U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2010-0129

Change History

Modified Analysis by NIST 6/07/2022 9:29:44 AM

Action Type Old Value New Value
Changed CPE Configuration
AND
     OR
          *cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*
          *cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*
          *cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*
          *cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*
          *cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*
          *cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*
          *cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*
          *cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*
          *cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*
          *cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*
          *cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*
          *cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*
          *cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*
          *cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*
          *cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*
          *cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:* versions up to (including) 11.5.6.606
     OR
          cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
          cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*
AND
     OR
          *cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:* versions up to (excluding) 11.5.7.609
     OR
          cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
          cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*
Added CVSS V3.1

								
							
							
						
NIST AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Added CWE

								
							
							
						
NIST CWE-190
Removed CWE
NIST CWE-189

								
						
Changed Reference Type
http://archives.neohapsis.com/archives/fulldisclosure/2010-05/0138.html No Types Assigned
http://archives.neohapsis.com/archives/fulldisclosure/2010-05/0138.html Broken Link
Changed Reference Type
http://hi.baidu.com/fs_fx/blog/item/fa74a61705b5e24621a4e951.html No Types Assigned
http://hi.baidu.com/fs_fx/blog/item/fa74a61705b5e24621a4e951.html Broken Link, Third Party Advisory
Changed Reference Type
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=869 Patch
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=869 Broken Link
Changed Reference Type
http://secunia.com/advisories/38751 Vendor Advisory
http://secunia.com/advisories/38751 Broken Link, Vendor Advisory
Changed Reference Type
http://secunia.com/secunia_research/2010-20/ Vendor Advisory
http://secunia.com/secunia_research/2010-20/ Broken Link, Vendor Advisory
Changed Reference Type
http://www.securityfocus.com/archive/1/511256/100/0/threaded No Types Assigned
http://www.securityfocus.com/archive/1/511256/100/0/threaded Broken Link, VDB Entry
Changed Reference Type
http://www.securityfocus.com/archive/1/511262/100/0/threaded No Types Assigned
http://www.securityfocus.com/archive/1/511262/100/0/threaded Broken Link, VDB Entry
Changed Reference Type
http://www.securityfocus.com/bid/40082 No Types Assigned
http://www.securityfocus.com/bid/40082 Broken Link, VDB Entry
Changed Reference Type
http://www.vupen.com/english/advisories/2010/1128 Patch, Vendor Advisory
http://www.vupen.com/english/advisories/2010/1128 Broken Link, Vendor Advisory
Changed Reference Type
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7134 No Types Assigned
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7134 Third Party Advisory