC:L/Au:S/C:N/I:N/A:P)
CVE-2016-8517
6.8 CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N
7.9 (AV:N/AC:M/Au:S/C:C/I:C/A:N)
CVE-2016-8518
7.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.8 (AV:N/AC:L/Au:N/C:N/I:C/A:N)
CVE-2016-8531
6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
6.4 (AV:N/AC:L/Au:N/C:P/I:P/A:N)
CVE-2016-8532
6.3 CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:H/A:N
7.0 (AV:N/AC:M/Au:S/C:P/I:C/A:N)
CVE-2016-8533
5.7 CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N
6.8 (AV:N/AC:L/Au:S/C:C/I:N/A:N)
CVE-2016-8534
3.5 CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N
3.5 (AV:N/AC:M/Au:S/C:P/I:N/A:N)
CVE-2016-8535
4.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
4.0 (AV:N/AC:L/Au:S/C:N/I:P/A:N)
CVE-2017-5780
6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
7.8 (AV:N/AC:L/Au:N/C:C/I:N/A:N)
CVE-2017-5781
3.9 CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N
5.0 (AV:L/AC:M/Au:S/C:P/I:C/A:N)
CVE-2017-5782
5.6 CVSS:3.0/AV:P/AC:H/PR:H/UI:R/S:U/C:L/I:H/A:H
5.8 (AV:N/AC:M/Au:N/C:P/I:P/A:N)
CVE-2017-5783
5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N)
CVE-2017-5784
6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
5.8 (AV:N/AC:M/Au:N/C:P/I:P/A:N)
CVE-2017-5785
6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
6.4 (AV:N/AC:L/Au:N/C:P/I:P/A:N)
Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499
RESOLUTION
HPE has provided the following software updates to resolve the
vulnerabilities in the HPE Matrix Operating Environment (MOE). The update kit
applicable to the HPE Matrix Operating Environment (MOE) 7.6 is available at
the following location:
*
<https://h20392.www2.hpe.com/portal/swdepot/displayProductInfo.do?productNumb
r=HPID>
HPE has addressed these vulnerabilities for the impacted software components
bundled with HPE Matrix Operating Environment in the following HPE Security
Bulletins:
**HPE Systems Insight Manager (SIM)**
HPE Security Bulletin: HPSBMU03668
*
<https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05356388>
HISTORY
Version:1 (rev.1) - 3 February 2017 Initial release
Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.
Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-alert@hpe.com.
Report: To report a potential security vulnerability for any HPE supported
product:
Web form: https://www.hpe.com/info/report-security-vulnerability
Email: security-alert@hpe.com
Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice
Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive
Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.
3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX
Copyright 2016 Hewlett Packard Enterprise
Hewlett Packard Enterprise shall not be liable for technical or editorial
errors or omissions contained herein. The information provided is provided
"as is" without warranty of any kind. To the extent permitted by law, neither
HP or its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice. Hewlett
Packard Enterprise and the names of Hewlett Packard Enterprise products
referenced herein are trademarks of Hewlett Packard Enterprise in the United
States and other countries. Other product and company names mentioned herein
may be trademarks of their respective owners