Action not permitted
Modal body text goes here.
cve-2010-3654
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T03:18:52.940Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "ADV-2011-0192", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0192" }, { "name": "42183", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/42183" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://contagiodump.blogspot.com/2010/10/potential-new-adobe-flash-player-zero.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.apple.com/kb/HT4435" }, { "name": "42030", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/42030" }, { "name": "ADV-2011-0191", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0191" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://blogs.sun.com/security/entry/multiple_vulnerabilities_in_adobe_flash1" }, { "name": "43025", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/43025" }, { "name": "ADV-2011-0344", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0344" }, { "name": "43026", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/43026" }, { "name": "GLSA-201101-09", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-201101-09.xml" }, { "name": "ADV-2010-2918", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/2918" }, { "name": "ADV-2010-3111", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/3111" }, { "name": "41917", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/41917" }, { "name": "APPLE-SA-2010-11-10-1", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html" }, { "name": "GLSA-201101-08", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-201101-08.xml" }, { "name": "RHSA-2010:0834", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0834.html" }, { "name": "SUSE-SA:2010:055", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00002.html" }, { "name": "1024660", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1024660" }, { "name": "42926", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/42926" }, { "name": "RHSA-2010:0934", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0934.html" }, { "name": "ADV-2010-2903", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/2903" }, { "name": "ADV-2011-0173", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0173" }, { "name": "42401", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/42401" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-26.html" }, { "name": "VU#298081", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/298081" }, { "name": "1024659", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1024659" }, { "name": "TLSA-2011-2", "tags": [ "vendor-advisory", "x_refsource_TURBO", "x_transferred" ], "url": "http://www.turbolinux.co.jp/security/2011/TLSA-2011-2j.txt" }, { "name": "44504", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/44504" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/advisories/apsa10-05.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-28.html" }, { "name": "SUSE-SA:2010:058", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00001.html" }, { "name": "8210", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/8210" }, { "name": "ADV-2010-2906", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/2906" }, { "name": "RHSA-2010:0867", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0867.html" }, { "name": "RHSA-2010:0829", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0829.html" }, { "name": "oval:org.mitre.oval:def:13294", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13294" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-10-28T00:00:00", "descriptions": [ { "lang": "en", "value": "Adobe Flash Player before 9.0.289.0 and 10.x before 10.1.102.64 on Windows, Mac OS X, Linux, and Solaris and 10.1.95.1 on Android, and authplay.dll (aka AuthPlayLib.bundle or libauthplay.so.0.0.0) in Adobe Reader and Acrobat 9.x through 9.4, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via crafted SWF content, as exploited in the wild in October 2010." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-18T12:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "ADV-2011-0192", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0192" }, { "name": "42183", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/42183" }, { "tags": [ "x_refsource_MISC" ], "url": "http://contagiodump.blogspot.com/2010/10/potential-new-adobe-flash-player-zero.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.apple.com/kb/HT4435" }, { "name": "42030", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/42030" }, { "name": "ADV-2011-0191", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0191" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://blogs.sun.com/security/entry/multiple_vulnerabilities_in_adobe_flash1" }, { "name": "43025", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/43025" }, { "name": "ADV-2011-0344", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0344" }, { "name": "43026", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/43026" }, { "name": "GLSA-201101-09", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-201101-09.xml" }, { "name": "ADV-2010-2918", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/2918" }, { "name": "ADV-2010-3111", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/3111" }, { "name": "41917", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/41917" }, { "name": "APPLE-SA-2010-11-10-1", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html" }, { "name": "GLSA-201101-08", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-201101-08.xml" }, { "name": "RHSA-2010:0834", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0834.html" }, { "name": "SUSE-SA:2010:055", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00002.html" }, { "name": "1024660", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1024660" }, { "name": "42926", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/42926" }, { "name": "RHSA-2010:0934", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0934.html" }, { "name": "ADV-2010-2903", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/2903" }, { "name": "ADV-2011-0173", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0173" }, { "name": "42401", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/42401" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-26.html" }, { "name": "VU#298081", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/298081" }, { "name": "1024659", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1024659" }, { "name": "TLSA-2011-2", "tags": [ "vendor-advisory", "x_refsource_TURBO" ], "url": "http://www.turbolinux.co.jp/security/2011/TLSA-2011-2j.txt" }, { "name": "44504", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/44504" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/advisories/apsa10-05.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-28.html" }, { "name": "SUSE-SA:2010:058", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00001.html" }, { "name": "8210", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/8210" }, { "name": "ADV-2010-2906", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/2906" }, { "name": "RHSA-2010:0867", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0867.html" }, { "name": "RHSA-2010:0829", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0829.html" }, { "name": "oval:org.mitre.oval:def:13294", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13294" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2010-3654", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Flash Player before 9.0.289.0 and 10.x before 10.1.102.64 on Windows, Mac OS X, Linux, and Solaris and 10.1.95.1 on Android, and authplay.dll (aka AuthPlayLib.bundle or libauthplay.so.0.0.0) in Adobe Reader and Acrobat 9.x through 9.4, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via crafted SWF content, as exploited in the wild in October 2010." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "ADV-2011-0192", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0192" }, { "name": "42183", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/42183" }, { "name": "http://contagiodump.blogspot.com/2010/10/potential-new-adobe-flash-player-zero.html", "refsource": "MISC", "url": "http://contagiodump.blogspot.com/2010/10/potential-new-adobe-flash-player-zero.html" }, { "name": "http://support.apple.com/kb/HT4435", "refsource": "CONFIRM", "url": "http://support.apple.com/kb/HT4435" }, { "name": "42030", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/42030" }, { "name": "ADV-2011-0191", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0191" }, { "name": "http://blogs.sun.com/security/entry/multiple_vulnerabilities_in_adobe_flash1", "refsource": "CONFIRM", "url": "http://blogs.sun.com/security/entry/multiple_vulnerabilities_in_adobe_flash1" }, { "name": "43025", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/43025" }, { "name": "ADV-2011-0344", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0344" }, { "name": "43026", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/43026" }, { "name": "GLSA-201101-09", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-201101-09.xml" }, { "name": "ADV-2010-2918", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/2918" }, { "name": "ADV-2010-3111", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/3111" }, { "name": "41917", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/41917" }, { "name": "APPLE-SA-2010-11-10-1", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html" }, { "name": "GLSA-201101-08", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-201101-08.xml" }, { "name": "RHSA-2010:0834", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2010-0834.html" }, { "name": "SUSE-SA:2010:055", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00002.html" }, { "name": "1024660", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1024660" }, { "name": "42926", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/42926" }, { "name": "RHSA-2010:0934", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2010-0934.html" }, { "name": "ADV-2010-2903", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/2903" }, { "name": "ADV-2011-0173", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0173" }, { "name": "42401", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/42401" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb10-26.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb10-26.html" }, { "name": "VU#298081", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/298081" }, { "name": "1024659", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1024659" }, { "name": "TLSA-2011-2", "refsource": "TURBO", "url": "http://www.turbolinux.co.jp/security/2011/TLSA-2011-2j.txt" }, { "name": "44504", "refsource": "BID", "url": "http://www.securityfocus.com/bid/44504" }, { "name": "http://www.adobe.com/support/security/advisories/apsa10-05.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/advisories/apsa10-05.html" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb10-28.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb10-28.html" }, { "name": "SUSE-SA:2010:058", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00001.html" }, { "name": "8210", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/8210" }, { "name": "ADV-2010-2906", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/2906" }, { "name": "RHSA-2010:0867", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2010-0867.html" }, { "name": "RHSA-2010:0829", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2010-0829.html" }, { "name": "oval:org.mitre.oval:def:13294", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13294" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2010-3654", "datePublished": "2010-10-29T18:00:00", "dateReserved": "2010-09-28T00:00:00", "dateUpdated": "2024-08-07T03:18:52.940Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2010-3654\",\"sourceIdentifier\":\"psirt@adobe.com\",\"published\":\"2010-10-29T19:00:02.060\",\"lastModified\":\"2017-09-19T01:31:31.003\",\"vulnStatus\":\"Modified\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"Adobe Flash Player before 9.0.289.0 and 10.x before 10.1.102.64 on Windows, Mac OS X, Linux, and Solaris and 10.1.95.1 on Android, and authplay.dll (aka AuthPlayLib.bundle or libauthplay.so.0.0.0) in Adobe Reader and Acrobat 9.x through 9.4, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via crafted SWF content, as exploited in the wild in October 2010.\"},{\"lang\":\"es\",\"value\":\"Flash Player de Adobe anterior a versi\u00f3n 9.0.289.0 y versiones 10.x anteriores a 10.1.102.64 en Windows, Mac OS X, Linux y Solaris y versi\u00f3n 10.1.95.1 en Android, y authplay.dll (tambi\u00e9n se conoce como AuthPlayLib.bundle o libauthplay.so.0.0.0) en Reader y Acrobat de Adobe versiones 9.x hasta 9.4, permite a los atacantes remotos ejecutar c\u00f3digo arbitrario o causar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria y bloqueo de aplicaci\u00f3n) por medio de contenido SWF dise\u00f1ado, como se explot\u00f3 \u201cin the wild\u201d en octubre de 2010.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:C/I:C/A:C\",\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\",\"baseScore\":9.3},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":8.6,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-119\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"10.1.85.3\",\"matchCriteriaId\":\"CC8AFF98-B20C-49E0-9B01-1B51EE272DA4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:6.0.21.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7143E94B-F3CD-4E32-A7BB-C72C816EEACA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:6.0.79:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4654752C-F677-4066-8C48-BAD09392A594\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DDFF4A51-C936-4C5B-8276-FD454C9E4F40\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:7.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D5ECC9D7-3386-4FEA-9218-91E31FF90F3A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:7.0.25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F0E93289-6EE0-401A-958D-F59D2CDAE2F1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:7.0.63:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0FA3E556-BF8F-4D30-8DE5-09DA3FD8D5C3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:7.0.69.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A82D5B56-44E0-4120-B73E-0A1155AF4B05\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:7.0.70.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8E895107-ED8A-4F88-87C3-935EAE299C01\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:7.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4007D621-A0BC-4927-82A7-10D73802BCF8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:7.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"641776AE-5408-439E-8290-DD9324771874\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:7.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"138A932A-D775-46A2-86EC-3C03C96884C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D12E3957-D7B2-4F3B-BB64-8B50B8958DEF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:8.0.22.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C0C5537E-3153-400D-9F9B-91E7F1218C8A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:8.0.24.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"32912721-F750-4C20-B999-E728F7D3A85D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:8.0.33.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6693B1C4-B2A9-4725-AD0E-A266B9DF55AB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:8.0.34.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A95FA639-346C-491C-81A8-6C2A7B01AA19\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:8.0.35.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9F1E5AB-DEFA-42FC-A299-C8EEB778F9C6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:8.0.39.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FC7DD938-F963-4E03-B66B-F00436E4EA9D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:8.0.42.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"351825F4-227D-4743-A74B-EAFC1034500B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:9.0.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F35F86B6-D49A-40F4-BFFA-5D6BBA2F7D8B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:9.0.18d60:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"600DDA9D-6440-48D1-8539-7127398A8678\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:9.0.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B4D5E27C-F6BF-4F84-9B83-6AEC98B4AA14\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:9.0.20.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"934A869D-D58D-4C36-B86E-013F62790585\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:9.0.28:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ACFA6611-99DA-48B0-89F7-DD99B8E30334\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:9.0.28.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"59AF804B-BD7A-4AD7-AD44-B5D980443B8B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:9.0.31:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F5D52F86-2E38-4C66-9939-7603367B8D0E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:9.0.31.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0557AA2A-FA3A-460A-8F03-DC74B149CA3D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:9.0.45.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2FC04ABF-6191-4AA5-90B2-E7A97E6C6005\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:9.0.47.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F22F1B02-CCF5-4770-A79B-1F58CA4321CE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:9.0.48.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"93957171-F1F4-43ED-A8B9-2D36C81EB1F9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:9.0.112.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7AE89894-E492-4380-8A2B-4CDD3A15667A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:9.0.114.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1C6ED706-BAF2-4795-B597-6F7EE8CA8911\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:9.0.115.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"260E2CF6-4D15-4168-A933-3EC52D8F93FF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:9.0.124.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D50BF190-2629-49A8-A377-4723C93FFB3E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:9.0.125.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E59E2AD-38BB-46DF-AC0D-D36F1F259AD4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:9.0.151.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD04F04C-30CE-4A8D-B254-B10DEF62CEEE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:9.0.152.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"96DC7742-499D-4BF5-9C5B-FCFF912A9892\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:9.0.159.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33AC4365-576C-487A-89C5-197A26D416C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:9.0.246.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"84B367AC-E1E1-4BC5-8BF4-D5B517C0CA7C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:9.0.260.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A0A9C054-1F82-41DD-BE13-2B71B6F87F22\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:9.125.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE848097-01E6-4C9B-9593-282D55CC77D9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:10.0.0.584:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"08E4028B-72E7-4E4A-AD0F-645F5AACAA29\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:10.0.12.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"63313ADA-3C52-47C8-9745-6BF6AEF0F6AD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:10.0.12.36:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BA646396-7C10-45A0-89A9-C75C5D8AFB3E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:10.0.15.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"476BB487-150A-4482-8C84-E6A2995A97E1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:10.0.22.87:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3555324F-40F8-4BF4-BE5F-52A1E22B3AFA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:10.0.32.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"60540FDE-8C31-4679-A85E-614B1EFE1FF0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:10.0.42.34:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE652520-B693-47F1-A342-621C149A7430\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:10.0.45.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D0EC3272-8E1E-4415-A254-BB6C7FB49BEC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:10.1.52.14.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0CF5AF16-A4F2-4E65-ADA8-DE11BE1F198D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:10.1.52.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F7DF88E7-1A67-447C-BCF8-5C5564002207\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:10.1.53.64:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"460A0D6C-3A06-4910-B1E5-375E12F64F6E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:10.1.82.76:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"950D8316-8117-4C09-A2A9-B34191957D32\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:macromedia:flash_player:5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EF005FC1-50A0-4233-A500-1E677EACDBE7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:macromedia:flash_player:5.0_r50:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6BB0BE19-EB29-4DEB-883C-89CB2023E54B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:macromedia:flash_player:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4F8A8FD0-F9C9-4125-B682-A7F2B73D9BA0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:macromedia:flash_player:6.0.29.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4B2A9976-1883-4D49-A512-C66FF12FDDCC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:macromedia:flash_player:6.0.40.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C20DFF23-6215-4860-B091-ECC1C1C08DA6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:macromedia:flash_player:6.0.47.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8E1B943A-38AD-4472-B143-B66567EBC9E0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:macromedia:flash_player:6.0.65.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"141B7F64-5EDD-450D-A244-124366AD5800\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:macromedia:flash_player:6.0.79.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F44A2955-F536-4EA5-8D1E-94D35EE10B88\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0FF5999A-9D12-4CDD-8DE9-A89C10B2D574\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"155AD4FB-E527-4103-BCEF-801B653DEA37\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2CF61F35-5905-4BA9-AD7E-7DB261D2F256\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:oracle:solaris:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"05924C67-F9A0-450E-A5B8-059651DD32E3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"10.1.95.2\",\"matchCriteriaId\":\"E727D4AE-923F-4828-A6DA-2413A9FA2AC6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:6.0.21.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7143E94B-F3CD-4E32-A7BB-C72C816EEACA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:6.0.79:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4654752C-F677-4066-8C48-BAD09392A594\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DDFF4A51-C936-4C5B-8276-FD454C9E4F40\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:7.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D5ECC9D7-3386-4FEA-9218-91E31FF90F3A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:7.0.25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F0E93289-6EE0-401A-958D-F59D2CDAE2F1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:7.0.63:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0FA3E556-BF8F-4D30-8DE5-09DA3FD8D5C3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:7.0.69.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A82D5B56-44E0-4120-B73E-0A1155AF4B05\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:7.0.70.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8E895107-ED8A-4F88-87C3-935EAE299C01\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:7.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4007D621-A0BC-4927-82A7-10D73802BCF8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:7.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"641776AE-5408-439E-8290-DD9324771874\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:7.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"138A932A-D775-46A2-86EC-3C03C96884C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D12E3957-D7B2-4F3B-BB64-8B50B8958DEF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:8.0.22.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C0C5537E-3153-400D-9F9B-91E7F1218C8A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:8.0.24.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"32912721-F750-4C20-B999-E728F7D3A85D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:8.0.33.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6693B1C4-B2A9-4725-AD0E-A266B9DF55AB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:8.0.34.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A95FA639-346C-491C-81A8-6C2A7B01AA19\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:8.0.35.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9F1E5AB-DEFA-42FC-A299-C8EEB778F9C6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:8.0.39.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FC7DD938-F963-4E03-B66B-F00436E4EA9D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:8.0.42.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"351825F4-227D-4743-A74B-EAFC1034500B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:9.0.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F35F86B6-D49A-40F4-BFFA-5D6BBA2F7D8B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:9.0.18d60:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"600DDA9D-6440-48D1-8539-7127398A8678\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:9.0.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B4D5E27C-F6BF-4F84-9B83-6AEC98B4AA14\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:9.0.20.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"934A869D-D58D-4C36-B86E-013F62790585\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:9.0.28:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ACFA6611-99DA-48B0-89F7-DD99B8E30334\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:9.0.28.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"59AF804B-BD7A-4AD7-AD44-B5D980443B8B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:9.0.31:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F5D52F86-2E38-4C66-9939-7603367B8D0E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:9.0.31.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0557AA2A-FA3A-460A-8F03-DC74B149CA3D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:9.0.45.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2FC04ABF-6191-4AA5-90B2-E7A97E6C6005\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:9.0.47.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F22F1B02-CCF5-4770-A79B-1F58CA4321CE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:9.0.48.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"93957171-F1F4-43ED-A8B9-2D36C81EB1F9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:9.0.112.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7AE89894-E492-4380-8A2B-4CDD3A15667A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:9.0.114.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1C6ED706-BAF2-4795-B597-6F7EE8CA8911\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:9.0.115.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"260E2CF6-4D15-4168-A933-3EC52D8F93FF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:9.0.124.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D50BF190-2629-49A8-A377-4723C93FFB3E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:9.0.125.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E59E2AD-38BB-46DF-AC0D-D36F1F259AD4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:9.0.151.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD04F04C-30CE-4A8D-B254-B10DEF62CEEE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:9.0.152.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"96DC7742-499D-4BF5-9C5B-FCFF912A9892\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:9.0.159.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33AC4365-576C-487A-89C5-197A26D416C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:9.0.246.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"84B367AC-E1E1-4BC5-8BF4-D5B517C0CA7C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:9.0.260.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A0A9C054-1F82-41DD-BE13-2B71B6F87F22\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:9.125.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE848097-01E6-4C9B-9593-282D55CC77D9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:10.0.0.584:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"08E4028B-72E7-4E4A-AD0F-645F5AACAA29\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:10.0.12.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"63313ADA-3C52-47C8-9745-6BF6AEF0F6AD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:10.0.12.36:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BA646396-7C10-45A0-89A9-C75C5D8AFB3E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:10.0.15.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"476BB487-150A-4482-8C84-E6A2995A97E1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:10.0.22.87:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3555324F-40F8-4BF4-BE5F-52A1E22B3AFA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:10.0.32.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"60540FDE-8C31-4679-A85E-614B1EFE1FF0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:10.0.42.34:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE652520-B693-47F1-A342-621C149A7430\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:10.0.45.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D0EC3272-8E1E-4415-A254-BB6C7FB49BEC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:10.1.52.14.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0CF5AF16-A4F2-4E65-ADA8-DE11BE1F198D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:10.1.52.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F7DF88E7-1A67-447C-BCF8-5C5564002207\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:10.1.53.64:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"460A0D6C-3A06-4910-B1E5-375E12F64F6E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:10.1.82.76:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"950D8316-8117-4C09-A2A9-B34191957D32\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:10.1.85.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5484DE8-3CB1-4591-BF30-0D5E255034E0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:10.1.92.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"02EBACEB-1266-4A2C-A47E-066D12EE5B96\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:10.1.92.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA86C5B3-1FC9-4585-9566-862A0318AF2F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:macromedia:flash_player:5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EF005FC1-50A0-4233-A500-1E677EACDBE7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:macromedia:flash_player:5.0_r50:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6BB0BE19-EB29-4DEB-883C-89CB2023E54B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:macromedia:flash_player:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4F8A8FD0-F9C9-4125-B682-A7F2B73D9BA0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:macromedia:flash_player:6.0.29.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4B2A9976-1883-4D49-A512-C66FF12FDDCC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:macromedia:flash_player:6.0.40.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C20DFF23-6215-4860-B091-ECC1C1C08DA6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:macromedia:flash_player:6.0.47.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8E1B943A-38AD-4472-B143-B66567EBC9E0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:macromedia:flash_player:6.0.65.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"141B7F64-5EDD-450D-A244-124366AD5800\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:macromedia:flash_player:6.0.79.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F44A2955-F536-4EA5-8D1E-94D35EE10B88\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:google:android:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8255F035-04C8-4158-B301-82101711939C\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5AA53564-9ACD-4CFB-9AAC-A77440026A57\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:9.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C7EC46E3-77B7-4455-B3E0-A45C6B69B3DC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:9.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4F475858-DCE2-4C93-A51A-04718DF17593\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:9.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"88687272-4CD0-42A2-B727-C322ABDE3549\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:9.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E5C4FA4-3786-47AF-BD7D-8E75927EB3AA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:9.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B35CC915-EEE3-4E86-9E09-1893C725E07B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:9.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"76201694-E5C5-4CA3-8919-46937AFDAAE3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:9.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"397AB988-1C2C-4247-9B34-806094197CB5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:9.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8FA0B8C3-8060-4685-A241-9852BD63B7A0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:9.3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4AB9BBDE-634A-47CF-BA49-67382B547900\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:9.3.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F56B1726-4F05-4732-9D8B-077EF593EAEC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:9.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A258374F-55CB-48D2-9094-CD70E1288F60\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat_reader:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"562772F1-1627-438E-A6B8-7D1AA5536086\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat_reader:9.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"27D5AF92-A8E1-41BD-B20A-EB26BB6AD4DE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat_reader:9.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F25C9167-C6D4-4264-9197-50878EDA2D96\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat_reader:9.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD1D7308-09E9-42B2-8836-DC2326C62A9E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat_reader:9.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B5C251D2-4C9B-4029-8BED-0FCAED3B8E89\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat_reader:9.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2432AC17-5378-4C61-A775-5172FD44EC03\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat_reader:9.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B6BA82F4-470D-4A46-89B2-D2F3C8FA31C8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat_reader:9.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"39EDED39-664F-4B68-B422-2CCCA3B83550\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat_reader:9.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B508C5CE-1386-47B3-B301-B78DBB3A75D9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat_reader:9.3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DDC2EEB6-D5EC-430F-962A-1279C9970441\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat_reader:9.3.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8DC590C7-5BDE-4E46-9605-01E95B17F01F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat_reader:9.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DCFE67F4-6907-4967-96A3-1757EADA72BB\"}]}]}],\"references\":[{\"url\":\"http://blogs.sun.com/security/entry/multiple_vulnerabilities_in_adobe_flash1\",\"source\":\"psirt@adobe.com\"},{\"url\":\"http://contagiodump.blogspot.com/2010/10/potential-new-adobe-flash-player-zero.html\",\"source\":\"psirt@adobe.com\",\"tags\":[\"Exploit\"]},{\"url\":\"http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html\",\"source\":\"psirt@adobe.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00002.html\",\"source\":\"psirt@adobe.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00001.html\",\"source\":\"psirt@adobe.com\"},{\"url\":\"http://secunia.com/advisories/41917\",\"source\":\"psirt@adobe.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/42030\",\"source\":\"psirt@adobe.com\"},{\"url\":\"http://secunia.com/advisories/42183\",\"source\":\"psirt@adobe.com\"},{\"url\":\"http://secunia.com/advisories/42401\",\"source\":\"psirt@adobe.com\"},{\"url\":\"http://secunia.com/advisories/42926\",\"source\":\"psirt@adobe.com\"},{\"url\":\"http://secunia.com/advisories/43025\",\"source\":\"psirt@adobe.com\"},{\"url\":\"http://secunia.com/advisories/43026\",\"source\":\"psirt@adobe.com\"},{\"url\":\"http://security.gentoo.org/glsa/glsa-201101-08.xml\",\"source\":\"psirt@adobe.com\"},{\"url\":\"http://security.gentoo.org/glsa/glsa-201101-09.xml\",\"source\":\"psirt@adobe.com\"},{\"url\":\"http://securityreason.com/securityalert/8210\",\"source\":\"psirt@adobe.com\"},{\"url\":\"http://support.apple.com/kb/HT4435\",\"source\":\"psirt@adobe.com\"},{\"url\":\"http://www.adobe.com/support/security/advisories/apsa10-05.html\",\"source\":\"psirt@adobe.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.adobe.com/support/security/bulletins/apsb10-26.html\",\"source\":\"psirt@adobe.com\"},{\"url\":\"http://www.adobe.com/support/security/bulletins/apsb10-28.html\",\"source\":\"psirt@adobe.com\"},{\"url\":\"http://www.kb.cert.org/vuls/id/298081\",\"source\":\"psirt@adobe.com\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2010-0829.html\",\"source\":\"psirt@adobe.com\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2010-0834.html\",\"source\":\"psirt@adobe.com\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2010-0867.html\",\"source\":\"psirt@adobe.com\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2010-0934.html\",\"source\":\"psirt@adobe.com\"},{\"url\":\"http://www.securityfocus.com/bid/44504\",\"source\":\"psirt@adobe.com\"},{\"url\":\"http://www.securitytracker.com/id?1024659\",\"source\":\"psirt@adobe.com\"},{\"url\":\"http://www.securitytracker.com/id?1024660\",\"source\":\"psirt@adobe.com\"},{\"url\":\"http://www.turbolinux.co.jp/security/2011/TLSA-2011-2j.txt\",\"source\":\"psirt@adobe.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2010/2903\",\"source\":\"psirt@adobe.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2010/2906\",\"source\":\"psirt@adobe.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2010/2918\",\"source\":\"psirt@adobe.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2010/3111\",\"source\":\"psirt@adobe.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2011/0173\",\"source\":\"psirt@adobe.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2011/0191\",\"source\":\"psirt@adobe.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2011/0192\",\"source\":\"psirt@adobe.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2011/0344\",\"source\":\"psirt@adobe.com\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13294\",\"source\":\"psirt@adobe.com\"}]}}" } }
var-201010-0354
Vulnerability from variot
Adobe Flash Player before 9.0.289.0 and 10.x before 10.1.102.64 on Windows, Mac OS X, Linux, and Solaris and 10.1.95.1 on Android, and authplay.dll (aka AuthPlayLib.bundle or libauthplay.so.0.0.0) in Adobe Reader and Acrobat 9.x through 9.4, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via crafted SWF content, as exploited in the wild in October 2010. Adobe Flash Contains a vulnerability that allows arbitrary code execution. Adobe Flash Contains a memory corruption vulnerability that could allow arbitrary code execution. Attack activity using this vulnerability has been confirmed.Crafted Flash By browsing a document with embedded content, arbitrary code may be executed. Attackers can exploit this issue to execute arbitrary code in the context of the user running the affected application. Adobe Flash Player is a cross-platform, browser-based multimedia player product from Adobe. The product enables viewing of applications, content and video across screens and browsers.
Background
The Adobe Flash Player is a renderer for the SWF file format, which is commonly used to provide interactive websites. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201101-08
http://security.gentoo.org/
Severity: Normal Title: Adobe Reader: Multiple vulnerabilities Date: January 21, 2011 Bugs: #336508, #343091 ID: 201101-08
Synopsis
Multiple vulnerabilities in Adobe Reader might result in the execution of arbitrary code.
Affected packages
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 app-text/acroread < 9.4.1 >= 9.4.1
Description
Multiple vulnerabilities were discovered in Adobe Reader. For further information please consult the CVE entries and the Adobe Security Bulletins referenced below.
Workaround
There is no known workaround at this time.
Resolution
All Adobe Reader users should upgrade to the latest stable version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=app-text/acroread-9.4.1"
References
[ 1 ] APSB10-21 http://www.adobe.com/support/security/bulletins/apsb10-21.html [ 2 ] APSB10-28 http://www.adobe.com/support/security/bulletins/apsb10-28.html [ 3 ] CVE-2010-2883 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2883 [ 4 ] CVE-2010-2884 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2884 [ 5 ] CVE-2010-2887 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2887 [ 6 ] CVE-2010-2889 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2889 [ 7 ] CVE-2010-2890 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2890 [ 8 ] CVE-2010-3619 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3619 [ 9 ] CVE-2010-3620 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3620 [ 10 ] CVE-2010-3621 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3621 [ 11 ] CVE-2010-3622 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3622 [ 12 ] CVE-2010-3625 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3625 [ 13 ] CVE-2010-3626 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3626 [ 14 ] CVE-2010-3627 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3627 [ 15 ] CVE-2010-3628 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3628 [ 16 ] CVE-2010-3629 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3629 [ 17 ] CVE-2010-3630 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3630 [ 18 ] CVE-2010-3632 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3632 [ 19 ] CVE-2010-3654 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3654 [ 20 ] CVE-2010-3656 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3656 [ 21 ] CVE-2010-3657 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3657 [ 22 ] CVE-2010-3658 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3658 [ 23 ] CVE-2010-4091 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4091
Availability
This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
http://security.gentoo.org/glsa/glsa-201101-08.xml
Concerns?
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.
License
Copyright 2011 Gentoo Foundation, Inc; referenced text belongs to its owner(s).
The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201010-0354", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "flash player", "scope": "eq", "trust": 1.9, "vendor": "adobe", "version": "10.1.85.3" }, { "model": "acrobat", "scope": "eq", "trust": 1.9, "vendor": "adobe", "version": "9.1.1" }, { "model": "acrobat", "scope": "eq", "trust": 1.9, "vendor": "adobe", "version": "9.2" }, { "model": "flash player", "scope": "eq", "trust": 1.9, "vendor": "adobe", "version": "10.1.92.10" }, { "model": "flash player", "scope": "eq", "trust": 1.6, "vendor": "adobe", "version": "10.1.92.8" }, { "model": "acrobat", "scope": "eq", "trust": 1.6, "vendor": "adobe", "version": "9.1" }, { "model": "acrobat", "scope": "eq", "trust": 1.6, "vendor": "adobe", "version": "9.1.2" }, { "model": "acrobat", "scope": "eq", "trust": 1.6, "vendor": "adobe", "version": "9.0" }, { "model": "acrobat", "scope": "eq", "trust": 1.6, "vendor": "adobe", "version": "9.1.3" }, { "model": "flash player", "scope": "eq", "trust": 1.3, "vendor": "adobe", "version": "9.0.246.0" }, { "model": "acrobat", "scope": "eq", "trust": 1.3, "vendor": "adobe", "version": "9.3.1" }, { "model": "flash player", "scope": "eq", "trust": 1.3, "vendor": "adobe", "version": "9.0.28.0" }, { "model": "flash player", "scope": "eq", "trust": 1.3, "vendor": "adobe", "version": "9.0.260.0" }, { "model": "acrobat", "scope": "eq", "trust": 1.3, "vendor": "adobe", "version": "9.4" }, { "model": "flash player", "scope": "eq", "trust": 1.3, "vendor": "adobe", "version": "9.0.124.0" }, { "model": "flash player", "scope": "eq", "trust": 1.3, "vendor": "adobe", "version": "9.0.31.0" }, { "model": "flash player", "scope": "eq", "trust": 1.3, "vendor": "adobe", "version": "9.0.48.0" }, { "model": "flash player", "scope": "eq", "trust": 1.3, "vendor": "adobe", "version": "7.0.70.0" }, { "model": "flash player", "scope": "eq", "trust": 1.3, "vendor": "adobe", "version": "10.0.22.87" }, { "model": "flash player", "scope": "eq", "trust": 1.3, "vendor": "adobe", "version": "9.0.151.0" }, { "model": "flash player", "scope": "eq", "trust": 1.3, "vendor": "adobe", "version": "7.0.69.0" }, { "model": "flash player", "scope": "eq", "trust": 1.3, "vendor": "adobe", "version": "10.0.42.34" }, { "model": "flash player", "scope": "eq", "trust": 1.3, "vendor": "adobe", "version": "8.0.35.0" }, { "model": "flash player", "scope": "eq", "trust": 1.3, "vendor": "adobe", "version": "9.0.115.0" }, { "model": "acrobat", "scope": "eq", "trust": 1.3, "vendor": "adobe", "version": "9.3" }, { "model": "flash player", "scope": "eq", "trust": 1.3, "vendor": "adobe", "version": "10.0.32.18" }, { "model": "flash player", "scope": "eq", "trust": 1.3, "vendor": "adobe", "version": "10.0.12.36" }, { "model": "flash player", "scope": "eq", "trust": 1.3, "vendor": "adobe", "version": "9.0.152.0" }, { "model": "flash player", "scope": "eq", "trust": 1.3, "vendor": "adobe", "version": "10.1.82.76" }, { "model": "acrobat reader", "scope": "eq", "trust": 1.3, "vendor": "adobe", "version": "9.3.3" }, { "model": "flash player", "scope": "eq", "trust": 1.3, "vendor": "adobe", "version": "9.0.47.0" }, { "model": "flash player", "scope": "eq", "trust": 1.3, "vendor": "adobe", "version": "9.0.45.0" }, { "model": "acrobat", "scope": "eq", "trust": 1.3, "vendor": "adobe", "version": "9.3.2" }, { "model": "flash player", "scope": "eq", "trust": 1.3, "vendor": "adobe", "version": "10.1.53.64" }, { "model": "flash player", "scope": "eq", "trust": 1.3, "vendor": "adobe", "version": "9.0.159.0" }, { "model": "flash player", "scope": "eq", "trust": 1.3, "vendor": "adobe", "version": "10.0.15.3" }, { "model": "flash player", "scope": "eq", "trust": 1.3, "vendor": "adobe", "version": "8.0.34.0" }, { "model": "acrobat", "scope": "eq", "trust": 1.3, "vendor": "adobe", "version": "9.3.3" }, { "model": "flash player", "scope": "eq", "trust": 1.0, "vendor": "macromedia", "version": "6.0.29.0" }, { "model": "flash player", "scope": "eq", "trust": 1.0, "vendor": "adobe", "version": "7.0.63" }, { "model": "flash player", "scope": "eq", "trust": 1.0, "vendor": "adobe", "version": "9.0.20" }, { "model": "flash player", "scope": "eq", "trust": 1.0, "vendor": "adobe", "version": "9.0.20.0" }, { "model": "flash player", "scope": "eq", "trust": 1.0, "vendor": "macromedia", "version": "6.0" }, { "model": "flash player", "scope": "eq", "trust": 1.0, "vendor": "adobe", "version": "9.0.28" }, { "model": "flash player", "scope": "eq", "trust": 1.0, "vendor": "adobe", "version": "7.1" }, { "model": "flash player", "scope": "eq", "trust": 1.0, "vendor": "adobe", "version": "10.1.52.14.1" }, { "model": "flash player", "scope": "eq", "trust": 1.0, "vendor": "macromedia", "version": "5.0" }, { "model": "acrobat reader", "scope": "eq", "trust": 1.0, "vendor": "adobe", "version": "9.2" }, { "model": "acrobat reader", "scope": "eq", "trust": 1.0, "vendor": "adobe", "version": "9.1.3" }, { "model": "flash player", "scope": "eq", "trust": 1.0, "vendor": "adobe", "version": "8.0.33.0" }, { "model": "flash player", "scope": "lte", "trust": 1.0, "vendor": "adobe", "version": "10.1.95.2" }, { "model": "flash player", "scope": "eq", "trust": 1.0, "vendor": "adobe", "version": "8.0" }, { "model": "flash player", "scope": "eq", "trust": 1.0, "vendor": "adobe", "version": "10.0.0.584" }, { "model": "flash player", "scope": "eq", "trust": 1.0, "vendor": "adobe", "version": "10.1.52.15" }, { "model": "acrobat reader", "scope": "eq", "trust": 1.0, "vendor": "adobe", "version": "9.1.2" }, { "model": "flash player", "scope": "eq", "trust": 1.0, "vendor": "macromedia", "version": "6.0.47.0" }, { "model": "flash player", "scope": "eq", "trust": 1.0, "vendor": "adobe", "version": "7.2" }, { "model": "flash player", "scope": "eq", "trust": 1.0, "vendor": "macromedia", "version": "5.0_r50" }, { "model": "flash player", "scope": "eq", "trust": 1.0, "vendor": "adobe", "version": "9.0.112.0" }, { "model": "acrobat reader", "scope": "eq", "trust": 1.0, "vendor": "adobe", "version": "9.3.2" }, { "model": "flash player", "scope": "eq", "trust": 1.0, "vendor": "macromedia", "version": "6.0.65.0" }, { "model": "flash player", "scope": "eq", "trust": 1.0, "vendor": "adobe", "version": "7.0" }, { "model": "flash player", "scope": "eq", "trust": 1.0, "vendor": "adobe", "version": "7.0.25" }, { "model": "flash player", "scope": "eq", "trust": 1.0, "vendor": "adobe", "version": "6.0.21.0" }, { "model": "flash player", "scope": "eq", "trust": 1.0, "vendor": "adobe", "version": "8.0.22.0" }, { "model": "flash player", "scope": "eq", "trust": 1.0, "vendor": "adobe", "version": "9.0.16" }, { "model": "acrobat reader", "scope": "eq", "trust": 1.0, "vendor": "adobe", "version": "9.4" }, { "model": "flash player", "scope": "eq", "trust": 1.0, "vendor": "adobe", "version": "10.0.12.10" }, { "model": "acrobat reader", "scope": "eq", "trust": 1.0, "vendor": "adobe", "version": "9.3.1" }, { "model": "flash player", "scope": "eq", "trust": 1.0, "vendor": "adobe", "version": "9.0.18d60" }, { "model": "flash player", "scope": "eq", "trust": 1.0, "vendor": "macromedia", "version": "6.0.79.0" }, { "model": "acrobat", "scope": "eq", "trust": 1.0, "vendor": "adobe", "version": "9.3.4" }, { "model": "acrobat reader", "scope": "eq", "trust": 1.0, "vendor": "adobe", "version": "9.1.1" }, { "model": "flash player", "scope": "eq", "trust": 1.0, "vendor": "adobe", "version": "10.0.45.2" }, { "model": "flash player", "scope": "eq", "trust": 1.0, "vendor": "adobe", "version": "9.0.125.0" }, { "model": "acrobat reader", "scope": "eq", "trust": 1.0, "vendor": "adobe", "version": "9.3.4" }, { "model": "flash player", "scope": "eq", "trust": 1.0, "vendor": "adobe", "version": "8.0.24.0" }, { "model": "flash player", "scope": "eq", "trust": 1.0, "vendor": "adobe", "version": "9.125.0" }, { "model": "acrobat reader", "scope": "eq", "trust": 1.0, "vendor": "adobe", "version": "9.0" }, { "model": "flash player", "scope": "eq", "trust": 1.0, "vendor": "adobe", "version": "6.0.79" }, { "model": "flash player", "scope": "eq", "trust": 1.0, "vendor": "adobe", "version": "8.0.42.0" }, { "model": "flash player", "scope": "lte", "trust": 1.0, "vendor": "adobe", "version": "10.1.85.3" }, { "model": "flash player", "scope": "eq", "trust": 1.0, "vendor": "adobe", "version": "8.0.39.0" }, { "model": "flash player", "scope": "eq", "trust": 1.0, "vendor": "adobe", "version": "9.0.31" }, { "model": "flash player", "scope": "eq", "trust": 1.0, "vendor": "adobe", "version": "7.0.1" }, { "model": "flash player", "scope": "eq", "trust": 1.0, "vendor": "adobe", "version": "7.1.1" }, { "model": "flash player", "scope": "eq", "trust": 1.0, "vendor": "adobe", "version": "9.0.114.0" }, { "model": "acrobat reader", "scope": "eq", "trust": 1.0, "vendor": "adobe", "version": "9.1" }, { "model": "acrobat reader", "scope": "eq", "trust": 1.0, "vendor": "adobe", "version": "9.3" }, { "model": "flash player", "scope": "eq", "trust": 1.0, "vendor": "macromedia", "version": "6.0.40.0" }, { "model": "flash player", "scope": "eq", "trust": 0.9, "vendor": "adobe", "version": "10.1.95.2" }, { "model": null, "scope": null, "trust": 0.8, "vendor": "adobe", "version": null }, { "model": "mac os x", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "v10.5.8" }, { "model": "mac os x", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "v10.6 to v10.6.4" }, { "model": "mac os x server", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "v10.5.8" }, { "model": "mac os x server", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "v10.6 to v10.6.4" }, { "model": "acrobat", "scope": "lte", "trust": 0.8, "vendor": "adobe", "version": "9.4 windows edition" }, { "model": "acrobat", "scope": "eq", "trust": 0.8, "vendor": "adobe", "version": "macintosh edition" }, { "model": "flash player", "scope": "lte", "trust": 0.8, "vendor": "adobe", "version": "10.1.85.3 windows edition" }, { "model": "flash player", "scope": "eq", "trust": 0.8, "vendor": "adobe", "version": "macintosh edition" }, { "model": "flash player", "scope": "eq", "trust": 0.8, "vendor": "adobe", "version": "linux edition" }, { "model": "flash player", "scope": "eq", "trust": 0.8, "vendor": "adobe", "version": "solaris edition" }, { "model": "flash player", "scope": "lte", "trust": 0.8, "vendor": "adobe", "version": "adobe flash player 10.1.95.2 android edition" }, { "model": "reader", "scope": "lte", "trust": 0.8, "vendor": "adobe", "version": "9.4 windows edition" }, { "model": "reader", "scope": "eq", "trust": 0.8, "vendor": "adobe", "version": "macintosh edition" }, { "model": "reader", "scope": "eq", "trust": 0.8, "vendor": "adobe", "version": "unix edition" }, { "model": "solaris", "scope": "eq", "trust": 0.8, "vendor": "oracle", "version": "10" }, { "model": "solaris", "scope": "eq", "trust": 0.8, "vendor": "oracle", "version": "11 express" }, { "model": "turbolinux client", "scope": "eq", "trust": 0.8, "vendor": "turbo linux", "version": "2008" }, { "model": "enterprise linux extras", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "4 extras" }, { "model": "enterprise linux extras", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "4.8.z extras" }, { "model": "enterprise linux server supplementary", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "6" }, { "model": "enterprise linux workstation supplementary", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "6" }, { "model": "rhel desktop supplementary", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "5 (client)" }, { "model": "rhel desktop supplementary", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "6" }, { "model": "rhel supplementary", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "5 (server)" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.307.6" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375127" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.28" }, { "model": "air", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "1.5.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.34" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.322.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.391.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.14" }, { "model": "flash r50", "scope": "eq", "trust": 0.3, "vendor": "macromedia", "version": "5.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.50" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.306.1" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.5.6" }, { "model": "reader", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9.3.3" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.1.95.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.434.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.399.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.365.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.335.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.326.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.317.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.64" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.408.4" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.5.7" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.11" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.76" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.5.4" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.40" }, { "model": "acrobat standard", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9.3.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.447.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.307.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.366.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.35" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.348.0" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9.0.2460" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.458.1" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "8" }, { "model": "reader", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9.1.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.342.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.307.11" }, { "model": "acrobat professional", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.366.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.12" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.18" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.82" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.395.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.28" }, { "model": "hat enterprise linux supplementary server", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "5" }, { "model": "enterprise linux extras", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.13" }, { "model": "solaris express", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "11" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.25" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.418.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.385.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.319.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.408.6" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.366.3" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.5.5" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.445.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.443.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.374.0" }, { "model": "reader", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9.3.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.417.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.23" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.21" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9.0.277.0" }, { "model": "air", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "1.5.3" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.5.2" }, { "model": "acrobat professional", "scope": "ne", "trust": 0.3, "vendor": "adobe", "version": "9.4.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.342.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.418.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.71" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.407.0" }, { "model": "air", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "1.01" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.346.0" }, { "model": "linux enterprise desktop", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "11" }, { "model": "flash", "scope": "eq", "trust": 0.3, "vendor": "macromedia", "version": "6.0.79.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.421.0" }, { "model": "acrobat standard", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.390.0" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.5.6" }, { "model": "flash player", "scope": "ne", "trust": 0.3, "vendor": "adobe", "version": "9.0.289.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.382.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.35" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.438.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.39" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.20" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.462.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.12" }, { "model": "acrobat standard", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9.3.1" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.5.4" }, { "model": "reader", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9.4" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.368.0" }, { "model": "hat enterprise linux server supplementary", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "6" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.37" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.46" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.77" }, { "model": "flash", "scope": "eq", "trust": 0.3, "vendor": "macromedia", "version": "6.0.47.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.307.10" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.87" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.126" }, { "model": "acrobat standard", "scope": "ne", "trust": 0.3, "vendor": "adobe", "version": "9.4.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.393.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.362.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.408.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.423.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.418.9" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.48" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.323.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.356.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.93" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.23" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.370.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.380.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.447.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.408.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.419.0" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.5.5" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.408.5" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.66" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.361.0" }, { "model": "flash", "scope": "eq", "trust": 0.3, "vendor": "macromedia", "version": "6.0.29.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.58" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.437.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.467.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.435.0" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.5.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.413.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.452.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.10" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.379.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.453.1" }, { "model": "air", "scope": "ne", "trust": 0.3, "vendor": "adobe", "version": "2.5.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.469.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.334.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.408.9" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.307.4" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9.0.280" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.458.0" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.5.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.404.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.414.0" }, { "model": "acrobat professional", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.335.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.85" }, { "model": "acrobat professional", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9.1.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.328.0" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.5" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.342.5" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.360.3" }, { "model": "reader", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9.3.4" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.1.51.66" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.381.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.19" }, { "model": "air", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "2.0.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.15" }, { "model": "acrobat", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "8.2.4" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.394.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.41" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.415.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.437.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.364.0" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "7" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.349.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.408.7" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.458.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.450.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.350.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.418.7" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.322.2" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.6" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.20" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.345.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.354.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.325.0" }, { "model": "air", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "2.0.4" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.335.4" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.369.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.22" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.431.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.347.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.412.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.83" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.34" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.4" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.307.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.42" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.406.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.416.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.63" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.55" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.59" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.445.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.409.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.329.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.68" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.315.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.32" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.47" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.0.3218" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.384.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.69" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.29" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.350.1" }, { "model": "enterprise linux es extras", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4" }, { "model": "hat enterprise linux desktop supplementary", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "6" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.408.10" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.5.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.26" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.422.0" }, { "model": "solaris 10 sparc", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "air", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "1.5.3.9120" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.36" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.9" }, { "model": "acrobat professional", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.371.0" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.5" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.408.8" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.411.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.452.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.363.0" }, { "model": "reader", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9.1.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.367.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.454.0" }, { "model": "acrobat professional", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9.3.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.453.0" }, { "model": "acrobat", "scope": "ne", "trust": 0.3, "vendor": "adobe", "version": "9.4.1" }, { "model": "reader", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.466.6" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.337.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.96" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.366.4" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.6" }, { "model": "air", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "1.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.43" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.91" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.80" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.441.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.8" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.60" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.88" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.466.5" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.314.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.342.6" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.343.0" }, { "model": "hat enterprise linux desktop supplementary client", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "5" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.16" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.440.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.426.0" }, { "model": "reader", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9.3.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.355.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.327.0" }, { "model": "acrobat standard", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.22" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.67" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.65" }, { "model": "opensuse", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "11.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.401.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.335.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.356.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.430.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.11" }, { "model": "enterprise linux as extras", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.457.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.21" }, { "model": "reader", "scope": "ne", "trust": 0.3, "vendor": "adobe", "version": "9.4.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.29" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.308.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.92" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.342.4" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.401.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.40" }, { "model": "hat enterprise linux workstation supplementary", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "6" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.6.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.30" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.356.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.341.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.95" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.57" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.54" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.338.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.75" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.451.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.450.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.84" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.418.5" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.322.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.398.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.404.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.418.6" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.466.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.94" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.19" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.466.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.4" }, { "model": "opensuse", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "11.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.427.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.342.7" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.466.4" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375125" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.18" }, { "model": "desktop extras", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4" }, { "model": "air", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "2.0.2.12610" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.39" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.307.8" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.336.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.61" }, { "model": "acrobat professional", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.98" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.342.2" }, { "model": "air", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "1.1" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9.0.262" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.317.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.320.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.31" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.37" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.17" }, { "model": "air", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "1.5" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.366.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.33" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.339.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.307.7" }, { "model": "acrobat professional", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9.3.4" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.342.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.335.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.424.0" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.6.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.465.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.37599" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.330.0" }, { "model": "air", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "1.5.1" }, { "model": "acrobat standard", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.79" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.410.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.27" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.45" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.38" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.405.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.10" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.418.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.31" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.49" }, { "model": "acrobat professional", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9.3.3" }, { "model": "acrobat standard", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.378.0" }, { "model": "acrobat standard", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9.1.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.62" }, { "model": "flash", "scope": "eq", "trust": 0.3, "vendor": "macromedia", "version": "6.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.16" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.360.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.466.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.418.8" }, { "model": "air", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "2.0.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.387.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.27" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.382.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.97" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.6.4" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.386.0" }, { "model": "linux enterprise desktop sp1", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "11" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.425.0" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.450.0" }, { "model": "acrobat professional", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9.1.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.372.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.450.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.392.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.403.0" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.307.5" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.0" }, { "model": "enterprise linux ws extras", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.72" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.360.4" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.5.8" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.51" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.6" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.26" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.2" }, { "model": "flash player release candida", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.404.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.332.0" }, { "model": "opensuse", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "11.3" }, { "model": "flash", "scope": "eq", "trust": 0.3, "vendor": "macromedia", "version": "6.0.65.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.41" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.44" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.73" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.0.12.35" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.340.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.436.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.373.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.369.0" }, { "model": "acrobat standard", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9.1.2" }, { "model": "reader", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.397.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.353.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.408.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.89" }, { "model": "flash", "scope": "eq", "trust": 0.3, "vendor": "macromedia", "version": "6.0.40.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.70" }, { "model": "acrobat professional", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9.3.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.56" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.470.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.461.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.437.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.446.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.321.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.15" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.5" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.357.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.459.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.81" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.6.2" }, { "model": "acrobat professional", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9.4" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.333.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.313.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.351.0" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.5.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.471.0" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.6.4" }, { "model": "acrobat standard", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9.3.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.396.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.450.4" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.415.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.428.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.42" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.309.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.32" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.447.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.460.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.344.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.307.9" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.6.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.342.9" }, { "model": "linux enterprise desktop sp3", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "10" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.13" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.25" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.466.3" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.5.8" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.455.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.38" }, { "model": "acrobat professional extended", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.449.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.400.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.369.2" }, { "model": "acrobat standard", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9.4" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.444.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.437.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.358.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.360.5" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.24" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.456.0" }, { "model": "air", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "1.5.3.9130" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.36" }, { "model": "mac os server", "scope": "ne", "trust": 0.3, "vendor": "apple", "version": "x10.6.5" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.17" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.7" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.53" }, { "model": "linux", "scope": null, "trust": 0.3, "vendor": "gentoo", "version": null }, { "model": "flash", "scope": "eq", "trust": 0.3, "vendor": "macromedia", "version": "5.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.317.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.74" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.432.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.314.0" }, { "model": "flash player", "scope": "ne", "trust": 0.3, "vendor": "adobe", "version": "10.1.105.6" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.324.0" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.6.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.30" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.433.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.408.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.342.8" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.5.7" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.5.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.416.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.52" }, { "model": "solaris", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "11" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.0.452" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.14" }, { "model": "reader", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.78" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.354.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.316.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.3" }, { "model": "flash player", "scope": "ne", "trust": 0.3, "vendor": "adobe", "version": "10.1.102.64" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.90" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.6.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.418.3" }, { "model": "solaris 10 x86", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "reader", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.464.1" }, { "model": "reader", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9.1.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.517.41" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.418.4" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.359.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.383.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.376.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.465.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.306.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.33" }, { "model": "acrobat standard", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9.3.4" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.37586" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.318.0" } ], "sources": [ { "db": "CERT/CC", "id": "VU#298081" }, { "db": "BID", "id": "44504" }, { "db": "JVNDB", "id": "JVNDB-2010-002313" }, { "db": "CNNVD", "id": "CNNVD-201010-426" }, { "db": "NVD", "id": "CVE-2010-3654" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:10.1.82.76:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "10.1.85.3", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:10.0.45.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:10.0.32.18:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:9.0.125.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:9.0.152.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:9.0.151.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:9.0.115.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:9.0.20.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:9.0.159.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:8.0.33.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:7.0.25:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:7.0.63:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:7.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:6.0.21.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:macromedia:flash_player:6.0.40.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:macromedia:flash_player:6.0.29.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:10.1.52.15:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:10.1.52.14.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:10.0.12.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:10.0.22.87:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:9.125.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:9.0.18d60:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:9.0.31.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:9.0.31:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:8.0.22.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:8.0.42.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:7.0.69.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:7.0.70.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:6.0.79:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:macromedia:flash_player:5.0_r50:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:macromedia:flash_player:6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:10.0.12.36:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:10.0.15.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:9.0.112.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:9.0.28.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:9.0.16:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:9.0.45.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:9.0.124.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:9.0.48.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:8.0.24.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:8.0.34.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:7.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:7.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:macromedia:flash_player:5.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:macromedia:flash_player:6.0.79.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:10.1.53.64:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:10.0.42.34:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:10.0.0.584:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:9.0.260.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:9.0.246.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:9.0.28:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:9.0.20:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:9.0.47.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:9.0.114.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:8.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:8.0.35.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:8.0.39.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:7.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:macromedia:flash_player:6.0.65.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:macromedia:flash_player:6.0.47.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:oracle:solaris:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:10.1.53.64:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:10.0.0.584:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:10.0.45.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:9.0.246.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:9.0.125.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:9.0.20:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:9.0.115.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:9.0.114.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:9.0.159.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:8.0.35.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:8.0.39.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:10.1.82.76:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:10.1.52.15:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:10.0.32.18:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:10.0.12.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:9.0.152.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:9.0.151.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:9.0.20.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:9.0.31.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:8.0.33.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:8.0.22.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:7.0.25:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:7.0.63:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:7.0.69.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:6.0.21.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:6.0.79:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:macromedia:flash_player:6.0.29.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:macromedia:flash_player:6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:10.1.52.14.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:10.0.12.36:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:10.0.22.87:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:9.0.112.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:9.125.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:9.0.18d60:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:9.0.16:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:9.0.31:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:9.0.124.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:8.0.42.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:8.0.24.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:7.0.70.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:7.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:macromedia:flash_player:5.0_r50:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:macromedia:flash_player:5.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:10.1.85.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:10.1.92.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:7.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:7.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:macromedia:flash_player:6.0.47.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:macromedia:flash_player:6.0.40.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:10.0.15.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:10.0.42.34:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:9.0.28.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:9.0.260.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:9.0.45.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:9.0.28:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:9.0.48.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:9.0.47.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:8.0.34.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:8.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:7.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:macromedia:flash_player:6.0.79.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:macromedia:flash_player:6.0.65.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:10.1.92.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "10.1.95.2", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:google:android:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:adobe:acrobat:9.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat:9.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat:9.3.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat:9.3.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat_reader:9.1.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat_reader:9.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat:9.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat:9.1.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat:9.3.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat:9.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat_reader:9.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat_reader:9.3.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat:9.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat:9.3.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat_reader:9.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat_reader:9.1.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat_reader:9.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat:9.1.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat:9.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat_reader:9.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat_reader:9.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat_reader:9.3.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat_reader:9.3.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat_reader:9.3.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2010-3654" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Adobe", "sources": [ { "db": "BID", "id": "44504" }, { "db": "CNNVD", "id": "CNNVD-201010-426" } ], "trust": 0.9 }, "cve": "CVE-2010-3654", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.6, "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": true, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 9.3, "confidentialityImpact": "Complete", "exploitabilityScore": null, "id": "CVE-2010-3654", "impactScore": null, "integrityImpact": "Complete", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.6, "id": "VHN-46259", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2010-3654", "trust": 1.8, "value": "HIGH" }, { "author": "CARNEGIE MELLON", "id": "VU#298081", "trust": 0.8, "value": "43.54" }, { "author": "CNNVD", "id": "CNNVD-201010-426", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-46259", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CERT/CC", "id": "VU#298081" }, { "db": "VULHUB", "id": "VHN-46259" }, { "db": "JVNDB", "id": "JVNDB-2010-002313" }, { "db": "CNNVD", "id": "CNNVD-201010-426" }, { "db": "NVD", "id": "CVE-2010-3654" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Adobe Flash Player before 9.0.289.0 and 10.x before 10.1.102.64 on Windows, Mac OS X, Linux, and Solaris and 10.1.95.1 on Android, and authplay.dll (aka AuthPlayLib.bundle or libauthplay.so.0.0.0) in Adobe Reader and Acrobat 9.x through 9.4, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via crafted SWF content, as exploited in the wild in October 2010. Adobe Flash Contains a vulnerability that allows arbitrary code execution. Adobe Flash Contains a memory corruption vulnerability that could allow arbitrary code execution. Attack activity using this vulnerability has been confirmed.Crafted Flash By browsing a document with embedded content, arbitrary code may be executed. \nAttackers can exploit this issue to execute arbitrary code in the context of the user running the affected application. Adobe Flash Player is a cross-platform, browser-based multimedia player product from Adobe. The product enables viewing of applications, content and video across screens and browsers. \n\nBackground\n==========\n\nThe Adobe Flash Player is a renderer for the SWF file format, which is\ncommonly used to provide interactive websites. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\nGentoo Linux Security Advisory GLSA 201101-08\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n http://security.gentoo.org/\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\n Severity: Normal\n Title: Adobe Reader: Multiple vulnerabilities\n Date: January 21, 2011\n Bugs: #336508, #343091\n ID: 201101-08\n\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\nSynopsis\n========\n\nMultiple vulnerabilities in Adobe Reader might result in the execution\nof arbitrary code. \n\nAffected packages\n=================\n\n -------------------------------------------------------------------\n Package / Vulnerable / Unaffected\n -------------------------------------------------------------------\n 1 app-text/acroread \u003c 9.4.1 \u003e= 9.4.1\n\nDescription\n===========\n\nMultiple vulnerabilities were discovered in Adobe Reader. For further\ninformation please consult the CVE entries and the Adobe Security\nBulletins referenced below. \n\nWorkaround\n==========\n\nThere is no known workaround at this time. \n\nResolution\n==========\n\nAll Adobe Reader users should upgrade to the latest stable version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose \"\u003e=app-text/acroread-9.4.1\"\n\nReferences\n==========\n\n [ 1 ] APSB10-21\n http://www.adobe.com/support/security/bulletins/apsb10-21.html\n [ 2 ] APSB10-28\n http://www.adobe.com/support/security/bulletins/apsb10-28.html\n [ 3 ] CVE-2010-2883\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2883\n [ 4 ] CVE-2010-2884\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2884\n [ 5 ] CVE-2010-2887\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2887\n [ 6 ] CVE-2010-2889\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2889\n [ 7 ] CVE-2010-2890\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2890\n [ 8 ] CVE-2010-3619\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3619\n [ 9 ] CVE-2010-3620\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3620\n [ 10 ] CVE-2010-3621\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3621\n [ 11 ] CVE-2010-3622\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3622\n [ 12 ] CVE-2010-3625\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3625\n [ 13 ] CVE-2010-3626\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3626\n [ 14 ] CVE-2010-3627\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3627\n [ 15 ] CVE-2010-3628\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3628\n [ 16 ] CVE-2010-3629\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3629\n [ 17 ] CVE-2010-3630\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3630\n [ 18 ] CVE-2010-3632\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3632\n [ 19 ] CVE-2010-3654\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3654\n [ 20 ] CVE-2010-3656\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3656\n [ 21 ] CVE-2010-3657\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3657\n [ 22 ] CVE-2010-3658\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3658\n [ 23 ] CVE-2010-4091\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4091\n\nAvailability\n============\n\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n http://security.gentoo.org/glsa/glsa-201101-08.xml\n\nConcerns?\n=========\n\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users machines is of utmost\nimportance to us. Any security concerns should be addressed to\nsecurity@gentoo.org or alternatively, you may file a bug at\nhttps://bugs.gentoo.org. \n\nLicense\n=======\n\nCopyright 2011 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttp://creativecommons.org/licenses/by-sa/2.5\n\n\n", "sources": [ { "db": "NVD", "id": "CVE-2010-3654" }, { "db": "CERT/CC", "id": "VU#298081" }, { "db": "JVNDB", "id": "JVNDB-2010-002313" }, { "db": "BID", "id": "44504" }, { "db": "VULHUB", "id": "VHN-46259" }, { "db": "PACKETSTORM", "id": "97735" }, { "db": "PACKETSTORM", "id": "97734" } ], "trust": 2.88 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://www.scap.org.cn/vuln/vhn-46259", "trust": 0.1, "type": "unknown" } ], "sources": [ { "db": "VULHUB", "id": "VHN-46259" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "CERT/CC", "id": "VU#298081", "trust": 3.6 }, { "db": "NVD", "id": "CVE-2010-3654", "trust": 3.0 }, { "db": "BID", "id": "44504", "trust": 2.8 }, { "db": "SECUNIA", "id": "41917", "trust": 2.5 }, { "db": "VUPEN", "id": "ADV-2010-2903", "trust": 1.9 }, { "db": "SECUNIA", "id": "42030", "trust": 1.9 }, { "db": "VUPEN", "id": "ADV-2011-0173", "trust": 1.1 }, { "db": "VUPEN", "id": "ADV-2010-2918", "trust": 1.1 }, { "db": "VUPEN", "id": "ADV-2010-2906", "trust": 1.1 }, { "db": "VUPEN", "id": "ADV-2011-0191", "trust": 1.1 }, { "db": "VUPEN", "id": "ADV-2010-3111", "trust": 1.1 }, { "db": "VUPEN", "id": "ADV-2011-0344", "trust": 1.1 }, { "db": "VUPEN", "id": "ADV-2011-0192", "trust": 1.1 }, { "db": "SECUNIA", "id": "42401", "trust": 1.1 }, { "db": "SECUNIA", "id": "43025", "trust": 1.1 }, { "db": "SECUNIA", "id": "42183", "trust": 1.1 }, { "db": "SECUNIA", "id": "42926", "trust": 1.1 }, { "db": "SECUNIA", "id": "43026", "trust": 1.1 }, { "db": "SECTRACK", "id": "1024660", "trust": 1.1 }, { "db": "SECTRACK", "id": "1024659", "trust": 1.1 }, { "db": "SREASON", "id": "8210", "trust": 1.1 }, { "db": "VUPEN", "id": "ADV-2010-2810", "trust": 0.8 }, { "db": "VUPEN", "id": "ADV-2010-2811", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2010-002313", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201010-426", "trust": 0.7 }, { "db": "PACKETSTORM", "id": "95444", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "100575", "trust": 0.1 }, { "db": "EXPLOIT-DB", "id": "17187", "trust": 0.1 }, { "db": "EXPLOIT-DB", "id": "16667", "trust": 0.1 }, { "db": "SEEBUG", "id": "SSVID-88894", "trust": 0.1 }, { "db": "SEEBUG", "id": "SSVID-71175", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-46259", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "97735", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "97734", "trust": 0.1 } ], "sources": [ { "db": "CERT/CC", "id": "VU#298081" }, { "db": "VULHUB", "id": "VHN-46259" }, { "db": "BID", "id": "44504" }, { "db": "JVNDB", "id": "JVNDB-2010-002313" }, { "db": "PACKETSTORM", "id": "97735" }, { "db": "PACKETSTORM", "id": "97734" }, { "db": "CNNVD", "id": "CNNVD-201010-426" }, { "db": "NVD", "id": "CVE-2010-3654" } ] }, "id": "VAR-201010-0354", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-46259" } ], "trust": 0.01 }, "last_update_date": "2024-07-23T19:18:35.504000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "APSA10-05", "trust": 0.8, "url": "http://www.adobe.com/support/security/advisories/apsa10-05.html" }, { "title": "APSB10-26", "trust": 0.8, "url": "http://www.adobe.com/support/security/bulletins/apsb10-26.html" }, { "title": "APSB10-28", "trust": 0.8, "url": "http://www.adobe.com/support/security/bulletins/apsb10-28.html" }, { "title": "cpsid_88012", "trust": 0.8, "url": "http://kb2.adobe.com/jp/cps/880/cpsid_88012.html" }, { "title": "APSA10-05", "trust": 0.8, "url": "http://www.adobe.com/jp/support/security/advisories/apsa10-05.html" }, { "title": "APSB10-28", "trust": 0.8, "url": "http://www.adobe.com/jp/support/security/bulletins/apsb10-28.html" }, { "title": "cpsid_87720", "trust": 0.8, "url": "http://kb2.adobe.com/jp/cps/877/cpsid_87720.html" }, { "title": "cpsid_87813", "trust": 0.8, "url": "http://kb2.adobe.com/jp/cps/878/cpsid_87813.html" }, { "title": "HT4435", "trust": 0.8, "url": "http://support.apple.com/kb/ht4435" }, { "title": "HT4435", "trust": 0.8, "url": "http://support.apple.com/kb/ht4435?viewlocale=ja_jp" }, { "title": "RHSA-2010:0934", "trust": 0.8, "url": "https://rhn.redhat.com/errata/rhsa-2010-0934.html" }, { "title": "RHSA-2010:0829", "trust": 0.8, "url": "https://rhn.redhat.com/errata/rhsa-2010-0829.html" }, { "title": "RHSA-2010:0834", "trust": 0.8, "url": "https://rhn.redhat.com/errata/rhsa-2010-0834.html" }, { "title": "RHSA-2010:0867", "trust": 0.8, "url": "https://rhn.redhat.com/errata/rhsa-2010-0867.html" }, { "title": "multiple_vulnerabilities_in_adobe_flash1", "trust": 0.8, "url": "http://blogs.sun.com/security/entry/multiple_vulnerabilities_in_adobe_flash1" }, { "title": "TLSA-2011-2", "trust": 0.8, "url": "http://www.turbolinux.co.jp/security/2011/tlsa-2011-2j.txt" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2010-002313" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-119", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-46259" }, { "db": "JVNDB", "id": "JVNDB-2010-002313" }, { "db": "NVD", "id": "CVE-2010-3654" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.1, "url": "http://www.adobe.com/support/security/bulletins/apsb10-28.html" }, { "trust": 2.8, "url": "http://www.adobe.com/support/security/advisories/apsa10-05.html" }, { "trust": 2.8, "url": "http://www.kb.cert.org/vuls/id/298081" }, { "trust": 2.5, "url": "http://www.securityfocus.com/bid/44504" }, { "trust": 2.5, "url": "http://secunia.com/advisories/41917" }, { "trust": 2.3, "url": "http://www.adobe.com/support/security/bulletins/apsb10-26.html" }, { "trust": 1.9, "url": "http://secunia.com/advisories/42030" }, { "trust": 1.9, "url": "http://www.vupen.com/english/advisories/2010/2903" }, { "trust": 1.7, "url": "http://contagiodump.blogspot.com/2010/10/potential-new-adobe-flash-player-zero.html" }, { "trust": 1.4, "url": "http://blogs.sun.com/security/entry/multiple_vulnerabilities_in_adobe_flash1" }, { "trust": 1.2, "url": "http://security.gentoo.org/glsa/glsa-201101-08.xml" }, { "trust": 1.2, "url": "http://security.gentoo.org/glsa/glsa-201101-09.xml" }, { "trust": 1.1, "url": "http://lists.apple.com/archives/security-announce/2010//nov/msg00000.html" }, { "trust": 1.1, "url": "http://support.apple.com/kb/ht4435" }, { "trust": 1.1, "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a13294" }, { "trust": 1.1, "url": "http://www.redhat.com/support/errata/rhsa-2010-0829.html" }, { "trust": 1.1, "url": "http://www.redhat.com/support/errata/rhsa-2010-0834.html" }, { "trust": 1.1, "url": "http://www.redhat.com/support/errata/rhsa-2010-0867.html" }, { "trust": 1.1, "url": "http://www.redhat.com/support/errata/rhsa-2010-0934.html" }, { "trust": 1.1, "url": "http://www.securitytracker.com/id?1024659" }, { "trust": 1.1, "url": "http://www.securitytracker.com/id?1024660" }, { "trust": 1.1, "url": "http://secunia.com/advisories/42183" }, { "trust": 1.1, "url": "http://secunia.com/advisories/42401" }, { "trust": 1.1, "url": "http://secunia.com/advisories/42926" }, { "trust": 1.1, "url": "http://secunia.com/advisories/43025" }, { "trust": 1.1, "url": "http://secunia.com/advisories/43026" }, { "trust": 1.1, "url": "http://securityreason.com/securityalert/8210" }, { "trust": 1.1, "url": "http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00002.html" }, { "trust": 1.1, "url": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00001.html" }, { "trust": 1.1, "url": "http://www.turbolinux.co.jp/security/2011/tlsa-2011-2j.txt" }, { "trust": 1.1, "url": "http://www.vupen.com/english/advisories/2010/2906" }, { "trust": 1.1, "url": "http://www.vupen.com/english/advisories/2010/2918" }, { "trust": 1.1, "url": "http://www.vupen.com/english/advisories/2010/3111" }, { "trust": 1.1, "url": "http://www.vupen.com/english/advisories/2011/0173" }, { "trust": 1.1, "url": "http://www.vupen.com/english/advisories/2011/0191" }, { "trust": 1.1, "url": "http://www.vupen.com/english/advisories/2011/0192" }, { "trust": 1.1, "url": "http://www.vupen.com/english/advisories/2011/0344" }, { "trust": 1.0, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3654" }, { "trust": 0.8, "url": "http://www.ipa.go.jp/security/ciadr/vul/20101105-adobe.html" }, { "trust": 0.8, "url": "https://www.jpcert.or.jp/at/2010/at100029.txt" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnvu298081" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnvu331391" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2010-3654" }, { "trust": 0.8, "url": "http://www.vupen.com/english/advisories/2010/2810" }, { "trust": 0.8, "url": "http://www.vupen.com/english/advisories/2010/2811" }, { "trust": 0.8, "url": "http://www.npa.go.jp/cyberpolice/#topics" }, { "trust": 0.3, "url": "http://www.adobe.com" }, { "trust": 0.2, "url": "http://creativecommons.org/licenses/by-sa/2.5" }, { "trust": 0.2, "url": "http://security.gentoo.org/" }, { "trust": 0.2, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2884" }, { "trust": 0.2, "url": "https://bugs.gentoo.org." }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-2182" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3639" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2181" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2161" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0187" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2174" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3644" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-2166" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2215" }, { "trust": 0.1, "url": "http://www.adobe.com/support/security/bulletins/apsb10-14.html" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2176" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-2171" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2162" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-2160" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-2181" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2008-4546" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-4546" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-1297" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-2163" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-2180" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2171" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2180" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-2176" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-2164" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2179" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2169" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3648" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2164" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-0187" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2163" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-0209" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2173" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-1297" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-3793" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2177" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3645" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-2179" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-2165" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-2172" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3976" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2216" }, { "trust": 0.1, "url": "http://www.adobe.com/support/security/bulletins/apsb10-16.html" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3647" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-2173" }, { "trust": 0.1, "url": "http://www.adobe.com/support/security/bulletins/apsb10-06.html" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2172" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-3793" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2160" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2213" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2186" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2184" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0186" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2167" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3646" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-2169" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2175" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2214" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2178" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2165" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2188" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2189" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3643" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-2161" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-0186" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3636" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0209" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2166" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3641" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2185" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-2174" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3650" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2183" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-2178" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-2170" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-2177" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3652" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-2162" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3640" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2170" }, { "trust": 0.1, "url": "http://www.adobe.com/support/security/bulletins/apsb10-22.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-2175" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2187" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3649" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-2167" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2182" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3642" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2890" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3620" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-3656" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-3621" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-3619" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-2889" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-2883" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-2890" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3629" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-3629" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3619" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-3625" }, { "trust": 0.1, "url": "http://www.adobe.com/support/security/bulletins/apsb10-21.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-4091" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-3628" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2883" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3625" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3626" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-3657" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3657" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3622" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3658" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3627" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-2884" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-3620" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-3632" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-3654" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3632" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2889" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-3622" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3656" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-2887" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3621" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3628" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-3626" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-3627" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-3658" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2887" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-4091" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-3630" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3630" } ], "sources": [ { "db": "CERT/CC", "id": "VU#298081" }, { "db": "VULHUB", "id": "VHN-46259" }, { "db": "BID", "id": "44504" }, { "db": "JVNDB", "id": "JVNDB-2010-002313" }, { "db": "PACKETSTORM", "id": "97735" }, { "db": "PACKETSTORM", "id": "97734" }, { "db": "CNNVD", "id": "CNNVD-201010-426" }, { "db": "NVD", "id": "CVE-2010-3654" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CERT/CC", "id": "VU#298081" }, { "db": "VULHUB", "id": "VHN-46259" }, { "db": "BID", "id": "44504" }, { "db": "JVNDB", "id": "JVNDB-2010-002313" }, { "db": "PACKETSTORM", "id": "97735" }, { "db": "PACKETSTORM", "id": "97734" }, { "db": "CNNVD", "id": "CNNVD-201010-426" }, { "db": "NVD", "id": "CVE-2010-3654" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2010-10-28T00:00:00", "db": "CERT/CC", "id": "VU#298081" }, { "date": "2010-10-29T00:00:00", "db": "VULHUB", "id": "VHN-46259" }, { "date": "2010-10-28T00:00:00", "db": "BID", "id": "44504" }, { "date": "2010-11-17T00:00:00", "db": "JVNDB", "id": "JVNDB-2010-002313" }, { "date": "2011-01-21T21:15:05", "db": "PACKETSTORM", "id": "97735" }, { "date": "2011-01-21T21:14:13", "db": "PACKETSTORM", "id": "97734" }, { "date": "2010-10-29T00:00:00", "db": "CNNVD", "id": "CNNVD-201010-426" }, { "date": "2010-10-29T19:00:02.060000", "db": "NVD", "id": "CVE-2010-3654" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2010-11-17T00:00:00", "db": "CERT/CC", "id": "VU#298081" }, { "date": "2017-09-19T00:00:00", "db": "VULHUB", "id": "VHN-46259" }, { "date": "2015-03-19T08:46:00", "db": "BID", "id": "44504" }, { "date": "2011-02-25T00:00:00", "db": "JVNDB", "id": "JVNDB-2010-002313" }, { "date": "2011-07-08T00:00:00", "db": "CNNVD", "id": "CNNVD-201010-426" }, { "date": "2017-09-19T01:31:31.003000", "db": "NVD", "id": "CVE-2010-3654" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "PACKETSTORM", "id": "97735" }, { "db": "CNNVD", "id": "CNNVD-201010-426" } ], "trust": 0.7 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Adobe Flash code execution vulnerability", "sources": [ { "db": "CERT/CC", "id": "VU#298081" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer overflow", "sources": [ { "db": "CNNVD", "id": "CNNVD-201010-426" } ], "trust": 0.6 } }
rhsa-2010_0867
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An updated Adobe Flash Player package that fixes multiple security issues\nis now available for Red Hat Enterprise Linux 6 Supplementary.\n\nThe Red Hat Security Response Team has rated this update as having critical\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash\nPlayer web browser plug-in.\n\nThis update fixes multiple vulnerabilities in Adobe Flash Player. These\nvulnerabilities are detailed on the Adobe security page APSB10-26, listed\nin the References section.\n\nMultiple security flaws were found in the way flash-plugin displayed\ncertain SWF content. An attacker could use these flaws to create a\nspecially-crafted SWF file that would cause flash-plugin to crash or,\npotentially, execute arbitrary code when the victim loaded a page\ncontaining the specially-crafted SWF content. (CVE-2010-3639,\nCVE-2010-3640, CVE-2010-3641, CVE-2010-3642, CVE-2010-3643, CVE-2010-3644,\nCVE-2010-3645, CVE-2010-3646, CVE-2010-3647, CVE-2010-3648, CVE-2010-3649,\nCVE-2010-3650, CVE-2010-3652, CVE-2010-3654)\n\nAn input validation flaw was discovered in flash-plugin. Certain server\nencodings could lead to a bypass of cross-domain policy file restrictions,\npossibly leading to cross-domain information disclosure. (CVE-2010-3636)\n\nDuring testing, it was discovered that there were regressions with Flash\nPlayer on certain sites, such as fullscreen playback on YouTube. Despite\nthese regressions, we feel these security flaws are serious enough to\nupdate the package with what Adobe has provided.\n\nAll users of Adobe Flash Player should install this updated package, which\nupgrades Flash Player to version 10.1.102.64.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2010:0867", "url": "https://access.redhat.com/errata/RHSA-2010:0867" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#critical", "url": "https://access.redhat.com/security/updates/classification/#critical" }, { "category": "external", "summary": "http://www.adobe.com/support/security/bulletins/apsb10-26.html", "url": "http://www.adobe.com/support/security/bulletins/apsb10-26.html" }, { "category": "external", "summary": "647525", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=647525" }, { "category": "external", "summary": "649938", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=649938" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2010/rhsa-2010_0867.json" } ], "title": "Red Hat Security Advisory: flash-plugin security update", "tracking": { "current_release_date": "2024-11-14T11:27:53+00:00", "generator": { "date": "2024-11-14T11:27:53+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.0" } }, "id": "RHSA-2010:0867", "initial_release_date": "2010-11-10T19:00:00+00:00", "revision_history": [ { "date": "2010-11-10T19:00:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2010-11-09T14:00:29+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-14T11:27:53+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:6" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Supplementary (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:6" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:6" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux Supplementary" }, { "branches": [ { "category": "product_version", "name": "flash-plugin-0:10.1.102.64-1.el6.i686", "product": { "name": "flash-plugin-0:10.1.102.64-1.el6.i686", "product_id": "flash-plugin-0:10.1.102.64-1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/flash-plugin@10.1.102.64-1.el6?arch=i686" } } } ], "category": "architecture", "name": "i686" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "flash-plugin-0:10.1.102.64-1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:flash-plugin-0:10.1.102.64-1.el6.i686" }, "product_reference": "flash-plugin-0:10.1.102.64-1.el6.i686", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "flash-plugin-0:10.1.102.64-1.el6.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:flash-plugin-0:10.1.102.64-1.el6.i686" }, "product_reference": "flash-plugin-0:10.1.102.64-1.el6.i686", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "flash-plugin-0:10.1.102.64-1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:flash-plugin-0:10.1.102.64-1.el6.i686" }, "product_reference": "flash-plugin-0:10.1.102.64-1.el6.i686", "relates_to_product_reference": "6Workstation-Supplementary" } ] }, "vulnerabilities": [ { "cve": "CVE-2010-3636", "discovery_date": "2010-11-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "649938" } ], "notes": [ { "category": "description", "text": "Adobe Flash Player before 9.0.289.0 and 10.x before 10.1.102.64 on Windows, Mac OS X, Linux, and Solaris, and 10.1.95.1 on Android, does not properly handle unspecified encodings during the parsing of a cross-domain policy file, which allows remote web servers to bypass intended access restrictions via unknown vectors.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: security bulletin APSB10-26", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary:flash-plugin-0:10.1.102.64-1.el6.i686", "6Server-Supplementary:flash-plugin-0:10.1.102.64-1.el6.i686", "6Workstation-Supplementary:flash-plugin-0:10.1.102.64-1.el6.i686" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3636" }, { "category": "external", "summary": "RHBZ#649938", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=649938" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3636", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3636" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3636", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3636" } ], "release_date": "2010-11-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-11-10T19:00:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "6Client-Supplementary:flash-plugin-0:10.1.102.64-1.el6.i686", "6Server-Supplementary:flash-plugin-0:10.1.102.64-1.el6.i686", "6Workstation-Supplementary:flash-plugin-0:10.1.102.64-1.el6.i686" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0867" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "6Client-Supplementary:flash-plugin-0:10.1.102.64-1.el6.i686", "6Server-Supplementary:flash-plugin-0:10.1.102.64-1.el6.i686", "6Workstation-Supplementary:flash-plugin-0:10.1.102.64-1.el6.i686" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "flash-plugin: security bulletin APSB10-26" }, { "cve": "CVE-2010-3639", "discovery_date": "2010-11-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "649938" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in Adobe Flash Player before 9.0.289.0 and 10.x before 10.1.102.64 on Windows, Mac OS X, Linux, and Solaris, and 10.1.95.1 on Android, allows attackers to cause a denial of service or possibly execute arbitrary code via unknown vectors.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: security bulletin APSB10-26", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary:flash-plugin-0:10.1.102.64-1.el6.i686", "6Server-Supplementary:flash-plugin-0:10.1.102.64-1.el6.i686", "6Workstation-Supplementary:flash-plugin-0:10.1.102.64-1.el6.i686" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3639" }, { "category": "external", "summary": "RHBZ#649938", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=649938" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3639", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3639" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3639", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3639" } ], "release_date": "2010-11-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-11-10T19:00:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "6Client-Supplementary:flash-plugin-0:10.1.102.64-1.el6.i686", "6Server-Supplementary:flash-plugin-0:10.1.102.64-1.el6.i686", "6Workstation-Supplementary:flash-plugin-0:10.1.102.64-1.el6.i686" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0867" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "6Client-Supplementary:flash-plugin-0:10.1.102.64-1.el6.i686", "6Server-Supplementary:flash-plugin-0:10.1.102.64-1.el6.i686", "6Workstation-Supplementary:flash-plugin-0:10.1.102.64-1.el6.i686" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "flash-plugin: security bulletin APSB10-26" }, { "cve": "CVE-2010-3640", "discovery_date": "2010-11-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "649938" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in Adobe Flash Player before 9.0.289.0 and 10.x before 10.1.102.64 on Windows, Mac OS X, Linux, and Solaris, and 10.1.95.1 on Android, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unknown vectors, a different vulnerability than CVE-2010-3641, CVE-2010-3642, CVE-2010-3643, CVE-2010-3644, CVE-2010-3645, CVE-2010-3646, CVE-2010-3647, CVE-2010-3648, CVE-2010-3649, CVE-2010-3650, and CVE-2010-3652.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: security bulletin APSB10-26", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary:flash-plugin-0:10.1.102.64-1.el6.i686", "6Server-Supplementary:flash-plugin-0:10.1.102.64-1.el6.i686", "6Workstation-Supplementary:flash-plugin-0:10.1.102.64-1.el6.i686" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3640" }, { "category": "external", "summary": "RHBZ#649938", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=649938" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3640", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3640" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3640", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3640" } ], "release_date": "2010-11-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-11-10T19:00:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "6Client-Supplementary:flash-plugin-0:10.1.102.64-1.el6.i686", "6Server-Supplementary:flash-plugin-0:10.1.102.64-1.el6.i686", "6Workstation-Supplementary:flash-plugin-0:10.1.102.64-1.el6.i686" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0867" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "6Client-Supplementary:flash-plugin-0:10.1.102.64-1.el6.i686", "6Server-Supplementary:flash-plugin-0:10.1.102.64-1.el6.i686", "6Workstation-Supplementary:flash-plugin-0:10.1.102.64-1.el6.i686" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "flash-plugin: security bulletin APSB10-26" }, { "cve": "CVE-2010-3641", "discovery_date": "2010-11-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "649938" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in Adobe Flash Player before 9.0.289.0 and 10.x before 10.1.102.64 on Windows, Mac OS X, Linux, and Solaris, and 10.1.95.1 on Android, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unknown vectors, a different vulnerability than CVE-2010-3640, CVE-2010-3642, CVE-2010-3643, CVE-2010-3644, CVE-2010-3645, CVE-2010-3646, CVE-2010-3647, CVE-2010-3648, CVE-2010-3649, CVE-2010-3650, and CVE-2010-3652.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: security bulletin APSB10-26", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary:flash-plugin-0:10.1.102.64-1.el6.i686", "6Server-Supplementary:flash-plugin-0:10.1.102.64-1.el6.i686", "6Workstation-Supplementary:flash-plugin-0:10.1.102.64-1.el6.i686" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3641" }, { "category": "external", "summary": "RHBZ#649938", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=649938" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3641", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3641" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3641", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3641" } ], "release_date": "2010-11-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-11-10T19:00:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "6Client-Supplementary:flash-plugin-0:10.1.102.64-1.el6.i686", "6Server-Supplementary:flash-plugin-0:10.1.102.64-1.el6.i686", "6Workstation-Supplementary:flash-plugin-0:10.1.102.64-1.el6.i686" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0867" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "6Client-Supplementary:flash-plugin-0:10.1.102.64-1.el6.i686", "6Server-Supplementary:flash-plugin-0:10.1.102.64-1.el6.i686", "6Workstation-Supplementary:flash-plugin-0:10.1.102.64-1.el6.i686" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "flash-plugin: security bulletin APSB10-26" }, { "cve": "CVE-2010-3642", "discovery_date": "2010-11-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "649938" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in Adobe Flash Player before 9.0.289.0 and 10.x before 10.1.102.64 on Windows, Mac OS X, Linux, and Solaris, and 10.1.95.1 on Android, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unknown vectors, a different vulnerability than CVE-2010-3640, CVE-2010-3641, CVE-2010-3643, CVE-2010-3644, CVE-2010-3645, CVE-2010-3646, CVE-2010-3647, CVE-2010-3648, CVE-2010-3649, CVE-2010-3650, and CVE-2010-3652.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: security bulletin APSB10-26", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary:flash-plugin-0:10.1.102.64-1.el6.i686", "6Server-Supplementary:flash-plugin-0:10.1.102.64-1.el6.i686", "6Workstation-Supplementary:flash-plugin-0:10.1.102.64-1.el6.i686" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3642" }, { "category": "external", "summary": "RHBZ#649938", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=649938" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3642", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3642" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3642", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3642" } ], "release_date": "2010-11-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-11-10T19:00:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "6Client-Supplementary:flash-plugin-0:10.1.102.64-1.el6.i686", "6Server-Supplementary:flash-plugin-0:10.1.102.64-1.el6.i686", "6Workstation-Supplementary:flash-plugin-0:10.1.102.64-1.el6.i686" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0867" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "6Client-Supplementary:flash-plugin-0:10.1.102.64-1.el6.i686", "6Server-Supplementary:flash-plugin-0:10.1.102.64-1.el6.i686", "6Workstation-Supplementary:flash-plugin-0:10.1.102.64-1.el6.i686" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "flash-plugin: security bulletin APSB10-26" }, { "cve": "CVE-2010-3643", "discovery_date": "2010-11-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "649938" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in Adobe Flash Player before 9.0.289.0 and 10.x before 10.1.102.64 on Windows, Mac OS X, Linux, and Solaris, and 10.1.95.1 on Android, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unknown vectors, a different vulnerability than CVE-2010-3640, CVE-2010-3641, CVE-2010-3642, CVE-2010-3644, CVE-2010-3645, CVE-2010-3646, CVE-2010-3647, CVE-2010-3648, CVE-2010-3649, CVE-2010-3650, and CVE-2010-3652.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: security bulletin APSB10-26", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary:flash-plugin-0:10.1.102.64-1.el6.i686", "6Server-Supplementary:flash-plugin-0:10.1.102.64-1.el6.i686", "6Workstation-Supplementary:flash-plugin-0:10.1.102.64-1.el6.i686" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3643" }, { "category": "external", "summary": "RHBZ#649938", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=649938" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3643", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3643" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3643", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3643" } ], "release_date": "2010-11-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-11-10T19:00:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "6Client-Supplementary:flash-plugin-0:10.1.102.64-1.el6.i686", "6Server-Supplementary:flash-plugin-0:10.1.102.64-1.el6.i686", "6Workstation-Supplementary:flash-plugin-0:10.1.102.64-1.el6.i686" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0867" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "6Client-Supplementary:flash-plugin-0:10.1.102.64-1.el6.i686", "6Server-Supplementary:flash-plugin-0:10.1.102.64-1.el6.i686", "6Workstation-Supplementary:flash-plugin-0:10.1.102.64-1.el6.i686" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "flash-plugin: security bulletin APSB10-26" }, { "cve": "CVE-2010-3644", "discovery_date": "2010-11-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "649938" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in Adobe Flash Player before 9.0.289.0 and 10.x before 10.1.102.64 on Windows, Mac OS X, Linux, and Solaris, and 10.1.95.1 on Android, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unknown vectors, a different vulnerability than CVE-2010-3640, CVE-2010-3641, CVE-2010-3642, CVE-2010-3643, CVE-2010-3645, CVE-2010-3646, CVE-2010-3647, CVE-2010-3648, CVE-2010-3649, CVE-2010-3650, and CVE-2010-3652.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: security bulletin APSB10-26", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary:flash-plugin-0:10.1.102.64-1.el6.i686", "6Server-Supplementary:flash-plugin-0:10.1.102.64-1.el6.i686", "6Workstation-Supplementary:flash-plugin-0:10.1.102.64-1.el6.i686" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3644" }, { "category": "external", "summary": "RHBZ#649938", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=649938" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3644", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3644" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3644", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3644" } ], "release_date": "2010-11-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-11-10T19:00:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "6Client-Supplementary:flash-plugin-0:10.1.102.64-1.el6.i686", "6Server-Supplementary:flash-plugin-0:10.1.102.64-1.el6.i686", "6Workstation-Supplementary:flash-plugin-0:10.1.102.64-1.el6.i686" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0867" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "6Client-Supplementary:flash-plugin-0:10.1.102.64-1.el6.i686", "6Server-Supplementary:flash-plugin-0:10.1.102.64-1.el6.i686", "6Workstation-Supplementary:flash-plugin-0:10.1.102.64-1.el6.i686" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "flash-plugin: security bulletin APSB10-26" }, { "cve": "CVE-2010-3645", "discovery_date": "2010-11-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "649938" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in Adobe Flash Player before 9.0.289.0 and 10.x before 10.1.102.64 on Windows, Mac OS X, Linux, and Solaris, and 10.1.95.1 on Android, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unknown vectors, a different vulnerability than CVE-2010-3640, CVE-2010-3641, CVE-2010-3642, CVE-2010-3643, CVE-2010-3644, CVE-2010-3646, CVE-2010-3647, CVE-2010-3648, CVE-2010-3649, CVE-2010-3650, and CVE-2010-3652.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: security bulletin APSB10-26", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary:flash-plugin-0:10.1.102.64-1.el6.i686", "6Server-Supplementary:flash-plugin-0:10.1.102.64-1.el6.i686", "6Workstation-Supplementary:flash-plugin-0:10.1.102.64-1.el6.i686" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3645" }, { "category": "external", "summary": "RHBZ#649938", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=649938" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3645", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3645" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3645", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3645" } ], "release_date": "2010-11-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-11-10T19:00:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "6Client-Supplementary:flash-plugin-0:10.1.102.64-1.el6.i686", "6Server-Supplementary:flash-plugin-0:10.1.102.64-1.el6.i686", "6Workstation-Supplementary:flash-plugin-0:10.1.102.64-1.el6.i686" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0867" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "6Client-Supplementary:flash-plugin-0:10.1.102.64-1.el6.i686", "6Server-Supplementary:flash-plugin-0:10.1.102.64-1.el6.i686", "6Workstation-Supplementary:flash-plugin-0:10.1.102.64-1.el6.i686" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "flash-plugin: security bulletin APSB10-26" }, { "cve": "CVE-2010-3646", "discovery_date": "2010-11-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "649938" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in Adobe Flash Player before 9.0.289.0 and 10.x before 10.1.102.64 on Windows, Mac OS X, Linux, and Solaris, and 10.1.95.1 on Android, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unknown vectors, a different vulnerability than CVE-2010-3640, CVE-2010-3641, CVE-2010-3642, CVE-2010-3643, CVE-2010-3644, CVE-2010-3645, CVE-2010-3647, CVE-2010-3648, CVE-2010-3649, CVE-2010-3650, and CVE-2010-3652.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: security bulletin APSB10-26", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary:flash-plugin-0:10.1.102.64-1.el6.i686", "6Server-Supplementary:flash-plugin-0:10.1.102.64-1.el6.i686", "6Workstation-Supplementary:flash-plugin-0:10.1.102.64-1.el6.i686" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3646" }, { "category": "external", "summary": "RHBZ#649938", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=649938" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3646", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3646" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3646", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3646" } ], "release_date": "2010-11-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-11-10T19:00:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "6Client-Supplementary:flash-plugin-0:10.1.102.64-1.el6.i686", "6Server-Supplementary:flash-plugin-0:10.1.102.64-1.el6.i686", "6Workstation-Supplementary:flash-plugin-0:10.1.102.64-1.el6.i686" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0867" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "6Client-Supplementary:flash-plugin-0:10.1.102.64-1.el6.i686", "6Server-Supplementary:flash-plugin-0:10.1.102.64-1.el6.i686", "6Workstation-Supplementary:flash-plugin-0:10.1.102.64-1.el6.i686" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "flash-plugin: security bulletin APSB10-26" }, { "cve": "CVE-2010-3647", "discovery_date": "2010-11-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "649938" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in Adobe Flash Player before 9.0.289.0 and 10.x before 10.1.102.64 on Windows, Mac OS X, Linux, and Solaris, and 10.1.95.1 on Android, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unknown vectors, a different vulnerability than CVE-2010-3640, CVE-2010-3641, CVE-2010-3642, CVE-2010-3643, CVE-2010-3644, CVE-2010-3645, CVE-2010-3646, CVE-2010-3648, CVE-2010-3649, CVE-2010-3650, and CVE-2010-3652.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: security bulletin APSB10-26", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary:flash-plugin-0:10.1.102.64-1.el6.i686", "6Server-Supplementary:flash-plugin-0:10.1.102.64-1.el6.i686", "6Workstation-Supplementary:flash-plugin-0:10.1.102.64-1.el6.i686" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3647" }, { "category": "external", "summary": "RHBZ#649938", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=649938" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3647", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3647" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3647", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3647" } ], "release_date": "2010-11-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-11-10T19:00:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "6Client-Supplementary:flash-plugin-0:10.1.102.64-1.el6.i686", "6Server-Supplementary:flash-plugin-0:10.1.102.64-1.el6.i686", "6Workstation-Supplementary:flash-plugin-0:10.1.102.64-1.el6.i686" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0867" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "6Client-Supplementary:flash-plugin-0:10.1.102.64-1.el6.i686", "6Server-Supplementary:flash-plugin-0:10.1.102.64-1.el6.i686", "6Workstation-Supplementary:flash-plugin-0:10.1.102.64-1.el6.i686" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "flash-plugin: security bulletin APSB10-26" }, { "cve": "CVE-2010-3648", "discovery_date": "2010-11-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "649938" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in Adobe Flash Player before 9.0.289.0 and 10.x before 10.1.102.64 on Windows, Mac OS X, Linux, and Solaris, and 10.1.95.1 on Android, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unknown vectors, a different vulnerability than CVE-2010-3640, CVE-2010-3641, CVE-2010-3642, CVE-2010-3643, CVE-2010-3644, CVE-2010-3645, CVE-2010-3646, CVE-2010-3647, CVE-2010-3649, CVE-2010-3650, and CVE-2010-3652.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: security bulletin APSB10-26", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary:flash-plugin-0:10.1.102.64-1.el6.i686", "6Server-Supplementary:flash-plugin-0:10.1.102.64-1.el6.i686", "6Workstation-Supplementary:flash-plugin-0:10.1.102.64-1.el6.i686" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3648" }, { "category": "external", "summary": "RHBZ#649938", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=649938" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3648", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3648" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3648", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3648" } ], "release_date": "2010-11-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-11-10T19:00:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "6Client-Supplementary:flash-plugin-0:10.1.102.64-1.el6.i686", "6Server-Supplementary:flash-plugin-0:10.1.102.64-1.el6.i686", "6Workstation-Supplementary:flash-plugin-0:10.1.102.64-1.el6.i686" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0867" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "6Client-Supplementary:flash-plugin-0:10.1.102.64-1.el6.i686", "6Server-Supplementary:flash-plugin-0:10.1.102.64-1.el6.i686", "6Workstation-Supplementary:flash-plugin-0:10.1.102.64-1.el6.i686" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "flash-plugin: security bulletin APSB10-26" }, { "cve": "CVE-2010-3649", "discovery_date": "2010-11-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "649938" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in Adobe Flash Player before 9.0.289.0 and 10.x before 10.1.102.64 on Windows, Mac OS X, Linux, and Solaris, and 10.1.95.1 on Android, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unknown vectors, a different vulnerability than CVE-2010-3640, CVE-2010-3641, CVE-2010-3642, CVE-2010-3643, CVE-2010-3644, CVE-2010-3645, CVE-2010-3646, CVE-2010-3647, CVE-2010-3648, CVE-2010-3650, and CVE-2010-3652.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: security bulletin APSB10-26", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary:flash-plugin-0:10.1.102.64-1.el6.i686", "6Server-Supplementary:flash-plugin-0:10.1.102.64-1.el6.i686", "6Workstation-Supplementary:flash-plugin-0:10.1.102.64-1.el6.i686" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3649" }, { "category": "external", "summary": "RHBZ#649938", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=649938" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3649", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3649" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3649", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3649" } ], "release_date": "2010-11-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-11-10T19:00:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "6Client-Supplementary:flash-plugin-0:10.1.102.64-1.el6.i686", "6Server-Supplementary:flash-plugin-0:10.1.102.64-1.el6.i686", "6Workstation-Supplementary:flash-plugin-0:10.1.102.64-1.el6.i686" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0867" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "6Client-Supplementary:flash-plugin-0:10.1.102.64-1.el6.i686", "6Server-Supplementary:flash-plugin-0:10.1.102.64-1.el6.i686", "6Workstation-Supplementary:flash-plugin-0:10.1.102.64-1.el6.i686" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "flash-plugin: security bulletin APSB10-26" }, { "cve": "CVE-2010-3650", "discovery_date": "2010-11-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "649938" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in Adobe Flash Player before 9.0.289.0 and 10.x before 10.1.102.64 on Windows, Mac OS X, Linux, and Solaris, and 10.1.95.1 on Android, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unknown vectors, a different vulnerability than CVE-2010-3640, CVE-2010-3641, CVE-2010-3642, CVE-2010-3643, CVE-2010-3644, CVE-2010-3645, CVE-2010-3646, CVE-2010-3647, CVE-2010-3648, CVE-2010-3649, and CVE-2010-3652.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: security bulletin APSB10-26", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary:flash-plugin-0:10.1.102.64-1.el6.i686", "6Server-Supplementary:flash-plugin-0:10.1.102.64-1.el6.i686", "6Workstation-Supplementary:flash-plugin-0:10.1.102.64-1.el6.i686" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3650" }, { "category": "external", "summary": "RHBZ#649938", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=649938" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3650", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3650" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3650", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3650" } ], "release_date": "2010-11-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-11-10T19:00:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "6Client-Supplementary:flash-plugin-0:10.1.102.64-1.el6.i686", "6Server-Supplementary:flash-plugin-0:10.1.102.64-1.el6.i686", "6Workstation-Supplementary:flash-plugin-0:10.1.102.64-1.el6.i686" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0867" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "6Client-Supplementary:flash-plugin-0:10.1.102.64-1.el6.i686", "6Server-Supplementary:flash-plugin-0:10.1.102.64-1.el6.i686", "6Workstation-Supplementary:flash-plugin-0:10.1.102.64-1.el6.i686" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "flash-plugin: security bulletin APSB10-26" }, { "cve": "CVE-2010-3652", "discovery_date": "2010-11-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "649938" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in Adobe Flash Player before 9.0.289.0 and 10.x before 10.1.102.64 on Windows, Mac OS X, Linux, and Solaris, and 10.1.95.1 on Android, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unknown vectors, a different vulnerability than CVE-2010-3640, CVE-2010-3641, CVE-2010-3642, CVE-2010-3643, CVE-2010-3644, CVE-2010-3645, CVE-2010-3646, CVE-2010-3647, CVE-2010-3648, CVE-2010-3649, and CVE-2010-3650.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: security bulletin APSB10-26", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary:flash-plugin-0:10.1.102.64-1.el6.i686", "6Server-Supplementary:flash-plugin-0:10.1.102.64-1.el6.i686", "6Workstation-Supplementary:flash-plugin-0:10.1.102.64-1.el6.i686" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3652" }, { "category": "external", "summary": "RHBZ#649938", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=649938" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3652", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3652" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3652", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3652" } ], "release_date": "2010-11-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-11-10T19:00:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "6Client-Supplementary:flash-plugin-0:10.1.102.64-1.el6.i686", "6Server-Supplementary:flash-plugin-0:10.1.102.64-1.el6.i686", "6Workstation-Supplementary:flash-plugin-0:10.1.102.64-1.el6.i686" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0867" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "6Client-Supplementary:flash-plugin-0:10.1.102.64-1.el6.i686", "6Server-Supplementary:flash-plugin-0:10.1.102.64-1.el6.i686", "6Workstation-Supplementary:flash-plugin-0:10.1.102.64-1.el6.i686" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "flash-plugin: security bulletin APSB10-26" }, { "cve": "CVE-2010-3654", "discovery_date": "2010-10-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "647525" } ], "notes": [ { "category": "description", "text": "Adobe Flash Player before 9.0.289.0 and 10.x before 10.1.102.64 on Windows, Mac OS X, Linux, and Solaris and 10.1.95.1 on Android, and authplay.dll (aka AuthPlayLib.bundle or libauthplay.so.0.0.0) in Adobe Reader and Acrobat 9.x through 9.4, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via crafted SWF content, as exploited in the wild in October 2010.", "title": "Vulnerability description" }, { "category": "summary", "text": "acroread/flash-plugin: critical vulnerablility (APSA10-05, APSB10-26)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary:flash-plugin-0:10.1.102.64-1.el6.i686", "6Server-Supplementary:flash-plugin-0:10.1.102.64-1.el6.i686", "6Workstation-Supplementary:flash-plugin-0:10.1.102.64-1.el6.i686" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3654" }, { "category": "external", "summary": "RHBZ#647525", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=647525" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3654", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3654" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3654", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3654" } ], "release_date": "2010-10-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-11-10T19:00:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "6Client-Supplementary:flash-plugin-0:10.1.102.64-1.el6.i686", "6Server-Supplementary:flash-plugin-0:10.1.102.64-1.el6.i686", "6Workstation-Supplementary:flash-plugin-0:10.1.102.64-1.el6.i686" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0867" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "6Client-Supplementary:flash-plugin-0:10.1.102.64-1.el6.i686", "6Server-Supplementary:flash-plugin-0:10.1.102.64-1.el6.i686", "6Workstation-Supplementary:flash-plugin-0:10.1.102.64-1.el6.i686" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "acroread/flash-plugin: critical vulnerablility (APSA10-05, APSB10-26)" } ] }
rhsa-2010_0834
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An updated Adobe Flash Player package that fixes multiple security issues\nis now available for Red Hat Enterprise Linux 4 Extras.\n\nThe Red Hat Security Response Team has rated this update as having critical\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash\nPlayer web browser plug-in.\n\nThis update fixes multiple vulnerabilities in Adobe Flash Player. These\nvulnerabilities are detailed on the Adobe security page APSB10-26, listed\nin the References section.\n\nMultiple security flaws were found in the way flash-plugin displayed\ncertain SWF content. An attacker could use these flaws to create a\nspecially-crafted SWF file that would cause flash-plugin to crash or,\npotentially, execute arbitrary code when the victim loaded a page\ncontaining the specially-crafted SWF content. (CVE-2010-3639,\nCVE-2010-3640, CVE-2010-3641, CVE-2010-3642, CVE-2010-3643, CVE-2010-3644,\nCVE-2010-3645, CVE-2010-3646, CVE-2010-3647, CVE-2010-3648, CVE-2010-3649,\nCVE-2010-3650, CVE-2010-3652, CVE-2010-3654)\n\nAn input validation flaw was discovered in flash-plugin. Certain server\nencodings could lead to a bypass of cross-domain policy file restrictions,\npossibly leading to cross-domain information disclosure. (CVE-2010-3636)\n\nAll users of Adobe Flash Player should install this updated package, which\nupgrades Flash Player to version 9.0.289.0.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2010:0834", "url": "https://access.redhat.com/errata/RHSA-2010:0834" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#critical", "url": "https://access.redhat.com/security/updates/classification/#critical" }, { "category": "external", "summary": "http://www.adobe.com/support/security/bulletins/apsb10-26.html", "url": "http://www.adobe.com/support/security/bulletins/apsb10-26.html" }, { "category": "external", "summary": "647525", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=647525" }, { "category": "external", "summary": "649938", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=649938" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2010/rhsa-2010_0834.json" } ], "title": "Red Hat Security Advisory: flash-plugin security update", "tracking": { "current_release_date": "2024-11-14T11:27:48+00:00", "generator": { "date": "2024-11-14T11:27:48+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.0" } }, "id": "RHSA-2010:0834", "initial_release_date": "2010-11-08T16:25:00+00:00", "revision_history": [ { "date": "2010-11-08T16:25:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2010-11-08T11:25:36+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-14T11:27:48+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 4 Extras", "product": { "name": "Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:4" } } }, { "category": "product_name", "name": "Red Hat Desktop version 4 Extras", "product": { "name": "Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:4" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 4 Extras", "product": { "name": "Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:4" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 4 Extras", "product": { "name": "Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:4" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux Supplementary" }, { "branches": [ { "category": "product_version", "name": "flash-plugin-0:9.0.289.0-1.el4.i386", "product": { "name": "flash-plugin-0:9.0.289.0-1.el4.i386", "product_id": "flash-plugin-0:9.0.289.0-1.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/flash-plugin@9.0.289.0-1.el4?arch=i386" } } } ], "category": "architecture", "name": "i386" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "flash-plugin-0:9.0.289.0-1.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:flash-plugin-0:9.0.289.0-1.el4.i386" }, "product_reference": "flash-plugin-0:9.0.289.0-1.el4.i386", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "flash-plugin-0:9.0.289.0-1.el4.i386 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:flash-plugin-0:9.0.289.0-1.el4.i386" }, "product_reference": "flash-plugin-0:9.0.289.0-1.el4.i386", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "flash-plugin-0:9.0.289.0-1.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:flash-plugin-0:9.0.289.0-1.el4.i386" }, "product_reference": "flash-plugin-0:9.0.289.0-1.el4.i386", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "flash-plugin-0:9.0.289.0-1.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:flash-plugin-0:9.0.289.0-1.el4.i386" }, "product_reference": "flash-plugin-0:9.0.289.0-1.el4.i386", "relates_to_product_reference": "4WS-LACD" } ] }, "vulnerabilities": [ { "cve": "CVE-2010-3636", "discovery_date": "2010-11-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "649938" } ], "notes": [ { "category": "description", "text": "Adobe Flash Player before 9.0.289.0 and 10.x before 10.1.102.64 on Windows, Mac OS X, Linux, and Solaris, and 10.1.95.1 on Android, does not properly handle unspecified encodings during the parsing of a cross-domain policy file, which allows remote web servers to bypass intended access restrictions via unknown vectors.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: security bulletin APSB10-26", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:flash-plugin-0:9.0.289.0-1.el4.i386", "4Desktop-LACD:flash-plugin-0:9.0.289.0-1.el4.i386", "4ES-LACD:flash-plugin-0:9.0.289.0-1.el4.i386", "4WS-LACD:flash-plugin-0:9.0.289.0-1.el4.i386" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3636" }, { "category": "external", "summary": "RHBZ#649938", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=649938" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3636", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3636" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3636", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3636" } ], "release_date": "2010-11-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-11-08T16:25:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-LACD:flash-plugin-0:9.0.289.0-1.el4.i386", "4Desktop-LACD:flash-plugin-0:9.0.289.0-1.el4.i386", "4ES-LACD:flash-plugin-0:9.0.289.0-1.el4.i386", "4WS-LACD:flash-plugin-0:9.0.289.0-1.el4.i386" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0834" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-LACD:flash-plugin-0:9.0.289.0-1.el4.i386", "4Desktop-LACD:flash-plugin-0:9.0.289.0-1.el4.i386", "4ES-LACD:flash-plugin-0:9.0.289.0-1.el4.i386", "4WS-LACD:flash-plugin-0:9.0.289.0-1.el4.i386" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "flash-plugin: security bulletin APSB10-26" }, { "cve": "CVE-2010-3639", "discovery_date": "2010-11-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "649938" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in Adobe Flash Player before 9.0.289.0 and 10.x before 10.1.102.64 on Windows, Mac OS X, Linux, and Solaris, and 10.1.95.1 on Android, allows attackers to cause a denial of service or possibly execute arbitrary code via unknown vectors.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: security bulletin APSB10-26", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:flash-plugin-0:9.0.289.0-1.el4.i386", "4Desktop-LACD:flash-plugin-0:9.0.289.0-1.el4.i386", "4ES-LACD:flash-plugin-0:9.0.289.0-1.el4.i386", "4WS-LACD:flash-plugin-0:9.0.289.0-1.el4.i386" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3639" }, { "category": "external", "summary": "RHBZ#649938", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=649938" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3639", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3639" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3639", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3639" } ], "release_date": "2010-11-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-11-08T16:25:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-LACD:flash-plugin-0:9.0.289.0-1.el4.i386", "4Desktop-LACD:flash-plugin-0:9.0.289.0-1.el4.i386", "4ES-LACD:flash-plugin-0:9.0.289.0-1.el4.i386", "4WS-LACD:flash-plugin-0:9.0.289.0-1.el4.i386" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0834" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-LACD:flash-plugin-0:9.0.289.0-1.el4.i386", "4Desktop-LACD:flash-plugin-0:9.0.289.0-1.el4.i386", "4ES-LACD:flash-plugin-0:9.0.289.0-1.el4.i386", "4WS-LACD:flash-plugin-0:9.0.289.0-1.el4.i386" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "flash-plugin: security bulletin APSB10-26" }, { "cve": "CVE-2010-3640", "discovery_date": "2010-11-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "649938" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in Adobe Flash Player before 9.0.289.0 and 10.x before 10.1.102.64 on Windows, Mac OS X, Linux, and Solaris, and 10.1.95.1 on Android, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unknown vectors, a different vulnerability than CVE-2010-3641, CVE-2010-3642, CVE-2010-3643, CVE-2010-3644, CVE-2010-3645, CVE-2010-3646, CVE-2010-3647, CVE-2010-3648, CVE-2010-3649, CVE-2010-3650, and CVE-2010-3652.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: security bulletin APSB10-26", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:flash-plugin-0:9.0.289.0-1.el4.i386", "4Desktop-LACD:flash-plugin-0:9.0.289.0-1.el4.i386", "4ES-LACD:flash-plugin-0:9.0.289.0-1.el4.i386", "4WS-LACD:flash-plugin-0:9.0.289.0-1.el4.i386" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3640" }, { "category": "external", "summary": "RHBZ#649938", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=649938" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3640", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3640" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3640", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3640" } ], "release_date": "2010-11-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-11-08T16:25:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-LACD:flash-plugin-0:9.0.289.0-1.el4.i386", "4Desktop-LACD:flash-plugin-0:9.0.289.0-1.el4.i386", "4ES-LACD:flash-plugin-0:9.0.289.0-1.el4.i386", "4WS-LACD:flash-plugin-0:9.0.289.0-1.el4.i386" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0834" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-LACD:flash-plugin-0:9.0.289.0-1.el4.i386", "4Desktop-LACD:flash-plugin-0:9.0.289.0-1.el4.i386", "4ES-LACD:flash-plugin-0:9.0.289.0-1.el4.i386", "4WS-LACD:flash-plugin-0:9.0.289.0-1.el4.i386" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "flash-plugin: security bulletin APSB10-26" }, { "cve": "CVE-2010-3641", "discovery_date": "2010-11-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "649938" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in Adobe Flash Player before 9.0.289.0 and 10.x before 10.1.102.64 on Windows, Mac OS X, Linux, and Solaris, and 10.1.95.1 on Android, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unknown vectors, a different vulnerability than CVE-2010-3640, CVE-2010-3642, CVE-2010-3643, CVE-2010-3644, CVE-2010-3645, CVE-2010-3646, CVE-2010-3647, CVE-2010-3648, CVE-2010-3649, CVE-2010-3650, and CVE-2010-3652.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: security bulletin APSB10-26", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:flash-plugin-0:9.0.289.0-1.el4.i386", "4Desktop-LACD:flash-plugin-0:9.0.289.0-1.el4.i386", "4ES-LACD:flash-plugin-0:9.0.289.0-1.el4.i386", "4WS-LACD:flash-plugin-0:9.0.289.0-1.el4.i386" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3641" }, { "category": "external", "summary": "RHBZ#649938", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=649938" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3641", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3641" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3641", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3641" } ], "release_date": "2010-11-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-11-08T16:25:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-LACD:flash-plugin-0:9.0.289.0-1.el4.i386", "4Desktop-LACD:flash-plugin-0:9.0.289.0-1.el4.i386", "4ES-LACD:flash-plugin-0:9.0.289.0-1.el4.i386", "4WS-LACD:flash-plugin-0:9.0.289.0-1.el4.i386" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0834" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-LACD:flash-plugin-0:9.0.289.0-1.el4.i386", "4Desktop-LACD:flash-plugin-0:9.0.289.0-1.el4.i386", "4ES-LACD:flash-plugin-0:9.0.289.0-1.el4.i386", "4WS-LACD:flash-plugin-0:9.0.289.0-1.el4.i386" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "flash-plugin: security bulletin APSB10-26" }, { "cve": "CVE-2010-3642", "discovery_date": "2010-11-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "649938" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in Adobe Flash Player before 9.0.289.0 and 10.x before 10.1.102.64 on Windows, Mac OS X, Linux, and Solaris, and 10.1.95.1 on Android, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unknown vectors, a different vulnerability than CVE-2010-3640, CVE-2010-3641, CVE-2010-3643, CVE-2010-3644, CVE-2010-3645, CVE-2010-3646, CVE-2010-3647, CVE-2010-3648, CVE-2010-3649, CVE-2010-3650, and CVE-2010-3652.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: security bulletin APSB10-26", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:flash-plugin-0:9.0.289.0-1.el4.i386", "4Desktop-LACD:flash-plugin-0:9.0.289.0-1.el4.i386", "4ES-LACD:flash-plugin-0:9.0.289.0-1.el4.i386", "4WS-LACD:flash-plugin-0:9.0.289.0-1.el4.i386" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3642" }, { "category": "external", "summary": "RHBZ#649938", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=649938" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3642", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3642" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3642", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3642" } ], "release_date": "2010-11-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-11-08T16:25:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-LACD:flash-plugin-0:9.0.289.0-1.el4.i386", "4Desktop-LACD:flash-plugin-0:9.0.289.0-1.el4.i386", "4ES-LACD:flash-plugin-0:9.0.289.0-1.el4.i386", "4WS-LACD:flash-plugin-0:9.0.289.0-1.el4.i386" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0834" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-LACD:flash-plugin-0:9.0.289.0-1.el4.i386", "4Desktop-LACD:flash-plugin-0:9.0.289.0-1.el4.i386", "4ES-LACD:flash-plugin-0:9.0.289.0-1.el4.i386", "4WS-LACD:flash-plugin-0:9.0.289.0-1.el4.i386" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "flash-plugin: security bulletin APSB10-26" }, { "cve": "CVE-2010-3643", "discovery_date": "2010-11-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "649938" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in Adobe Flash Player before 9.0.289.0 and 10.x before 10.1.102.64 on Windows, Mac OS X, Linux, and Solaris, and 10.1.95.1 on Android, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unknown vectors, a different vulnerability than CVE-2010-3640, CVE-2010-3641, CVE-2010-3642, CVE-2010-3644, CVE-2010-3645, CVE-2010-3646, CVE-2010-3647, CVE-2010-3648, CVE-2010-3649, CVE-2010-3650, and CVE-2010-3652.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: security bulletin APSB10-26", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:flash-plugin-0:9.0.289.0-1.el4.i386", "4Desktop-LACD:flash-plugin-0:9.0.289.0-1.el4.i386", "4ES-LACD:flash-plugin-0:9.0.289.0-1.el4.i386", "4WS-LACD:flash-plugin-0:9.0.289.0-1.el4.i386" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3643" }, { "category": "external", "summary": "RHBZ#649938", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=649938" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3643", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3643" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3643", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3643" } ], "release_date": "2010-11-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-11-08T16:25:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-LACD:flash-plugin-0:9.0.289.0-1.el4.i386", "4Desktop-LACD:flash-plugin-0:9.0.289.0-1.el4.i386", "4ES-LACD:flash-plugin-0:9.0.289.0-1.el4.i386", "4WS-LACD:flash-plugin-0:9.0.289.0-1.el4.i386" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0834" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-LACD:flash-plugin-0:9.0.289.0-1.el4.i386", "4Desktop-LACD:flash-plugin-0:9.0.289.0-1.el4.i386", "4ES-LACD:flash-plugin-0:9.0.289.0-1.el4.i386", "4WS-LACD:flash-plugin-0:9.0.289.0-1.el4.i386" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "flash-plugin: security bulletin APSB10-26" }, { "cve": "CVE-2010-3644", "discovery_date": "2010-11-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "649938" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in Adobe Flash Player before 9.0.289.0 and 10.x before 10.1.102.64 on Windows, Mac OS X, Linux, and Solaris, and 10.1.95.1 on Android, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unknown vectors, a different vulnerability than CVE-2010-3640, CVE-2010-3641, CVE-2010-3642, CVE-2010-3643, CVE-2010-3645, CVE-2010-3646, CVE-2010-3647, CVE-2010-3648, CVE-2010-3649, CVE-2010-3650, and CVE-2010-3652.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: security bulletin APSB10-26", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:flash-plugin-0:9.0.289.0-1.el4.i386", "4Desktop-LACD:flash-plugin-0:9.0.289.0-1.el4.i386", "4ES-LACD:flash-plugin-0:9.0.289.0-1.el4.i386", "4WS-LACD:flash-plugin-0:9.0.289.0-1.el4.i386" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3644" }, { "category": "external", "summary": "RHBZ#649938", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=649938" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3644", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3644" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3644", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3644" } ], "release_date": "2010-11-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-11-08T16:25:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-LACD:flash-plugin-0:9.0.289.0-1.el4.i386", "4Desktop-LACD:flash-plugin-0:9.0.289.0-1.el4.i386", "4ES-LACD:flash-plugin-0:9.0.289.0-1.el4.i386", "4WS-LACD:flash-plugin-0:9.0.289.0-1.el4.i386" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0834" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-LACD:flash-plugin-0:9.0.289.0-1.el4.i386", "4Desktop-LACD:flash-plugin-0:9.0.289.0-1.el4.i386", "4ES-LACD:flash-plugin-0:9.0.289.0-1.el4.i386", "4WS-LACD:flash-plugin-0:9.0.289.0-1.el4.i386" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "flash-plugin: security bulletin APSB10-26" }, { "cve": "CVE-2010-3645", "discovery_date": "2010-11-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "649938" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in Adobe Flash Player before 9.0.289.0 and 10.x before 10.1.102.64 on Windows, Mac OS X, Linux, and Solaris, and 10.1.95.1 on Android, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unknown vectors, a different vulnerability than CVE-2010-3640, CVE-2010-3641, CVE-2010-3642, CVE-2010-3643, CVE-2010-3644, CVE-2010-3646, CVE-2010-3647, CVE-2010-3648, CVE-2010-3649, CVE-2010-3650, and CVE-2010-3652.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: security bulletin APSB10-26", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:flash-plugin-0:9.0.289.0-1.el4.i386", "4Desktop-LACD:flash-plugin-0:9.0.289.0-1.el4.i386", "4ES-LACD:flash-plugin-0:9.0.289.0-1.el4.i386", "4WS-LACD:flash-plugin-0:9.0.289.0-1.el4.i386" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3645" }, { "category": "external", "summary": "RHBZ#649938", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=649938" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3645", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3645" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3645", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3645" } ], "release_date": "2010-11-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-11-08T16:25:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-LACD:flash-plugin-0:9.0.289.0-1.el4.i386", "4Desktop-LACD:flash-plugin-0:9.0.289.0-1.el4.i386", "4ES-LACD:flash-plugin-0:9.0.289.0-1.el4.i386", "4WS-LACD:flash-plugin-0:9.0.289.0-1.el4.i386" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0834" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-LACD:flash-plugin-0:9.0.289.0-1.el4.i386", "4Desktop-LACD:flash-plugin-0:9.0.289.0-1.el4.i386", "4ES-LACD:flash-plugin-0:9.0.289.0-1.el4.i386", "4WS-LACD:flash-plugin-0:9.0.289.0-1.el4.i386" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "flash-plugin: security bulletin APSB10-26" }, { "cve": "CVE-2010-3646", "discovery_date": "2010-11-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "649938" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in Adobe Flash Player before 9.0.289.0 and 10.x before 10.1.102.64 on Windows, Mac OS X, Linux, and Solaris, and 10.1.95.1 on Android, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unknown vectors, a different vulnerability than CVE-2010-3640, CVE-2010-3641, CVE-2010-3642, CVE-2010-3643, CVE-2010-3644, CVE-2010-3645, CVE-2010-3647, CVE-2010-3648, CVE-2010-3649, CVE-2010-3650, and CVE-2010-3652.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: security bulletin APSB10-26", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:flash-plugin-0:9.0.289.0-1.el4.i386", "4Desktop-LACD:flash-plugin-0:9.0.289.0-1.el4.i386", "4ES-LACD:flash-plugin-0:9.0.289.0-1.el4.i386", "4WS-LACD:flash-plugin-0:9.0.289.0-1.el4.i386" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3646" }, { "category": "external", "summary": "RHBZ#649938", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=649938" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3646", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3646" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3646", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3646" } ], "release_date": "2010-11-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-11-08T16:25:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-LACD:flash-plugin-0:9.0.289.0-1.el4.i386", "4Desktop-LACD:flash-plugin-0:9.0.289.0-1.el4.i386", "4ES-LACD:flash-plugin-0:9.0.289.0-1.el4.i386", "4WS-LACD:flash-plugin-0:9.0.289.0-1.el4.i386" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0834" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-LACD:flash-plugin-0:9.0.289.0-1.el4.i386", "4Desktop-LACD:flash-plugin-0:9.0.289.0-1.el4.i386", "4ES-LACD:flash-plugin-0:9.0.289.0-1.el4.i386", "4WS-LACD:flash-plugin-0:9.0.289.0-1.el4.i386" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "flash-plugin: security bulletin APSB10-26" }, { "cve": "CVE-2010-3647", "discovery_date": "2010-11-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "649938" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in Adobe Flash Player before 9.0.289.0 and 10.x before 10.1.102.64 on Windows, Mac OS X, Linux, and Solaris, and 10.1.95.1 on Android, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unknown vectors, a different vulnerability than CVE-2010-3640, CVE-2010-3641, CVE-2010-3642, CVE-2010-3643, CVE-2010-3644, CVE-2010-3645, CVE-2010-3646, CVE-2010-3648, CVE-2010-3649, CVE-2010-3650, and CVE-2010-3652.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: security bulletin APSB10-26", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:flash-plugin-0:9.0.289.0-1.el4.i386", "4Desktop-LACD:flash-plugin-0:9.0.289.0-1.el4.i386", "4ES-LACD:flash-plugin-0:9.0.289.0-1.el4.i386", "4WS-LACD:flash-plugin-0:9.0.289.0-1.el4.i386" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3647" }, { "category": "external", "summary": "RHBZ#649938", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=649938" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3647", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3647" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3647", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3647" } ], "release_date": "2010-11-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-11-08T16:25:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-LACD:flash-plugin-0:9.0.289.0-1.el4.i386", "4Desktop-LACD:flash-plugin-0:9.0.289.0-1.el4.i386", "4ES-LACD:flash-plugin-0:9.0.289.0-1.el4.i386", "4WS-LACD:flash-plugin-0:9.0.289.0-1.el4.i386" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0834" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-LACD:flash-plugin-0:9.0.289.0-1.el4.i386", "4Desktop-LACD:flash-plugin-0:9.0.289.0-1.el4.i386", "4ES-LACD:flash-plugin-0:9.0.289.0-1.el4.i386", "4WS-LACD:flash-plugin-0:9.0.289.0-1.el4.i386" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "flash-plugin: security bulletin APSB10-26" }, { "cve": "CVE-2010-3648", "discovery_date": "2010-11-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "649938" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in Adobe Flash Player before 9.0.289.0 and 10.x before 10.1.102.64 on Windows, Mac OS X, Linux, and Solaris, and 10.1.95.1 on Android, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unknown vectors, a different vulnerability than CVE-2010-3640, CVE-2010-3641, CVE-2010-3642, CVE-2010-3643, CVE-2010-3644, CVE-2010-3645, CVE-2010-3646, CVE-2010-3647, CVE-2010-3649, CVE-2010-3650, and CVE-2010-3652.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: security bulletin APSB10-26", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:flash-plugin-0:9.0.289.0-1.el4.i386", "4Desktop-LACD:flash-plugin-0:9.0.289.0-1.el4.i386", "4ES-LACD:flash-plugin-0:9.0.289.0-1.el4.i386", "4WS-LACD:flash-plugin-0:9.0.289.0-1.el4.i386" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3648" }, { "category": "external", "summary": "RHBZ#649938", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=649938" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3648", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3648" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3648", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3648" } ], "release_date": "2010-11-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-11-08T16:25:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-LACD:flash-plugin-0:9.0.289.0-1.el4.i386", "4Desktop-LACD:flash-plugin-0:9.0.289.0-1.el4.i386", "4ES-LACD:flash-plugin-0:9.0.289.0-1.el4.i386", "4WS-LACD:flash-plugin-0:9.0.289.0-1.el4.i386" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0834" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-LACD:flash-plugin-0:9.0.289.0-1.el4.i386", "4Desktop-LACD:flash-plugin-0:9.0.289.0-1.el4.i386", "4ES-LACD:flash-plugin-0:9.0.289.0-1.el4.i386", "4WS-LACD:flash-plugin-0:9.0.289.0-1.el4.i386" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "flash-plugin: security bulletin APSB10-26" }, { "cve": "CVE-2010-3649", "discovery_date": "2010-11-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "649938" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in Adobe Flash Player before 9.0.289.0 and 10.x before 10.1.102.64 on Windows, Mac OS X, Linux, and Solaris, and 10.1.95.1 on Android, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unknown vectors, a different vulnerability than CVE-2010-3640, CVE-2010-3641, CVE-2010-3642, CVE-2010-3643, CVE-2010-3644, CVE-2010-3645, CVE-2010-3646, CVE-2010-3647, CVE-2010-3648, CVE-2010-3650, and CVE-2010-3652.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: security bulletin APSB10-26", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:flash-plugin-0:9.0.289.0-1.el4.i386", "4Desktop-LACD:flash-plugin-0:9.0.289.0-1.el4.i386", "4ES-LACD:flash-plugin-0:9.0.289.0-1.el4.i386", "4WS-LACD:flash-plugin-0:9.0.289.0-1.el4.i386" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3649" }, { "category": "external", "summary": "RHBZ#649938", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=649938" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3649", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3649" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3649", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3649" } ], "release_date": "2010-11-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-11-08T16:25:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-LACD:flash-plugin-0:9.0.289.0-1.el4.i386", "4Desktop-LACD:flash-plugin-0:9.0.289.0-1.el4.i386", "4ES-LACD:flash-plugin-0:9.0.289.0-1.el4.i386", "4WS-LACD:flash-plugin-0:9.0.289.0-1.el4.i386" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0834" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-LACD:flash-plugin-0:9.0.289.0-1.el4.i386", "4Desktop-LACD:flash-plugin-0:9.0.289.0-1.el4.i386", "4ES-LACD:flash-plugin-0:9.0.289.0-1.el4.i386", "4WS-LACD:flash-plugin-0:9.0.289.0-1.el4.i386" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "flash-plugin: security bulletin APSB10-26" }, { "cve": "CVE-2010-3650", "discovery_date": "2010-11-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "649938" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in Adobe Flash Player before 9.0.289.0 and 10.x before 10.1.102.64 on Windows, Mac OS X, Linux, and Solaris, and 10.1.95.1 on Android, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unknown vectors, a different vulnerability than CVE-2010-3640, CVE-2010-3641, CVE-2010-3642, CVE-2010-3643, CVE-2010-3644, CVE-2010-3645, CVE-2010-3646, CVE-2010-3647, CVE-2010-3648, CVE-2010-3649, and CVE-2010-3652.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: security bulletin APSB10-26", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:flash-plugin-0:9.0.289.0-1.el4.i386", "4Desktop-LACD:flash-plugin-0:9.0.289.0-1.el4.i386", "4ES-LACD:flash-plugin-0:9.0.289.0-1.el4.i386", "4WS-LACD:flash-plugin-0:9.0.289.0-1.el4.i386" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3650" }, { "category": "external", "summary": "RHBZ#649938", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=649938" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3650", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3650" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3650", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3650" } ], "release_date": "2010-11-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-11-08T16:25:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-LACD:flash-plugin-0:9.0.289.0-1.el4.i386", "4Desktop-LACD:flash-plugin-0:9.0.289.0-1.el4.i386", "4ES-LACD:flash-plugin-0:9.0.289.0-1.el4.i386", "4WS-LACD:flash-plugin-0:9.0.289.0-1.el4.i386" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0834" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-LACD:flash-plugin-0:9.0.289.0-1.el4.i386", "4Desktop-LACD:flash-plugin-0:9.0.289.0-1.el4.i386", "4ES-LACD:flash-plugin-0:9.0.289.0-1.el4.i386", "4WS-LACD:flash-plugin-0:9.0.289.0-1.el4.i386" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "flash-plugin: security bulletin APSB10-26" }, { "cve": "CVE-2010-3652", "discovery_date": "2010-11-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "649938" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in Adobe Flash Player before 9.0.289.0 and 10.x before 10.1.102.64 on Windows, Mac OS X, Linux, and Solaris, and 10.1.95.1 on Android, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unknown vectors, a different vulnerability than CVE-2010-3640, CVE-2010-3641, CVE-2010-3642, CVE-2010-3643, CVE-2010-3644, CVE-2010-3645, CVE-2010-3646, CVE-2010-3647, CVE-2010-3648, CVE-2010-3649, and CVE-2010-3650.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: security bulletin APSB10-26", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:flash-plugin-0:9.0.289.0-1.el4.i386", "4Desktop-LACD:flash-plugin-0:9.0.289.0-1.el4.i386", "4ES-LACD:flash-plugin-0:9.0.289.0-1.el4.i386", "4WS-LACD:flash-plugin-0:9.0.289.0-1.el4.i386" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3652" }, { "category": "external", "summary": "RHBZ#649938", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=649938" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3652", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3652" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3652", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3652" } ], "release_date": "2010-11-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-11-08T16:25:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-LACD:flash-plugin-0:9.0.289.0-1.el4.i386", "4Desktop-LACD:flash-plugin-0:9.0.289.0-1.el4.i386", "4ES-LACD:flash-plugin-0:9.0.289.0-1.el4.i386", "4WS-LACD:flash-plugin-0:9.0.289.0-1.el4.i386" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0834" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-LACD:flash-plugin-0:9.0.289.0-1.el4.i386", "4Desktop-LACD:flash-plugin-0:9.0.289.0-1.el4.i386", "4ES-LACD:flash-plugin-0:9.0.289.0-1.el4.i386", "4WS-LACD:flash-plugin-0:9.0.289.0-1.el4.i386" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "flash-plugin: security bulletin APSB10-26" }, { "cve": "CVE-2010-3654", "discovery_date": "2010-10-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "647525" } ], "notes": [ { "category": "description", "text": "Adobe Flash Player before 9.0.289.0 and 10.x before 10.1.102.64 on Windows, Mac OS X, Linux, and Solaris and 10.1.95.1 on Android, and authplay.dll (aka AuthPlayLib.bundle or libauthplay.so.0.0.0) in Adobe Reader and Acrobat 9.x through 9.4, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via crafted SWF content, as exploited in the wild in October 2010.", "title": "Vulnerability description" }, { "category": "summary", "text": "acroread/flash-plugin: critical vulnerablility (APSA10-05, APSB10-26)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:flash-plugin-0:9.0.289.0-1.el4.i386", "4Desktop-LACD:flash-plugin-0:9.0.289.0-1.el4.i386", "4ES-LACD:flash-plugin-0:9.0.289.0-1.el4.i386", "4WS-LACD:flash-plugin-0:9.0.289.0-1.el4.i386" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3654" }, { "category": "external", "summary": "RHBZ#647525", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=647525" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3654", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3654" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3654", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3654" } ], "release_date": "2010-10-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-11-08T16:25:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-LACD:flash-plugin-0:9.0.289.0-1.el4.i386", "4Desktop-LACD:flash-plugin-0:9.0.289.0-1.el4.i386", "4ES-LACD:flash-plugin-0:9.0.289.0-1.el4.i386", "4WS-LACD:flash-plugin-0:9.0.289.0-1.el4.i386" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0834" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-LACD:flash-plugin-0:9.0.289.0-1.el4.i386", "4Desktop-LACD:flash-plugin-0:9.0.289.0-1.el4.i386", "4ES-LACD:flash-plugin-0:9.0.289.0-1.el4.i386", "4WS-LACD:flash-plugin-0:9.0.289.0-1.el4.i386" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "acroread/flash-plugin: critical vulnerablility (APSA10-05, APSB10-26)" } ] }
rhsa-2010_0829
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An updated Adobe Flash Player package that fixes multiple security issues\nis now available for Red Hat Enterprise Linux 5 Supplementary.\n\nThe Red Hat Security Response Team has rated this update as having critical\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash\nPlayer web browser plug-in.\n\nThis update fixes multiple vulnerabilities in Adobe Flash Player. These\nvulnerabilities are detailed on the Adobe security page APSB10-26, listed\nin the References section.\n\nMultiple security flaws were found in the way flash-plugin displayed\ncertain SWF content. An attacker could use these flaws to create a\nspecially-crafted SWF file that would cause flash-plugin to crash or,\npotentially, execute arbitrary code when the victim loaded a page\ncontaining the specially-crafted SWF content. (CVE-2010-3639,\nCVE-2010-3640, CVE-2010-3641, CVE-2010-3642, CVE-2010-3643, CVE-2010-3644,\nCVE-2010-3645, CVE-2010-3646, CVE-2010-3647, CVE-2010-3648, CVE-2010-3649,\nCVE-2010-3650, CVE-2010-3652, CVE-2010-3654)\n\nAn input validation flaw was discovered in flash-plugin. Certain server\nencodings could lead to a bypass of cross-domain policy file restrictions,\npossibly leading to cross-domain information disclosure. (CVE-2010-3636)\n\nDuring testing, it was discovered that there were regressions with Flash\nPlayer on certain sites, such as fullscreen playback on YouTube. Despite\nthese regressions, we feel these security flaws are serious enough to\nupdate the package with what Adobe has provided.\n\nAll users of Adobe Flash Player should install this updated package, which\nupgrades Flash Player to version 10.1.102.64.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2010:0829", "url": "https://access.redhat.com/errata/RHSA-2010:0829" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#critical", "url": "https://access.redhat.com/security/updates/classification/#critical" }, { "category": "external", "summary": "http://www.adobe.com/support/security/bulletins/apsb10-26.html", "url": "http://www.adobe.com/support/security/bulletins/apsb10-26.html" }, { "category": "external", "summary": "647525", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=647525" }, { "category": "external", "summary": "649938", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=649938" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2010/rhsa-2010_0829.json" } ], "title": "Red Hat Security Advisory: flash-plugin security update", "tracking": { "current_release_date": "2024-11-14T11:27:44+00:00", "generator": { "date": "2024-11-14T11:27:44+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.0" } }, "id": "RHSA-2010:0829", "initial_release_date": "2010-11-06T00:38:00+00:00", "revision_history": [ { "date": "2010-11-06T00:38:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2010-11-05T20:42:34+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-14T11:27:44+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product": { "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:5::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Supplementary (v. 5)", "product": { "name": "Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:5::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux Supplementary" }, { "branches": [ { "category": "product_version", "name": "flash-plugin-0:10.1.102.64-1.el5.i386", "product": { "name": "flash-plugin-0:10.1.102.64-1.el5.i386", "product_id": "flash-plugin-0:10.1.102.64-1.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/flash-plugin@10.1.102.64-1.el5?arch=i386" } } } ], "category": "architecture", "name": "i386" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "flash-plugin-0:10.1.102.64-1.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:flash-plugin-0:10.1.102.64-1.el5.i386" }, "product_reference": "flash-plugin-0:10.1.102.64-1.el5.i386", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "flash-plugin-0:10.1.102.64-1.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:flash-plugin-0:10.1.102.64-1.el5.i386" }, "product_reference": "flash-plugin-0:10.1.102.64-1.el5.i386", "relates_to_product_reference": "5Server-Supplementary" } ] }, "vulnerabilities": [ { "cve": "CVE-2010-3636", "discovery_date": "2010-11-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "649938" } ], "notes": [ { "category": "description", "text": "Adobe Flash Player before 9.0.289.0 and 10.x before 10.1.102.64 on Windows, Mac OS X, Linux, and Solaris, and 10.1.95.1 on Android, does not properly handle unspecified encodings during the parsing of a cross-domain policy file, which allows remote web servers to bypass intended access restrictions via unknown vectors.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: security bulletin APSB10-26", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary:flash-plugin-0:10.1.102.64-1.el5.i386", "5Server-Supplementary:flash-plugin-0:10.1.102.64-1.el5.i386" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3636" }, { "category": "external", "summary": "RHBZ#649938", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=649938" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3636", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3636" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3636", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3636" } ], "release_date": "2010-11-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-11-06T00:38:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Client-Supplementary:flash-plugin-0:10.1.102.64-1.el5.i386", "5Server-Supplementary:flash-plugin-0:10.1.102.64-1.el5.i386" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0829" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Client-Supplementary:flash-plugin-0:10.1.102.64-1.el5.i386", "5Server-Supplementary:flash-plugin-0:10.1.102.64-1.el5.i386" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "flash-plugin: security bulletin APSB10-26" }, { "cve": "CVE-2010-3639", "discovery_date": "2010-11-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "649938" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in Adobe Flash Player before 9.0.289.0 and 10.x before 10.1.102.64 on Windows, Mac OS X, Linux, and Solaris, and 10.1.95.1 on Android, allows attackers to cause a denial of service or possibly execute arbitrary code via unknown vectors.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: security bulletin APSB10-26", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary:flash-plugin-0:10.1.102.64-1.el5.i386", "5Server-Supplementary:flash-plugin-0:10.1.102.64-1.el5.i386" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3639" }, { "category": "external", "summary": "RHBZ#649938", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=649938" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3639", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3639" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3639", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3639" } ], "release_date": "2010-11-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-11-06T00:38:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Client-Supplementary:flash-plugin-0:10.1.102.64-1.el5.i386", "5Server-Supplementary:flash-plugin-0:10.1.102.64-1.el5.i386" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0829" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Client-Supplementary:flash-plugin-0:10.1.102.64-1.el5.i386", "5Server-Supplementary:flash-plugin-0:10.1.102.64-1.el5.i386" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "flash-plugin: security bulletin APSB10-26" }, { "cve": "CVE-2010-3640", "discovery_date": "2010-11-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "649938" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in Adobe Flash Player before 9.0.289.0 and 10.x before 10.1.102.64 on Windows, Mac OS X, Linux, and Solaris, and 10.1.95.1 on Android, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unknown vectors, a different vulnerability than CVE-2010-3641, CVE-2010-3642, CVE-2010-3643, CVE-2010-3644, CVE-2010-3645, CVE-2010-3646, CVE-2010-3647, CVE-2010-3648, CVE-2010-3649, CVE-2010-3650, and CVE-2010-3652.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: security bulletin APSB10-26", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary:flash-plugin-0:10.1.102.64-1.el5.i386", "5Server-Supplementary:flash-plugin-0:10.1.102.64-1.el5.i386" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3640" }, { "category": "external", "summary": "RHBZ#649938", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=649938" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3640", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3640" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3640", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3640" } ], "release_date": "2010-11-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-11-06T00:38:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Client-Supplementary:flash-plugin-0:10.1.102.64-1.el5.i386", "5Server-Supplementary:flash-plugin-0:10.1.102.64-1.el5.i386" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0829" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Client-Supplementary:flash-plugin-0:10.1.102.64-1.el5.i386", "5Server-Supplementary:flash-plugin-0:10.1.102.64-1.el5.i386" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "flash-plugin: security bulletin APSB10-26" }, { "cve": "CVE-2010-3641", "discovery_date": "2010-11-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "649938" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in Adobe Flash Player before 9.0.289.0 and 10.x before 10.1.102.64 on Windows, Mac OS X, Linux, and Solaris, and 10.1.95.1 on Android, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unknown vectors, a different vulnerability than CVE-2010-3640, CVE-2010-3642, CVE-2010-3643, CVE-2010-3644, CVE-2010-3645, CVE-2010-3646, CVE-2010-3647, CVE-2010-3648, CVE-2010-3649, CVE-2010-3650, and CVE-2010-3652.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: security bulletin APSB10-26", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary:flash-plugin-0:10.1.102.64-1.el5.i386", "5Server-Supplementary:flash-plugin-0:10.1.102.64-1.el5.i386" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3641" }, { "category": "external", "summary": "RHBZ#649938", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=649938" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3641", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3641" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3641", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3641" } ], "release_date": "2010-11-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-11-06T00:38:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Client-Supplementary:flash-plugin-0:10.1.102.64-1.el5.i386", "5Server-Supplementary:flash-plugin-0:10.1.102.64-1.el5.i386" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0829" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Client-Supplementary:flash-plugin-0:10.1.102.64-1.el5.i386", "5Server-Supplementary:flash-plugin-0:10.1.102.64-1.el5.i386" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "flash-plugin: security bulletin APSB10-26" }, { "cve": "CVE-2010-3642", "discovery_date": "2010-11-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "649938" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in Adobe Flash Player before 9.0.289.0 and 10.x before 10.1.102.64 on Windows, Mac OS X, Linux, and Solaris, and 10.1.95.1 on Android, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unknown vectors, a different vulnerability than CVE-2010-3640, CVE-2010-3641, CVE-2010-3643, CVE-2010-3644, CVE-2010-3645, CVE-2010-3646, CVE-2010-3647, CVE-2010-3648, CVE-2010-3649, CVE-2010-3650, and CVE-2010-3652.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: security bulletin APSB10-26", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary:flash-plugin-0:10.1.102.64-1.el5.i386", "5Server-Supplementary:flash-plugin-0:10.1.102.64-1.el5.i386" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3642" }, { "category": "external", "summary": "RHBZ#649938", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=649938" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3642", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3642" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3642", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3642" } ], "release_date": "2010-11-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-11-06T00:38:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Client-Supplementary:flash-plugin-0:10.1.102.64-1.el5.i386", "5Server-Supplementary:flash-plugin-0:10.1.102.64-1.el5.i386" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0829" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Client-Supplementary:flash-plugin-0:10.1.102.64-1.el5.i386", "5Server-Supplementary:flash-plugin-0:10.1.102.64-1.el5.i386" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "flash-plugin: security bulletin APSB10-26" }, { "cve": "CVE-2010-3643", "discovery_date": "2010-11-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "649938" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in Adobe Flash Player before 9.0.289.0 and 10.x before 10.1.102.64 on Windows, Mac OS X, Linux, and Solaris, and 10.1.95.1 on Android, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unknown vectors, a different vulnerability than CVE-2010-3640, CVE-2010-3641, CVE-2010-3642, CVE-2010-3644, CVE-2010-3645, CVE-2010-3646, CVE-2010-3647, CVE-2010-3648, CVE-2010-3649, CVE-2010-3650, and CVE-2010-3652.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: security bulletin APSB10-26", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary:flash-plugin-0:10.1.102.64-1.el5.i386", "5Server-Supplementary:flash-plugin-0:10.1.102.64-1.el5.i386" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3643" }, { "category": "external", "summary": "RHBZ#649938", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=649938" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3643", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3643" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3643", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3643" } ], "release_date": "2010-11-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-11-06T00:38:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Client-Supplementary:flash-plugin-0:10.1.102.64-1.el5.i386", "5Server-Supplementary:flash-plugin-0:10.1.102.64-1.el5.i386" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0829" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Client-Supplementary:flash-plugin-0:10.1.102.64-1.el5.i386", "5Server-Supplementary:flash-plugin-0:10.1.102.64-1.el5.i386" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "flash-plugin: security bulletin APSB10-26" }, { "cve": "CVE-2010-3644", "discovery_date": "2010-11-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "649938" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in Adobe Flash Player before 9.0.289.0 and 10.x before 10.1.102.64 on Windows, Mac OS X, Linux, and Solaris, and 10.1.95.1 on Android, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unknown vectors, a different vulnerability than CVE-2010-3640, CVE-2010-3641, CVE-2010-3642, CVE-2010-3643, CVE-2010-3645, CVE-2010-3646, CVE-2010-3647, CVE-2010-3648, CVE-2010-3649, CVE-2010-3650, and CVE-2010-3652.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: security bulletin APSB10-26", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary:flash-plugin-0:10.1.102.64-1.el5.i386", "5Server-Supplementary:flash-plugin-0:10.1.102.64-1.el5.i386" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3644" }, { "category": "external", "summary": "RHBZ#649938", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=649938" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3644", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3644" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3644", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3644" } ], "release_date": "2010-11-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-11-06T00:38:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Client-Supplementary:flash-plugin-0:10.1.102.64-1.el5.i386", "5Server-Supplementary:flash-plugin-0:10.1.102.64-1.el5.i386" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0829" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Client-Supplementary:flash-plugin-0:10.1.102.64-1.el5.i386", "5Server-Supplementary:flash-plugin-0:10.1.102.64-1.el5.i386" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "flash-plugin: security bulletin APSB10-26" }, { "cve": "CVE-2010-3645", "discovery_date": "2010-11-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "649938" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in Adobe Flash Player before 9.0.289.0 and 10.x before 10.1.102.64 on Windows, Mac OS X, Linux, and Solaris, and 10.1.95.1 on Android, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unknown vectors, a different vulnerability than CVE-2010-3640, CVE-2010-3641, CVE-2010-3642, CVE-2010-3643, CVE-2010-3644, CVE-2010-3646, CVE-2010-3647, CVE-2010-3648, CVE-2010-3649, CVE-2010-3650, and CVE-2010-3652.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: security bulletin APSB10-26", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary:flash-plugin-0:10.1.102.64-1.el5.i386", "5Server-Supplementary:flash-plugin-0:10.1.102.64-1.el5.i386" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3645" }, { "category": "external", "summary": "RHBZ#649938", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=649938" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3645", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3645" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3645", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3645" } ], "release_date": "2010-11-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-11-06T00:38:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Client-Supplementary:flash-plugin-0:10.1.102.64-1.el5.i386", "5Server-Supplementary:flash-plugin-0:10.1.102.64-1.el5.i386" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0829" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Client-Supplementary:flash-plugin-0:10.1.102.64-1.el5.i386", "5Server-Supplementary:flash-plugin-0:10.1.102.64-1.el5.i386" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "flash-plugin: security bulletin APSB10-26" }, { "cve": "CVE-2010-3646", "discovery_date": "2010-11-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "649938" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in Adobe Flash Player before 9.0.289.0 and 10.x before 10.1.102.64 on Windows, Mac OS X, Linux, and Solaris, and 10.1.95.1 on Android, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unknown vectors, a different vulnerability than CVE-2010-3640, CVE-2010-3641, CVE-2010-3642, CVE-2010-3643, CVE-2010-3644, CVE-2010-3645, CVE-2010-3647, CVE-2010-3648, CVE-2010-3649, CVE-2010-3650, and CVE-2010-3652.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: security bulletin APSB10-26", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary:flash-plugin-0:10.1.102.64-1.el5.i386", "5Server-Supplementary:flash-plugin-0:10.1.102.64-1.el5.i386" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3646" }, { "category": "external", "summary": "RHBZ#649938", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=649938" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3646", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3646" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3646", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3646" } ], "release_date": "2010-11-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-11-06T00:38:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Client-Supplementary:flash-plugin-0:10.1.102.64-1.el5.i386", "5Server-Supplementary:flash-plugin-0:10.1.102.64-1.el5.i386" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0829" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Client-Supplementary:flash-plugin-0:10.1.102.64-1.el5.i386", "5Server-Supplementary:flash-plugin-0:10.1.102.64-1.el5.i386" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "flash-plugin: security bulletin APSB10-26" }, { "cve": "CVE-2010-3647", "discovery_date": "2010-11-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "649938" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in Adobe Flash Player before 9.0.289.0 and 10.x before 10.1.102.64 on Windows, Mac OS X, Linux, and Solaris, and 10.1.95.1 on Android, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unknown vectors, a different vulnerability than CVE-2010-3640, CVE-2010-3641, CVE-2010-3642, CVE-2010-3643, CVE-2010-3644, CVE-2010-3645, CVE-2010-3646, CVE-2010-3648, CVE-2010-3649, CVE-2010-3650, and CVE-2010-3652.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: security bulletin APSB10-26", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary:flash-plugin-0:10.1.102.64-1.el5.i386", "5Server-Supplementary:flash-plugin-0:10.1.102.64-1.el5.i386" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3647" }, { "category": "external", "summary": "RHBZ#649938", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=649938" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3647", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3647" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3647", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3647" } ], "release_date": "2010-11-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-11-06T00:38:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Client-Supplementary:flash-plugin-0:10.1.102.64-1.el5.i386", "5Server-Supplementary:flash-plugin-0:10.1.102.64-1.el5.i386" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0829" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Client-Supplementary:flash-plugin-0:10.1.102.64-1.el5.i386", "5Server-Supplementary:flash-plugin-0:10.1.102.64-1.el5.i386" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "flash-plugin: security bulletin APSB10-26" }, { "cve": "CVE-2010-3648", "discovery_date": "2010-11-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "649938" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in Adobe Flash Player before 9.0.289.0 and 10.x before 10.1.102.64 on Windows, Mac OS X, Linux, and Solaris, and 10.1.95.1 on Android, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unknown vectors, a different vulnerability than CVE-2010-3640, CVE-2010-3641, CVE-2010-3642, CVE-2010-3643, CVE-2010-3644, CVE-2010-3645, CVE-2010-3646, CVE-2010-3647, CVE-2010-3649, CVE-2010-3650, and CVE-2010-3652.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: security bulletin APSB10-26", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary:flash-plugin-0:10.1.102.64-1.el5.i386", "5Server-Supplementary:flash-plugin-0:10.1.102.64-1.el5.i386" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3648" }, { "category": "external", "summary": "RHBZ#649938", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=649938" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3648", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3648" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3648", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3648" } ], "release_date": "2010-11-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-11-06T00:38:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Client-Supplementary:flash-plugin-0:10.1.102.64-1.el5.i386", "5Server-Supplementary:flash-plugin-0:10.1.102.64-1.el5.i386" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0829" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Client-Supplementary:flash-plugin-0:10.1.102.64-1.el5.i386", "5Server-Supplementary:flash-plugin-0:10.1.102.64-1.el5.i386" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "flash-plugin: security bulletin APSB10-26" }, { "cve": "CVE-2010-3649", "discovery_date": "2010-11-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "649938" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in Adobe Flash Player before 9.0.289.0 and 10.x before 10.1.102.64 on Windows, Mac OS X, Linux, and Solaris, and 10.1.95.1 on Android, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unknown vectors, a different vulnerability than CVE-2010-3640, CVE-2010-3641, CVE-2010-3642, CVE-2010-3643, CVE-2010-3644, CVE-2010-3645, CVE-2010-3646, CVE-2010-3647, CVE-2010-3648, CVE-2010-3650, and CVE-2010-3652.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: security bulletin APSB10-26", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary:flash-plugin-0:10.1.102.64-1.el5.i386", "5Server-Supplementary:flash-plugin-0:10.1.102.64-1.el5.i386" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3649" }, { "category": "external", "summary": "RHBZ#649938", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=649938" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3649", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3649" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3649", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3649" } ], "release_date": "2010-11-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-11-06T00:38:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Client-Supplementary:flash-plugin-0:10.1.102.64-1.el5.i386", "5Server-Supplementary:flash-plugin-0:10.1.102.64-1.el5.i386" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0829" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Client-Supplementary:flash-plugin-0:10.1.102.64-1.el5.i386", "5Server-Supplementary:flash-plugin-0:10.1.102.64-1.el5.i386" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "flash-plugin: security bulletin APSB10-26" }, { "cve": "CVE-2010-3650", "discovery_date": "2010-11-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "649938" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in Adobe Flash Player before 9.0.289.0 and 10.x before 10.1.102.64 on Windows, Mac OS X, Linux, and Solaris, and 10.1.95.1 on Android, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unknown vectors, a different vulnerability than CVE-2010-3640, CVE-2010-3641, CVE-2010-3642, CVE-2010-3643, CVE-2010-3644, CVE-2010-3645, CVE-2010-3646, CVE-2010-3647, CVE-2010-3648, CVE-2010-3649, and CVE-2010-3652.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: security bulletin APSB10-26", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary:flash-plugin-0:10.1.102.64-1.el5.i386", "5Server-Supplementary:flash-plugin-0:10.1.102.64-1.el5.i386" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3650" }, { "category": "external", "summary": "RHBZ#649938", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=649938" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3650", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3650" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3650", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3650" } ], "release_date": "2010-11-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-11-06T00:38:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Client-Supplementary:flash-plugin-0:10.1.102.64-1.el5.i386", "5Server-Supplementary:flash-plugin-0:10.1.102.64-1.el5.i386" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0829" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Client-Supplementary:flash-plugin-0:10.1.102.64-1.el5.i386", "5Server-Supplementary:flash-plugin-0:10.1.102.64-1.el5.i386" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "flash-plugin: security bulletin APSB10-26" }, { "cve": "CVE-2010-3652", "discovery_date": "2010-11-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "649938" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in Adobe Flash Player before 9.0.289.0 and 10.x before 10.1.102.64 on Windows, Mac OS X, Linux, and Solaris, and 10.1.95.1 on Android, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unknown vectors, a different vulnerability than CVE-2010-3640, CVE-2010-3641, CVE-2010-3642, CVE-2010-3643, CVE-2010-3644, CVE-2010-3645, CVE-2010-3646, CVE-2010-3647, CVE-2010-3648, CVE-2010-3649, and CVE-2010-3650.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: security bulletin APSB10-26", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary:flash-plugin-0:10.1.102.64-1.el5.i386", "5Server-Supplementary:flash-plugin-0:10.1.102.64-1.el5.i386" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3652" }, { "category": "external", "summary": "RHBZ#649938", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=649938" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3652", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3652" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3652", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3652" } ], "release_date": "2010-11-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-11-06T00:38:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Client-Supplementary:flash-plugin-0:10.1.102.64-1.el5.i386", "5Server-Supplementary:flash-plugin-0:10.1.102.64-1.el5.i386" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0829" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Client-Supplementary:flash-plugin-0:10.1.102.64-1.el5.i386", "5Server-Supplementary:flash-plugin-0:10.1.102.64-1.el5.i386" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "flash-plugin: security bulletin APSB10-26" }, { "cve": "CVE-2010-3654", "discovery_date": "2010-10-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "647525" } ], "notes": [ { "category": "description", "text": "Adobe Flash Player before 9.0.289.0 and 10.x before 10.1.102.64 on Windows, Mac OS X, Linux, and Solaris and 10.1.95.1 on Android, and authplay.dll (aka AuthPlayLib.bundle or libauthplay.so.0.0.0) in Adobe Reader and Acrobat 9.x through 9.4, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via crafted SWF content, as exploited in the wild in October 2010.", "title": "Vulnerability description" }, { "category": "summary", "text": "acroread/flash-plugin: critical vulnerablility (APSA10-05, APSB10-26)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary:flash-plugin-0:10.1.102.64-1.el5.i386", "5Server-Supplementary:flash-plugin-0:10.1.102.64-1.el5.i386" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3654" }, { "category": "external", "summary": "RHBZ#647525", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=647525" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3654", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3654" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3654", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3654" } ], "release_date": "2010-10-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-11-06T00:38:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Client-Supplementary:flash-plugin-0:10.1.102.64-1.el5.i386", "5Server-Supplementary:flash-plugin-0:10.1.102.64-1.el5.i386" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0829" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Client-Supplementary:flash-plugin-0:10.1.102.64-1.el5.i386", "5Server-Supplementary:flash-plugin-0:10.1.102.64-1.el5.i386" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "acroread/flash-plugin: critical vulnerablility (APSA10-05, APSB10-26)" } ] }
rhsa-2010_0934
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated acroread packages that fix two security issues are now available\nfor Red Hat Enterprise Linux 4 Extras and Red Hat Enterprise Linux 5 and 6\nSupplementary.\n\nThe Red Hat Security Response Team has rated this update as having critical\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.\n\n[Updated 7th December 2010]\nThe package list in this erratum has been updated to make the packages\navailable in the Red Hat Enterprise Linux 4 Extras IA32 channels on the\nRed Hat Network.", "title": "Topic" }, { "category": "general", "text": "Adobe Reader allows users to view and print documents in Portable Document\nFormat (PDF).\n\nThis update fixes two vulnerabilities in Adobe Reader. These\nvulnerabilities are detailed on the Adobe security page APSB10-28, listed\nin the References section. A specially-crafted PDF file could cause Adobe\nReader to crash or, potentially, execute arbitrary code as the user running\nAdobe Reader when opened. (CVE-2010-3654, CVE-2010-4091)\n\nAll Adobe Reader users should install these updated packages. They contain\nAdobe Reader version 9.4.1, which is not vulnerable to these issues. All\nrunning instances of Adobe Reader must be restarted for the update to take\neffect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2010:0934", "url": "https://access.redhat.com/errata/RHSA-2010:0934" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#critical", "url": "https://access.redhat.com/security/updates/classification/#critical" }, { "category": "external", "summary": "http://www.adobe.com/support/security/bulletins/apsb10-28.html", "url": "http://www.adobe.com/support/security/bulletins/apsb10-28.html" }, { "category": "external", "summary": "647525", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=647525" }, { "category": "external", "summary": "651133", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=651133" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2010/rhsa-2010_0934.json" } ], "title": "Red Hat Security Advisory: acroread security update", "tracking": { "current_release_date": "2024-11-14T11:27:57+00:00", "generator": { "date": "2024-11-14T11:27:57+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.0" } }, "id": "RHSA-2010:0934", "initial_release_date": "2010-12-01T21:16:00+00:00", "revision_history": [ { "date": "2010-12-01T21:16:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2010-12-07T08:55:48+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-14T11:27:57+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 4 Extras", "product": { "name": "Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:4" } } }, { "category": "product_name", "name": "Red Hat Desktop version 4 Extras", "product": { "name": "Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:4" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 4 Extras", "product": { "name": "Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:4" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 4 Extras", "product": { "name": "Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:4" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product": { "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:5::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Supplementary (v. 5)", "product": { "name": "Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:5::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:6" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Supplementary (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:6" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:6" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux Supplementary" }, { "branches": [ { "category": "product_version", "name": "acroread-0:9.4.1-1.el4.i386", "product": { "name": "acroread-0:9.4.1-1.el4.i386", "product_id": "acroread-0:9.4.1-1.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/acroread@9.4.1-1.el4?arch=i386" } } }, { "category": "product_version", "name": "acroread-plugin-0:9.4.1-1.el4.i386", "product": { "name": "acroread-plugin-0:9.4.1-1.el4.i386", "product_id": "acroread-plugin-0:9.4.1-1.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/acroread-plugin@9.4.1-1.el4?arch=i386" } } }, { "category": "product_version", "name": "acroread-0:9.4.1-1.el5.i386", "product": { "name": "acroread-0:9.4.1-1.el5.i386", "product_id": "acroread-0:9.4.1-1.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/acroread@9.4.1-1.el5?arch=i386" } } }, { "category": "product_version", "name": "acroread-plugin-0:9.4.1-1.el5.i386", "product": { "name": "acroread-plugin-0:9.4.1-1.el5.i386", "product_id": "acroread-plugin-0:9.4.1-1.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/acroread-plugin@9.4.1-1.el5?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "acroread-0:9.4.1-1.el6.i686", "product": { "name": "acroread-0:9.4.1-1.el6.i686", "product_id": "acroread-0:9.4.1-1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/acroread@9.4.1-1.el6?arch=i686" } } }, { "category": "product_version", "name": "acroread-plugin-0:9.4.1-1.el6.i686", "product": { "name": "acroread-plugin-0:9.4.1-1.el6.i686", "product_id": "acroread-plugin-0:9.4.1-1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/acroread-plugin@9.4.1-1.el6?arch=i686" } } } ], "category": "architecture", "name": "i686" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "acroread-0:9.4.1-1.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:acroread-0:9.4.1-1.el4.i386" }, "product_reference": "acroread-0:9.4.1-1.el4.i386", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "acroread-plugin-0:9.4.1-1.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:acroread-plugin-0:9.4.1-1.el4.i386" }, "product_reference": "acroread-plugin-0:9.4.1-1.el4.i386", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "acroread-0:9.4.1-1.el4.i386 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:acroread-0:9.4.1-1.el4.i386" }, "product_reference": "acroread-0:9.4.1-1.el4.i386", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "acroread-plugin-0:9.4.1-1.el4.i386 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:acroread-plugin-0:9.4.1-1.el4.i386" }, "product_reference": "acroread-plugin-0:9.4.1-1.el4.i386", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "acroread-0:9.4.1-1.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:acroread-0:9.4.1-1.el4.i386" }, "product_reference": "acroread-0:9.4.1-1.el4.i386", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "acroread-plugin-0:9.4.1-1.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:acroread-plugin-0:9.4.1-1.el4.i386" }, "product_reference": "acroread-plugin-0:9.4.1-1.el4.i386", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "acroread-0:9.4.1-1.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:acroread-0:9.4.1-1.el4.i386" }, "product_reference": "acroread-0:9.4.1-1.el4.i386", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "acroread-plugin-0:9.4.1-1.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:acroread-plugin-0:9.4.1-1.el4.i386" }, "product_reference": "acroread-plugin-0:9.4.1-1.el4.i386", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "acroread-0:9.4.1-1.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:acroread-0:9.4.1-1.el5.i386" }, "product_reference": "acroread-0:9.4.1-1.el5.i386", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "acroread-plugin-0:9.4.1-1.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:acroread-plugin-0:9.4.1-1.el5.i386" }, "product_reference": "acroread-plugin-0:9.4.1-1.el5.i386", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "acroread-0:9.4.1-1.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:acroread-0:9.4.1-1.el5.i386" }, "product_reference": "acroread-0:9.4.1-1.el5.i386", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "acroread-plugin-0:9.4.1-1.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:acroread-plugin-0:9.4.1-1.el5.i386" }, "product_reference": "acroread-plugin-0:9.4.1-1.el5.i386", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "acroread-0:9.4.1-1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:acroread-0:9.4.1-1.el6.i686" }, "product_reference": "acroread-0:9.4.1-1.el6.i686", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "acroread-plugin-0:9.4.1-1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:acroread-plugin-0:9.4.1-1.el6.i686" }, "product_reference": "acroread-plugin-0:9.4.1-1.el6.i686", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "acroread-0:9.4.1-1.el6.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:acroread-0:9.4.1-1.el6.i686" }, "product_reference": "acroread-0:9.4.1-1.el6.i686", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "acroread-plugin-0:9.4.1-1.el6.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:acroread-plugin-0:9.4.1-1.el6.i686" }, "product_reference": "acroread-plugin-0:9.4.1-1.el6.i686", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "acroread-0:9.4.1-1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:acroread-0:9.4.1-1.el6.i686" }, "product_reference": "acroread-0:9.4.1-1.el6.i686", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "acroread-plugin-0:9.4.1-1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:acroread-plugin-0:9.4.1-1.el6.i686" }, "product_reference": "acroread-plugin-0:9.4.1-1.el6.i686", "relates_to_product_reference": "6Workstation-Supplementary" } ] }, "vulnerabilities": [ { "cve": "CVE-2010-3654", "discovery_date": "2010-10-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "647525" } ], "notes": [ { "category": "description", "text": "Adobe Flash Player before 9.0.289.0 and 10.x before 10.1.102.64 on Windows, Mac OS X, Linux, and Solaris and 10.1.95.1 on Android, and authplay.dll (aka AuthPlayLib.bundle or libauthplay.so.0.0.0) in Adobe Reader and Acrobat 9.x through 9.4, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via crafted SWF content, as exploited in the wild in October 2010.", "title": "Vulnerability description" }, { "category": "summary", "text": "acroread/flash-plugin: critical vulnerablility (APSA10-05, APSB10-26)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:acroread-0:9.4.1-1.el4.i386", "4AS-LACD:acroread-plugin-0:9.4.1-1.el4.i386", "4Desktop-LACD:acroread-0:9.4.1-1.el4.i386", "4Desktop-LACD:acroread-plugin-0:9.4.1-1.el4.i386", "4ES-LACD:acroread-0:9.4.1-1.el4.i386", "4ES-LACD:acroread-plugin-0:9.4.1-1.el4.i386", "4WS-LACD:acroread-0:9.4.1-1.el4.i386", "4WS-LACD:acroread-plugin-0:9.4.1-1.el4.i386", "5Client-Supplementary:acroread-0:9.4.1-1.el5.i386", "5Client-Supplementary:acroread-plugin-0:9.4.1-1.el5.i386", "5Server-Supplementary:acroread-0:9.4.1-1.el5.i386", "5Server-Supplementary:acroread-plugin-0:9.4.1-1.el5.i386", "6Client-Supplementary:acroread-0:9.4.1-1.el6.i686", "6Client-Supplementary:acroread-plugin-0:9.4.1-1.el6.i686", "6Server-Supplementary:acroread-0:9.4.1-1.el6.i686", "6Server-Supplementary:acroread-plugin-0:9.4.1-1.el6.i686", "6Workstation-Supplementary:acroread-0:9.4.1-1.el6.i686", "6Workstation-Supplementary:acroread-plugin-0:9.4.1-1.el6.i686" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3654" }, { "category": "external", "summary": "RHBZ#647525", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=647525" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3654", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3654" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3654", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3654" } ], "release_date": "2010-10-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-12-01T21:16:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-LACD:acroread-0:9.4.1-1.el4.i386", "4AS-LACD:acroread-plugin-0:9.4.1-1.el4.i386", "4Desktop-LACD:acroread-0:9.4.1-1.el4.i386", "4Desktop-LACD:acroread-plugin-0:9.4.1-1.el4.i386", "4ES-LACD:acroread-0:9.4.1-1.el4.i386", "4ES-LACD:acroread-plugin-0:9.4.1-1.el4.i386", "4WS-LACD:acroread-0:9.4.1-1.el4.i386", "4WS-LACD:acroread-plugin-0:9.4.1-1.el4.i386", "5Client-Supplementary:acroread-0:9.4.1-1.el5.i386", "5Client-Supplementary:acroread-plugin-0:9.4.1-1.el5.i386", "5Server-Supplementary:acroread-0:9.4.1-1.el5.i386", "5Server-Supplementary:acroread-plugin-0:9.4.1-1.el5.i386", "6Client-Supplementary:acroread-0:9.4.1-1.el6.i686", "6Client-Supplementary:acroread-plugin-0:9.4.1-1.el6.i686", "6Server-Supplementary:acroread-0:9.4.1-1.el6.i686", "6Server-Supplementary:acroread-plugin-0:9.4.1-1.el6.i686", "6Workstation-Supplementary:acroread-0:9.4.1-1.el6.i686", "6Workstation-Supplementary:acroread-plugin-0:9.4.1-1.el6.i686" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0934" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-LACD:acroread-0:9.4.1-1.el4.i386", "4AS-LACD:acroread-plugin-0:9.4.1-1.el4.i386", "4Desktop-LACD:acroread-0:9.4.1-1.el4.i386", "4Desktop-LACD:acroread-plugin-0:9.4.1-1.el4.i386", "4ES-LACD:acroread-0:9.4.1-1.el4.i386", "4ES-LACD:acroread-plugin-0:9.4.1-1.el4.i386", "4WS-LACD:acroread-0:9.4.1-1.el4.i386", "4WS-LACD:acroread-plugin-0:9.4.1-1.el4.i386", "5Client-Supplementary:acroread-0:9.4.1-1.el5.i386", "5Client-Supplementary:acroread-plugin-0:9.4.1-1.el5.i386", "5Server-Supplementary:acroread-0:9.4.1-1.el5.i386", "5Server-Supplementary:acroread-plugin-0:9.4.1-1.el5.i386", "6Client-Supplementary:acroread-0:9.4.1-1.el6.i686", "6Client-Supplementary:acroread-plugin-0:9.4.1-1.el6.i686", "6Server-Supplementary:acroread-0:9.4.1-1.el6.i686", "6Server-Supplementary:acroread-plugin-0:9.4.1-1.el6.i686", "6Workstation-Supplementary:acroread-0:9.4.1-1.el6.i686", "6Workstation-Supplementary:acroread-plugin-0:9.4.1-1.el6.i686" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "acroread/flash-plugin: critical vulnerablility (APSA10-05, APSB10-26)" }, { "cve": "CVE-2010-4091", "discovery_date": "2010-11-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "651133" } ], "notes": [ { "category": "description", "text": "The EScript.api plugin in Adobe Reader and Acrobat 10.x before 10.0.1, 9.x before 9.4.1, and 8.x before 8.2.6 on Windows and Mac OS X allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted PDF document that triggers memory corruption, involving the printSeps function. NOTE: some of these details are obtained from third party information.", "title": "Vulnerability description" }, { "category": "summary", "text": "acroread: remote DoS or possible arbitrary code execution via EScript.api plugin", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:acroread-0:9.4.1-1.el4.i386", "4AS-LACD:acroread-plugin-0:9.4.1-1.el4.i386", "4Desktop-LACD:acroread-0:9.4.1-1.el4.i386", "4Desktop-LACD:acroread-plugin-0:9.4.1-1.el4.i386", "4ES-LACD:acroread-0:9.4.1-1.el4.i386", "4ES-LACD:acroread-plugin-0:9.4.1-1.el4.i386", "4WS-LACD:acroread-0:9.4.1-1.el4.i386", "4WS-LACD:acroread-plugin-0:9.4.1-1.el4.i386", "5Client-Supplementary:acroread-0:9.4.1-1.el5.i386", "5Client-Supplementary:acroread-plugin-0:9.4.1-1.el5.i386", "5Server-Supplementary:acroread-0:9.4.1-1.el5.i386", "5Server-Supplementary:acroread-plugin-0:9.4.1-1.el5.i386", "6Client-Supplementary:acroread-0:9.4.1-1.el6.i686", "6Client-Supplementary:acroread-plugin-0:9.4.1-1.el6.i686", "6Server-Supplementary:acroread-0:9.4.1-1.el6.i686", "6Server-Supplementary:acroread-plugin-0:9.4.1-1.el6.i686", "6Workstation-Supplementary:acroread-0:9.4.1-1.el6.i686", "6Workstation-Supplementary:acroread-plugin-0:9.4.1-1.el6.i686" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4091" }, { "category": "external", "summary": "RHBZ#651133", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=651133" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4091", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4091" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4091", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4091" } ], "release_date": "2010-11-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-12-01T21:16:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-LACD:acroread-0:9.4.1-1.el4.i386", "4AS-LACD:acroread-plugin-0:9.4.1-1.el4.i386", "4Desktop-LACD:acroread-0:9.4.1-1.el4.i386", "4Desktop-LACD:acroread-plugin-0:9.4.1-1.el4.i386", "4ES-LACD:acroread-0:9.4.1-1.el4.i386", "4ES-LACD:acroread-plugin-0:9.4.1-1.el4.i386", "4WS-LACD:acroread-0:9.4.1-1.el4.i386", "4WS-LACD:acroread-plugin-0:9.4.1-1.el4.i386", "5Client-Supplementary:acroread-0:9.4.1-1.el5.i386", "5Client-Supplementary:acroread-plugin-0:9.4.1-1.el5.i386", "5Server-Supplementary:acroread-0:9.4.1-1.el5.i386", "5Server-Supplementary:acroread-plugin-0:9.4.1-1.el5.i386", "6Client-Supplementary:acroread-0:9.4.1-1.el6.i686", "6Client-Supplementary:acroread-plugin-0:9.4.1-1.el6.i686", "6Server-Supplementary:acroread-0:9.4.1-1.el6.i686", "6Server-Supplementary:acroread-plugin-0:9.4.1-1.el6.i686", "6Workstation-Supplementary:acroread-0:9.4.1-1.el6.i686", "6Workstation-Supplementary:acroread-plugin-0:9.4.1-1.el6.i686" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0934" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-LACD:acroread-0:9.4.1-1.el4.i386", "4AS-LACD:acroread-plugin-0:9.4.1-1.el4.i386", "4Desktop-LACD:acroread-0:9.4.1-1.el4.i386", "4Desktop-LACD:acroread-plugin-0:9.4.1-1.el4.i386", "4ES-LACD:acroread-0:9.4.1-1.el4.i386", "4ES-LACD:acroread-plugin-0:9.4.1-1.el4.i386", "4WS-LACD:acroread-0:9.4.1-1.el4.i386", "4WS-LACD:acroread-plugin-0:9.4.1-1.el4.i386", "5Client-Supplementary:acroread-0:9.4.1-1.el5.i386", "5Client-Supplementary:acroread-plugin-0:9.4.1-1.el5.i386", "5Server-Supplementary:acroread-0:9.4.1-1.el5.i386", "5Server-Supplementary:acroread-plugin-0:9.4.1-1.el5.i386", "6Client-Supplementary:acroread-0:9.4.1-1.el6.i686", "6Client-Supplementary:acroread-plugin-0:9.4.1-1.el6.i686", "6Server-Supplementary:acroread-0:9.4.1-1.el6.i686", "6Server-Supplementary:acroread-plugin-0:9.4.1-1.el6.i686", "6Workstation-Supplementary:acroread-0:9.4.1-1.el6.i686", "6Workstation-Supplementary:acroread-plugin-0:9.4.1-1.el6.i686" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "acroread: remote DoS or possible arbitrary code execution via EScript.api plugin" } ] }
ghsa-c6x8-9r8h-9jrr
Vulnerability from github
Adobe Flash Player before 9.0.289.0 and 10.x before 10.1.102.64 on Windows, Mac OS X, Linux, and Solaris and 10.1.95.1 on Android, and authplay.dll (aka AuthPlayLib.bundle or libauthplay.so.0.0.0) in Adobe Reader and Acrobat 9.x through 9.4, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via crafted SWF content, as exploited in the wild in October 2010.
{ "affected": [], "aliases": [ "CVE-2010-3654" ], "database_specific": { "cwe_ids": [ "CWE-119" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2010-10-29T19:00:00Z", "severity": "HIGH" }, "details": "Adobe Flash Player before 9.0.289.0 and 10.x before 10.1.102.64 on Windows, Mac OS X, Linux, and Solaris and 10.1.95.1 on Android, and authplay.dll (aka AuthPlayLib.bundle or libauthplay.so.0.0.0) in Adobe Reader and Acrobat 9.x through 9.4, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via crafted SWF content, as exploited in the wild in October 2010.", "id": "GHSA-c6x8-9r8h-9jrr", "modified": "2022-05-17T01:03:59Z", "published": "2022-05-17T01:03:59Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3654" }, { "type": "WEB", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13294" }, { "type": "WEB", "url": "http://blogs.sun.com/security/entry/multiple_vulnerabilities_in_adobe_flash1" }, { "type": "WEB", "url": "http://contagiodump.blogspot.com/2010/10/potential-new-adobe-flash-player-zero.html" }, { "type": "WEB", "url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00002.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00001.html" }, { "type": "WEB", "url": "http://secunia.com/advisories/41917" }, { "type": "WEB", "url": "http://secunia.com/advisories/42030" }, { "type": "WEB", "url": "http://secunia.com/advisories/42183" }, { "type": "WEB", "url": "http://secunia.com/advisories/42401" }, { "type": "WEB", "url": "http://secunia.com/advisories/42926" }, { "type": "WEB", "url": "http://secunia.com/advisories/43025" }, { "type": "WEB", "url": "http://secunia.com/advisories/43026" }, { "type": "WEB", "url": "http://security.gentoo.org/glsa/glsa-201101-08.xml" }, { "type": "WEB", "url": "http://security.gentoo.org/glsa/glsa-201101-09.xml" }, { "type": "WEB", "url": "http://securityreason.com/securityalert/8210" }, { "type": "WEB", "url": "http://support.apple.com/kb/HT4435" }, { "type": "WEB", "url": "http://www.adobe.com/support/security/advisories/apsa10-05.html" }, { "type": "WEB", "url": "http://www.adobe.com/support/security/bulletins/apsb10-26.html" }, { "type": "WEB", "url": "http://www.adobe.com/support/security/bulletins/apsb10-28.html" }, { "type": "WEB", "url": "http://www.kb.cert.org/vuls/id/298081" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2010-0829.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2010-0834.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2010-0867.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2010-0934.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/44504" }, { "type": "WEB", "url": "http://www.securitytracker.com/id?1024659" }, { "type": "WEB", "url": "http://www.securitytracker.com/id?1024660" }, { "type": "WEB", "url": "http://www.turbolinux.co.jp/security/2011/TLSA-2011-2j.txt" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2010/2903" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2010/2906" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2010/2918" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2010/3111" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2011/0173" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2011/0191" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2011/0192" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2011/0344" } ], "schema_version": "1.4.0", "severity": [] }
gsd-2010-3654
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2010-3654", "description": "Adobe Flash Player before 9.0.289.0 and 10.x before 10.1.102.64 on Windows, Mac OS X, Linux, and Solaris and 10.1.95.1 on Android, and authplay.dll (aka AuthPlayLib.bundle or libauthplay.so.0.0.0) in Adobe Reader and Acrobat 9.x through 9.4, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via crafted SWF content, as exploited in the wild in October 2010.", "id": "GSD-2010-3654", "references": [ "https://www.suse.com/security/cve/CVE-2010-3654.html", "https://access.redhat.com/errata/RHSA-2010:0934", "https://access.redhat.com/errata/RHSA-2010:0867", "https://access.redhat.com/errata/RHSA-2010:0834", "https://access.redhat.com/errata/RHSA-2010:0829", "https://packetstormsecurity.com/files/cve/CVE-2010-3654" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2010-3654" ], "details": "Adobe Flash Player before 9.0.289.0 and 10.x before 10.1.102.64 on Windows, Mac OS X, Linux, and Solaris and 10.1.95.1 on Android, and authplay.dll (aka AuthPlayLib.bundle or libauthplay.so.0.0.0) in Adobe Reader and Acrobat 9.x through 9.4, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via crafted SWF content, as exploited in the wild in October 2010.", "id": "GSD-2010-3654", "modified": "2023-12-13T01:21:34.695944Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2010-3654", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Flash Player before 9.0.289.0 and 10.x before 10.1.102.64 on Windows, Mac OS X, Linux, and Solaris and 10.1.95.1 on Android, and authplay.dll (aka AuthPlayLib.bundle or libauthplay.so.0.0.0) in Adobe Reader and Acrobat 9.x through 9.4, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via crafted SWF content, as exploited in the wild in October 2010." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "ADV-2011-0192", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0192" }, { "name": "42183", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/42183" }, { "name": "http://contagiodump.blogspot.com/2010/10/potential-new-adobe-flash-player-zero.html", "refsource": "MISC", "url": "http://contagiodump.blogspot.com/2010/10/potential-new-adobe-flash-player-zero.html" }, { "name": "http://support.apple.com/kb/HT4435", "refsource": "CONFIRM", "url": "http://support.apple.com/kb/HT4435" }, { "name": "42030", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/42030" }, { "name": "ADV-2011-0191", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0191" }, { "name": "http://blogs.sun.com/security/entry/multiple_vulnerabilities_in_adobe_flash1", "refsource": "CONFIRM", "url": "http://blogs.sun.com/security/entry/multiple_vulnerabilities_in_adobe_flash1" }, { "name": "43025", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/43025" }, { "name": "ADV-2011-0344", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0344" }, { "name": "43026", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/43026" }, { "name": "GLSA-201101-09", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-201101-09.xml" }, { "name": "ADV-2010-2918", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/2918" }, { "name": "ADV-2010-3111", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/3111" }, { "name": "41917", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/41917" }, { "name": "APPLE-SA-2010-11-10-1", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html" }, { "name": "GLSA-201101-08", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-201101-08.xml" }, { "name": "RHSA-2010:0834", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2010-0834.html" }, { "name": "SUSE-SA:2010:055", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00002.html" }, { "name": "1024660", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1024660" }, { "name": "42926", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/42926" }, { "name": "RHSA-2010:0934", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2010-0934.html" }, { "name": "ADV-2010-2903", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/2903" }, { "name": "ADV-2011-0173", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0173" }, { "name": "42401", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/42401" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb10-26.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb10-26.html" }, { "name": "VU#298081", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/298081" }, { "name": "1024659", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1024659" }, { "name": "TLSA-2011-2", "refsource": "TURBO", "url": "http://www.turbolinux.co.jp/security/2011/TLSA-2011-2j.txt" }, { "name": "44504", "refsource": "BID", "url": "http://www.securityfocus.com/bid/44504" }, { "name": "http://www.adobe.com/support/security/advisories/apsa10-05.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/advisories/apsa10-05.html" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb10-28.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb10-28.html" }, { "name": "SUSE-SA:2010:058", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00001.html" }, { "name": "8210", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/8210" }, { "name": "ADV-2010-2906", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/2906" }, { "name": "RHSA-2010:0867", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2010-0867.html" }, { "name": "RHSA-2010:0829", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2010-0829.html" }, { "name": "oval:org.mitre.oval:def:13294", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13294" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:10.1.82.76:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "10.1.85.3", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:10.0.45.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:10.0.32.18:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:9.0.125.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:9.0.152.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:9.0.151.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:9.0.115.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:9.0.20.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:9.0.159.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:8.0.33.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:7.0.25:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:7.0.63:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:7.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:6.0.21.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:macromedia:flash_player:6.0.40.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:macromedia:flash_player:6.0.29.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:10.1.52.15:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:10.1.52.14.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:10.0.12.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:10.0.22.87:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:9.125.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:9.0.18d60:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:9.0.31.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:9.0.31:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:8.0.22.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:8.0.42.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:7.0.69.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:7.0.70.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:6.0.79:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:macromedia:flash_player:5.0_r50:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:macromedia:flash_player:6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:10.0.12.36:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:10.0.15.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:9.0.112.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:9.0.28.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:9.0.16:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:9.0.45.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:9.0.124.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:9.0.48.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:8.0.24.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:8.0.34.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:7.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:7.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:macromedia:flash_player:5.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:macromedia:flash_player:6.0.79.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:10.1.53.64:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:10.0.42.34:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:10.0.0.584:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:9.0.260.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:9.0.246.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:9.0.28:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:9.0.20:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:9.0.47.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:9.0.114.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:8.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:8.0.35.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:8.0.39.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:7.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:macromedia:flash_player:6.0.65.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:macromedia:flash_player:6.0.47.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:oracle:solaris:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:10.1.53.64:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:10.0.0.584:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:10.0.45.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:9.0.246.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:9.0.125.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:9.0.20:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:9.0.115.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:9.0.114.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:9.0.159.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:8.0.35.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:8.0.39.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:10.1.82.76:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:10.1.52.15:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:10.0.32.18:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:10.0.12.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:9.0.152.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:9.0.151.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:9.0.20.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:9.0.31.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:8.0.33.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:8.0.22.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:7.0.25:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:7.0.63:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:7.0.69.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:6.0.21.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:6.0.79:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:macromedia:flash_player:6.0.29.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:macromedia:flash_player:6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:10.1.52.14.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:10.0.12.36:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:10.0.22.87:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:9.0.112.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:9.125.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:9.0.18d60:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:9.0.16:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:9.0.31:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:9.0.124.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:8.0.42.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:8.0.24.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:7.0.70.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:7.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:macromedia:flash_player:5.0_r50:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:macromedia:flash_player:5.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:10.1.85.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:10.1.92.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:7.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:7.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:macromedia:flash_player:6.0.47.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:macromedia:flash_player:6.0.40.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:10.0.15.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:10.0.42.34:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:9.0.28.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:9.0.260.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:9.0.45.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:9.0.28:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:9.0.48.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:9.0.47.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:8.0.34.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:8.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:7.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:macromedia:flash_player:6.0.79.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:macromedia:flash_player:6.0.65.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:10.1.92.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "10.1.95.2", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:google:android:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:adobe:acrobat:9.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat:9.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat:9.3.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat:9.3.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat_reader:9.1.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat_reader:9.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat:9.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat:9.1.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat:9.3.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat:9.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat_reader:9.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat_reader:9.3.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat:9.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat:9.3.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat_reader:9.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat_reader:9.1.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat_reader:9.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat:9.1.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat:9.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat_reader:9.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat_reader:9.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat_reader:9.3.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat_reader:9.3.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat_reader:9.3.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2010-3654" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "Adobe Flash Player before 9.0.289.0 and 10.x before 10.1.102.64 on Windows, Mac OS X, Linux, and Solaris and 10.1.95.1 on Android, and authplay.dll (aka AuthPlayLib.bundle or libauthplay.so.0.0.0) in Adobe Reader and Acrobat 9.x through 9.4, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via crafted SWF content, as exploited in the wild in October 2010." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-119" } ] } ] }, "references": { "reference_data": [ { "name": "http://contagiodump.blogspot.com/2010/10/potential-new-adobe-flash-player-zero.html", "refsource": "MISC", "tags": [ "Exploit" ], "url": "http://contagiodump.blogspot.com/2010/10/potential-new-adobe-flash-player-zero.html" }, { "name": "41917", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/41917" }, { "name": "44504", "refsource": "BID", "tags": [], "url": "http://www.securityfocus.com/bid/44504" }, { "name": "http://www.adobe.com/support/security/advisories/apsa10-05.html", "refsource": "CONFIRM", "tags": [ "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/advisories/apsa10-05.html" }, { "name": "VU#298081", "refsource": "CERT-VN", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/298081" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb10-26.html", "refsource": "CONFIRM", "tags": [], "url": "http://www.adobe.com/support/security/bulletins/apsb10-26.html" }, { "name": "http://support.apple.com/kb/HT4435", "refsource": "CONFIRM", "tags": [], "url": "http://support.apple.com/kb/HT4435" }, { "name": "APPLE-SA-2010-11-10-1", "refsource": "APPLE", "tags": [], "url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html" }, { "name": "ADV-2010-2906", "refsource": "VUPEN", "tags": [], "url": "http://www.vupen.com/english/advisories/2010/2906" }, { "name": "1024659", "refsource": "SECTRACK", "tags": [], "url": "http://www.securitytracker.com/id?1024659" }, { "name": "RHSA-2010:0834", "refsource": "REDHAT", "tags": [], "url": "http://www.redhat.com/support/errata/RHSA-2010-0834.html" }, { "name": "42030", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/42030" }, { "name": "ADV-2010-2903", "refsource": "VUPEN", "tags": [], "url": "http://www.vupen.com/english/advisories/2010/2903" }, { "name": "RHSA-2010:0829", "refsource": "REDHAT", "tags": [], "url": "http://www.redhat.com/support/errata/RHSA-2010-0829.html" }, { "name": "1024660", "refsource": "SECTRACK", "tags": [], "url": "http://www.securitytracker.com/id?1024660" }, { "name": "42183", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/42183" }, { "name": "ADV-2010-2918", "refsource": "VUPEN", "tags": [], "url": "http://www.vupen.com/english/advisories/2010/2918" }, { "name": "RHSA-2010:0867", "refsource": "REDHAT", "tags": [], "url": "http://www.redhat.com/support/errata/RHSA-2010-0867.html" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb10-28.html", "refsource": "CONFIRM", "tags": [], "url": "http://www.adobe.com/support/security/bulletins/apsb10-28.html" }, { "name": "RHSA-2010:0934", "refsource": "REDHAT", "tags": [], "url": "http://www.redhat.com/support/errata/RHSA-2010-0934.html" }, { "name": "ADV-2010-3111", "refsource": "VUPEN", "tags": [], "url": "http://www.vupen.com/english/advisories/2010/3111" }, { "name": "SUSE-SA:2010:058", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00001.html" }, { "name": "42401", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/42401" }, { "name": "http://blogs.sun.com/security/entry/multiple_vulnerabilities_in_adobe_flash1", "refsource": "CONFIRM", "tags": [], "url": "http://blogs.sun.com/security/entry/multiple_vulnerabilities_in_adobe_flash1" }, { "name": "42926", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/42926" }, { "name": "GLSA-201101-09", "refsource": "GENTOO", "tags": [], "url": "http://security.gentoo.org/glsa/glsa-201101-09.xml" }, { "name": "GLSA-201101-08", "refsource": "GENTOO", "tags": [], "url": "http://security.gentoo.org/glsa/glsa-201101-08.xml" }, { "name": "ADV-2011-0173", "refsource": "VUPEN", "tags": [], "url": "http://www.vupen.com/english/advisories/2011/0173" }, { "name": "SUSE-SA:2010:055", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00002.html" }, { "name": "43026", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/43026" }, { "name": "ADV-2011-0192", "refsource": "VUPEN", "tags": [], "url": "http://www.vupen.com/english/advisories/2011/0192" }, { "name": "ADV-2011-0191", "refsource": "VUPEN", "tags": [], "url": "http://www.vupen.com/english/advisories/2011/0191" }, { "name": "43025", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/43025" }, { "name": "ADV-2011-0344", "refsource": "VUPEN", "tags": [], "url": "http://www.vupen.com/english/advisories/2011/0344" }, { "name": "TLSA-2011-2", "refsource": "TURBO", "tags": [], "url": "http://www.turbolinux.co.jp/security/2011/TLSA-2011-2j.txt" }, { "name": "8210", "refsource": "SREASON", "tags": [], "url": "http://securityreason.com/securityalert/8210" }, { "name": "oval:org.mitre.oval:def:13294", "refsource": "OVAL", "tags": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13294" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": true } }, "lastModifiedDate": "2017-09-19T01:31Z", "publishedDate": "2010-10-29T19:00Z" } } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.