U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2010-1297

Change History

Modified Analysis by NIST 6/28/2024 10:20:44 AM

Action Type Old Value New Value
Changed CPE Configuration
OR
     *cpe:2.3:a:adobe:acrobat:9.0:*:*:*:*:*:*:*
     *cpe:2.3:a:adobe:acrobat:9.1:*:*:*:*:*:*:*
     *cpe:2.3:a:adobe:acrobat:9.1.1:*:*:*:*:*:*:*
     *cpe:2.3:a:adobe:acrobat:9.1.2:*:*:*:*:*:*:*
     *cpe:2.3:a:adobe:acrobat:9.1.3:*:*:*:*:*:*:*
     *cpe:2.3:a:adobe:acrobat:9.2:*:*:*:*:*:*:*
     *cpe:2.3:a:adobe:acrobat:9.3:*:*:*:*:*:*:*
     *cpe:2.3:a:adobe:acrobat:9.3.1:*:*:*:*:*:*:*
     *cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:* versions up to (including) 9.3.2
AND
     OR
          *cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:* versions from (including) 8.0 up to (excluding) 8.2.3
          *cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:* versions from (including) 9.0 up to (excluding) 9.3.3
     OR
          cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*
          cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
Changed CPE Configuration
OR
     *cpe:2.3:a:adobe:flash_player:9.0.16:*:*:*:*:*:*:*
     *cpe:2.3:a:adobe:flash_player:9.0.18d60:*:*:*:*:*:*:*
     *cpe:2.3:a:adobe:flash_player:9.0.20:*:*:*:*:*:*:*
     *cpe:2.3:a:adobe:flash_player:9.0.20.0:*:*:*:*:*:*:*
     *cpe:2.3:a:adobe:flash_player:9.0.28:*:*:*:*:*:*:*
     *cpe:2.3:a:adobe:flash_player:9.0.28.0:*:*:*:*:*:*:*
     *cpe:2.3:a:adobe:flash_player:9.0.31:*:*:*:*:*:*:*
     *cpe:2.3:a:adobe:flash_player:9.0.31.0:*:*:*:*:*:*:*
     *cpe:2.3:a:adobe:flash_player:9.0.45.0:*:*:*:*:*:*:*
     *cpe:2.3:a:adobe:flash_player:9.0.47.0:*:*:*:*:*:*:*
     *cpe:2.3:a:adobe:flash_player:9.0.48.0:*:*:*:*:*:*:*
     *cpe:2.3:a:adobe:flash_player:9.0.112.0:*:*:*:*:*:*:*
     *cpe:2.3:a:adobe:flash_player:9.0.114.0:*:*:*:*:*:*:*
     *cpe:2.3:a:adobe:flash_player:9.0.115.0:*:*:*:*:*:*:*
     *cpe:2.3:a:adobe:flash_player:9.0.124.0:*:*:*:*:*:*:*
     *cpe:2.3:a:adobe:flash_player:9.0.125.0:*:*:*:*:*:*:*
     *cpe:2.3:a:adobe:flash_player:9.0.151.0:*:*:*:*:*:*:*
     *cpe:2.3:a:adobe:flash_player:9.0.152.0:*:*:*:*:*:*:*
     *cpe:2.3:a:adobe:flash_player:9.0.159.0:*:*:*:*:*:*:*
     *cpe:2.3:a:adobe:flash_player:9.0.246.0:*:*:*:*:*:*:*
     *cpe:2.3:a:adobe:flash_player:9.0.260.0:*:*:*:*:*:*:*
     *cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:* versions up to (including) 9.0.262.0
OR
     *cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:* versions up to (excluding) 2.0.2.12610
     *cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:* versions up to (excluding) 9.0.277.0
     *cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:* versions from (including) 10.0 up to (excluding) 10.1.53.64
Changed CPE Configuration
OR
     *cpe:2.3:a:adobe:acrobat_reader:9.0:*:*:*:*:*:*:*
     *cpe:2.3:a:adobe:acrobat_reader:9.1:*:*:*:*:*:*:*
     *cpe:2.3:a:adobe:acrobat_reader:9.1.1:*:*:*:*:*:*:*
     *cpe:2.3:a:adobe:acrobat_reader:9.1.2:*:*:*:*:*:*:*
     *cpe:2.3:a:adobe:acrobat_reader:9.1.3:*:*:*:*:*:*:*
     *cpe:2.3:a:adobe:acrobat_reader:9.2:*:*:*:*:*:*:*
     *cpe:2.3:a:adobe:acrobat_reader:9.3:*:*:*:*:*:*:*
     *cpe:2.3:a:adobe:acrobat_reader:9.3.1:*:*:*:*:*:*:*
     *cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:* versions up to (including) 9.3.2
OR
     *cpe:2.3:o:opensuse:opensuse:*:*:*:*:*:*:*:* versions from (including) 11.0 up to (including) 11.2
     *cpe:2.3:o:suse:linux_enterprise:10.0:sp3:*:*:*:*:*:*
     *cpe:2.3:o:suse:linux_enterprise:11.0:-:*:*:*:*:*:*
     *cpe:2.3:o:suse:linux_enterprise:11.0:sp1:*:*:*:*:*:*
Removed CPE Configuration
OR
     *cpe:2.3:a:adobe:flash_player:10.0.0.584:*:*:*:*:*:*:*
     *cpe:2.3:a:adobe:flash_player:10.0.12.10:*:*:*:*:*:*:*
     *cpe:2.3:a:adobe:flash_player:10.0.12.36:*:*:*:*:*:*:*
     *cpe:2.3:a:adobe:flash_player:10.0.15.3:*:*:*:*:*:*:*
     *cpe:2.3:a:adobe:flash_player:10.0.22.87:*:*:*:*:*:*:*
     *cpe:2.3:a:adobe:flash_player:10.0.32.18:*:*:*:*:*:*:*
     *cpe:2.3:a:adobe:flash_player:10.0.42.34:*:*:*:*:*:*:*
     *cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:* versions up to (including) 10.0.45.2

								
						
Added CVSS V3.1

								
							
							
						
NIST AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Added CWE

								
							
							
						
NIST CWE-787
Removed CWE
NIST NVD-CWE-noinfo

								
						
Changed Reference Type
http://blog.zynamics.com/2010/06/09/analyzing-the-currently-exploited-0-day-for-adobe-reader-and-adobe-flash/ No Types Assigned
http://blog.zynamics.com/2010/06/09/analyzing-the-currently-exploited-0-day-for-adobe-reader-and-adobe-flash/ Exploit
Changed Reference Type
http://community.websense.com/blogs/securitylabs/archive/2010/06/09/having-fun-with-adobe-0-day-exploits.aspx No Types Assigned
http://community.websense.com/blogs/securitylabs/archive/2010/06/09/having-fun-with-adobe-0-day-exploits.aspx Broken Link
Changed Reference Type
http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751 No Types Assigned
http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751 Broken Link
Changed Reference Type
http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html No Types Assigned
http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html Mailing List, Third Party Advisory
Changed Reference Type
http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00000.html No Types Assigned
http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00000.html Mailing List, Third Party Advisory
Changed Reference Type
http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html No Types Assigned
http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html Mailing List, Third Party Advisory
Changed Reference Type
http://secunia.com/advisories/40026 Vendor Advisory
http://secunia.com/advisories/40026 Broken Link, Vendor Advisory
Changed Reference Type
http://secunia.com/advisories/40034 Vendor Advisory
http://secunia.com/advisories/40034 Broken Link, Vendor Advisory
Changed Reference Type
http://secunia.com/advisories/40144 No Types Assigned
http://secunia.com/advisories/40144 Broken Link
Changed Reference Type
http://secunia.com/advisories/40545 No Types Assigned
http://secunia.com/advisories/40545 Broken Link
Changed Reference Type
http://secunia.com/advisories/43026 No Types Assigned
http://secunia.com/advisories/43026 Broken Link
Changed Reference Type
http://security.gentoo.org/glsa/glsa-201101-09.xml No Types Assigned
http://security.gentoo.org/glsa/glsa-201101-09.xml Third Party Advisory
Changed Reference Type
http://securitytracker.com/id?1024057 No Types Assigned
http://securitytracker.com/id?1024057 Broken Link, Third Party Advisory, VDB Entry
Changed Reference Type
http://securitytracker.com/id?1024058 No Types Assigned
http://securitytracker.com/id?1024058 Broken Link, Third Party Advisory, VDB Entry
Changed Reference Type
http://securitytracker.com/id?1024085 No Types Assigned
http://securitytracker.com/id?1024085 Broken Link, Third Party Advisory, VDB Entry
Changed Reference Type
http://securitytracker.com/id?1024086 No Types Assigned
http://securitytracker.com/id?1024086 Broken Link, Third Party Advisory, VDB Entry
Changed Reference Type
http://support.apple.com/kb/HT4435 No Types Assigned
http://support.apple.com/kb/HT4435 Broken Link
Changed Reference Type
http://www.adobe.com/support/security/bulletins/apsb10-14.html No Types Assigned
http://www.adobe.com/support/security/bulletins/apsb10-14.html Not Applicable
Changed Reference Type
http://www.adobe.com/support/security/bulletins/apsb10-15.html No Types Assigned
http://www.adobe.com/support/security/bulletins/apsb10-15.html Not Applicable
Changed Reference Type
http://www.exploit-db.com/exploits/13787 No Types Assigned
http://www.exploit-db.com/exploits/13787 Third Party Advisory, VDB Entry
Changed Reference Type
http://www.kb.cert.org/vuls/id/486225 US Government Resource
http://www.kb.cert.org/vuls/id/486225 Third Party Advisory, US Government Resource
Changed Reference Type
http://www.osvdb.org/65141 No Types Assigned
http://www.osvdb.org/65141 Broken Link
Changed Reference Type
http://www.redhat.com/support/errata/RHSA-2010-0464.html No Types Assigned
http://www.redhat.com/support/errata/RHSA-2010-0464.html Broken Link
Changed Reference Type
http://www.redhat.com/support/errata/RHSA-2010-0470.html No Types Assigned
http://www.redhat.com/support/errata/RHSA-2010-0470.html Broken Link
Changed Reference Type
http://www.securityfocus.com/bid/40586 No Types Assigned
http://www.securityfocus.com/bid/40586 Broken Link, Third Party Advisory, VDB Entry
Changed Reference Type
http://www.securityfocus.com/bid/40759 No Types Assigned
http://www.securityfocus.com/bid/40759 Broken Link, Third Party Advisory, VDB Entry
Changed Reference Type
http://www.turbolinux.co.jp/security/2010/TLSA-2010-19j.txt No Types Assigned
http://www.turbolinux.co.jp/security/2010/TLSA-2010-19j.txt Broken Link
Changed Reference Type
http://www.us-cert.gov/cas/techalerts/TA10-159A.html US Government Resource
http://www.us-cert.gov/cas/techalerts/TA10-159A.html Third Party Advisory, US Government Resource
Changed Reference Type
http://www.us-cert.gov/cas/techalerts/TA10-162A.html US Government Resource
http://www.us-cert.gov/cas/techalerts/TA10-162A.html Third Party Advisory, US Government Resource
Changed Reference Type
http://www.vupen.com/english/advisories/2010/1348 Vendor Advisory
http://www.vupen.com/english/advisories/2010/1348 Broken Link, Vendor Advisory
Changed Reference Type
http://www.vupen.com/english/advisories/2010/1349 Vendor Advisory
http://www.vupen.com/english/advisories/2010/1349 Broken Link, Vendor Advisory
Changed Reference Type
http://www.vupen.com/english/advisories/2010/1421 No Types Assigned
http://www.vupen.com/english/advisories/2010/1421 Broken Link
Changed Reference Type
http://www.vupen.com/english/advisories/2010/1432 No Types Assigned
http://www.vupen.com/english/advisories/2010/1432 Broken Link
Changed Reference Type
http://www.vupen.com/english/advisories/2010/1434 No Types Assigned
http://www.vupen.com/english/advisories/2010/1434 Broken Link
Changed Reference Type
http://www.vupen.com/english/advisories/2010/1453 No Types Assigned
http://www.vupen.com/english/advisories/2010/1453 Broken Link
Changed Reference Type
http://www.vupen.com/english/advisories/2010/1482 No Types Assigned
http://www.vupen.com/english/advisories/2010/1482 Broken Link
Changed Reference Type
http://www.vupen.com/english/advisories/2010/1522 No Types Assigned
http://www.vupen.com/english/advisories/2010/1522 Broken Link
Changed Reference Type
http://www.vupen.com/english/advisories/2010/1636 No Types Assigned
http://www.vupen.com/english/advisories/2010/1636 Broken Link
Changed Reference Type
http://www.vupen.com/english/advisories/2010/1793 No Types Assigned
http://www.vupen.com/english/advisories/2010/1793 Broken Link
Changed Reference Type
http://www.vupen.com/english/advisories/2011/0192 No Types Assigned
http://www.vupen.com/english/advisories/2011/0192 Broken Link
Changed Reference Type
https://exchange.xforce.ibmcloud.com/vulnerabilities/59137 No Types Assigned
https://exchange.xforce.ibmcloud.com/vulnerabilities/59137 Third Party Advisory, VDB Entry
Changed Reference Type
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7116 No Types Assigned
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7116 Broken Link