High severity8.8CISA KEVNVD Advisory· Published Feb 10, 2016· Updated Apr 22, 2026
CVE-2016-0984
CVE-2016-0984
Description
Use-after-free vulnerability in Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and OS X and before 11.2.202.569 on Linux, Adobe AIR before 20.0.0.260, Adobe AIR SDK before 20.0.0.260, and Adobe AIR SDK & Compiler before 20.0.0.260 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-0973, CVE-2016-0974, CVE-2016-0975, CVE-2016-0982, and CVE-2016-0983.
Affected products
9- cpe:2.3:a:adobe:air_desktop_runtime:*:*:*:*:*:*:*:*Range: <=20.0.0.233
- cpe:2.3:a:adobe:air_sdk_\&_compiler:*:*:*:*:*:*:*:*Range: <=20.0.0.233
cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*+ 4 more
- cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*range: <=11.2.202.559
- cpe:2.3:a:adobe:flash_player:*:*:*:*:*:chrome:*:*range: <=20.0.0.286
- cpe:2.3:a:adobe:flash_player:*:*:*:*:*:edge:*:*range: <=20.0.0.272
- cpe:2.3:a:adobe:flash_player:*:*:*:*:esr:*:*:*range: <=18.0.0.326
- cpe:2.3:a:adobe:flash_player:*:*:*:*:*:internet_explorer:*:*range: <=20.0.0.272
- cpe:2.3:a:adobe:flash_player_desktop_runtime:*:*:*:*:*:*:*:*Range: <=20.0.0.286
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
10- helpx.adobe.com/security/products/flash-player/apsb16-04.htmlnvdPatchVendor Advisory
- www.exploit-db.com/exploits/39462/nvdExploitThird Party AdvisoryVDB Entry
- lists.opensuse.org/opensuse-security-announce/2016-02/msg00025.htmlnvdBroken LinkThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2016-02/msg00027.htmlnvdBroken LinkThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2016-02/msg00029.htmlnvdBroken LinkThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2016-02/msg00030.htmlnvdBroken LinkThird Party Advisory
- rhn.redhat.com/errata/RHSA-2016-0166.htmlnvdThird Party Advisory
- www.securitytracker.com/id/1034970nvdBroken LinkThird Party AdvisoryVDB Entry
- security.gentoo.org/glsa/201603-07nvdThird Party Advisory
- www.cisa.gov/known-exploited-vulnerabilities-catalognvdUS Government Resource
News mentions
0No linked articles in our index yet.