U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2010-2883

Change History

Modified Analysis by NIST 6/28/2024 10:16:27 AM

Action Type Old Value New Value
Added CVSS V3.1

								
							
							
						
NIST AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
Added CWE

								
							
							
						
NIST CWE-787
Removed CWE
NIST CWE-119

								
						
Changed CPE Configuration
AND
     OR
          *cpe:2.3:a:adobe:acrobat:8.0:*:*:*:*:*:*:*
          *cpe:2.3:a:adobe:acrobat:8.1:*:*:*:*:*:*:*
          *cpe:2.3:a:adobe:acrobat:8.1.1:*:*:*:*:*:*:*
          *cpe:2.3:a:adobe:acrobat:8.1.2:*:*:*:*:*:*:*
          *cpe:2.3:a:adobe:acrobat:8.1.3:*:*:*:*:*:*:*
          *cpe:2.3:a:adobe:acrobat:8.1.4:*:*:*:*:*:*:*
          *cpe:2.3:a:adobe:acrobat:8.1.5:*:*:*:*:*:*:*
          *cpe:2.3:a:adobe:acrobat:8.1.6:*:*:*:*:*:*:*
          *cpe:2.3:a:adobe:acrobat:8.1.7:*:*:*:*:*:*:*
          *cpe:2.3:a:adobe:acrobat:8.2:*:*:*:*:*:*:*
          *cpe:2.3:a:adobe:acrobat:8.2.1:*:*:*:*:*:*:*
          *cpe:2.3:a:adobe:acrobat:8.2.2:*:*:*:*:*:*:*
          *cpe:2.3:a:adobe:acrobat:8.2.4:*:*:*:*:*:*:*
          *cpe:2.3:a:adobe:acrobat:9.0:*:*:*:*:*:*:*
          *cpe:2.3:a:adobe:acrobat:9.1:*:*:*:*:*:*:*
          *cpe:2.3:a:adobe:acrobat:9.1.1:*:*:*:*:*:*:*
          *cpe:2.3:a:adobe:acrobat:9.1.2:*:*:*:*:*:*:*
          *cpe:2.3:a:adobe:acrobat:9.1.3:*:*:*:*:*:*:*
          *cpe:2.3:a:adobe:acrobat:9.2:*:*:*:*:*:*:*
          *cpe:2.3:a:adobe:acrobat:9.3:*:*:*:*:*:*:*
          *cpe:2.3:a:adobe:acrobat:9.3.1:*:*:*:*:*:*:*
          *cpe:2.3:a:adobe:acrobat:9.3.2:*:*:*:*:*:*:*
          *cpe:2.3:a:adobe:acrobat:9.3.3:*:*:*:*:*:*:*
          *cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:* versions up to (including) 9.3.4
     OR
          cpe:2.3:a:apple:mac_os_x:*:*:*:*:*:*:*:*
          cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*
AND
     OR
          *cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:* versions from (including) 8.0 up to (excluding) 8.2.5
          *cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:* versions from (including) 9.0 up to (excluding) 9.4
     OR
          cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*
          cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
Changed CPE Configuration
AND
     OR
          *cpe:2.3:a:adobe:acrobat_reader:8.0:*:*:*:*:*:*:*
          *cpe:2.3:a:adobe:acrobat_reader:8.1:*:*:*:*:*:*:*
          *cpe:2.3:a:adobe:acrobat_reader:8.1.1:*:*:*:*:*:*:*
          *cpe:2.3:a:adobe:acrobat_reader:8.1.2:*:*:*:*:*:*:*
          *cpe:2.3:a:adobe:acrobat_reader:8.1.4:*:*:*:*:*:*:*
          *cpe:2.3:a:adobe:acrobat_reader:8.1.5:*:*:*:*:*:*:*
          *cpe:2.3:a:adobe:acrobat_reader:8.1.6:*:*:*:*:*:*:*
          *cpe:2.3:a:adobe:acrobat_reader:8.1.7:*:*:*:*:*:*:*
          *cpe:2.3:a:adobe:acrobat_reader:8.2.1:*:*:*:*:*:*:*
          *cpe:2.3:a:adobe:acrobat_reader:8.2.2:*:*:*:*:*:*:*
          *cpe:2.3:a:adobe:acrobat_reader:8.2.3:*:*:*:*:*:*:*
          *cpe:2.3:a:adobe:acrobat_reader:8.2.4:*:*:*:*:*:*:*
          *cpe:2.3:a:adobe:acrobat_reader:9.0:*:*:*:*:*:*:*
          *cpe:2.3:a:adobe:acrobat_reader:9.1:*:*:*:*:*:*:*
          *cpe:2.3:a:adobe:acrobat_reader:9.1.1:*:*:*:*:*:*:*
          *cpe:2.3:a:adobe:acrobat_reader:9.1.2:*:*:*:*:*:*:*
          *cpe:2.3:a:adobe:acrobat_reader:9.1.3:*:*:*:*:*:*:*
          *cpe:2.3:a:adobe:acrobat_reader:9.2:*:*:*:*:*:*:*
          *cpe:2.3:a:adobe:acrobat_reader:9.3:*:*:*:*:*:*:*
          *cpe:2.3:a:adobe:acrobat_reader:9.3.1:*:*:*:*:*:*:*
          *cpe:2.3:a:adobe:acrobat_reader:9.3.2:*:*:*:*:*:*:*
          *cpe:2.3:a:adobe:acrobat_reader:9.3.3:*:*:*:*:*:*:*
          *cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:* versions up to (including) 9.3.4
     OR
          cpe:2.3:a:apple:mac_os_x:*:*:*:*:*:*:*:*
          cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*
AND
     OR
          *cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:* versions from (including) 8.0 up to (excluding) 8.2.5
          *cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:* versions from (including) 9.0 up to (excluding) 9.4
     OR
          cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*
          cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
Changed Reference Type
http://blog.metasploit.com/2010/09/return-of-unpublished-adobe.html No Types Assigned
http://blog.metasploit.com/2010/09/return-of-unpublished-adobe.html Broken Link
Changed Reference Type
http://community.websense.com/blogs/securitylabs/archive/2010/09/10/brief-analysis-on-adobe-reader-sing-table-parsing-vulnerability-cve-2010-2883.aspx No Types Assigned
http://community.websense.com/blogs/securitylabs/archive/2010/09/10/brief-analysis-on-adobe-reader-sing-table-parsing-vulnerability-cve-2010-2883.aspx Broken Link
Changed Reference Type
http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00001.html No Types Assigned
http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00001.html Broken Link
Changed Reference Type
http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html No Types Assigned
http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html Broken Link
Changed Reference Type
http://secunia.com/advisories/41340 Vendor Advisory
http://secunia.com/advisories/41340 Broken Link, Vendor Advisory
Changed Reference Type
http://secunia.com/advisories/43025 Vendor Advisory
http://secunia.com/advisories/43025 Broken Link, Vendor Advisory
Changed Reference Type
http://security.gentoo.org/glsa/glsa-201101-08.xml No Types Assigned
http://security.gentoo.org/glsa/glsa-201101-08.xml Third Party Advisory
Changed Reference Type
http://www.adobe.com/support/security/bulletins/apsb10-21.html No Types Assigned
http://www.adobe.com/support/security/bulletins/apsb10-21.html Vendor Advisory
Changed Reference Type
http://www.kb.cert.org/vuls/id/491991 US Government Resource
http://www.kb.cert.org/vuls/id/491991 Third Party Advisory, US Government Resource
Changed Reference Type
http://www.redhat.com/support/errata/RHSA-2010-0743.html No Types Assigned
http://www.redhat.com/support/errata/RHSA-2010-0743.html Broken Link
Changed Reference Type
http://www.securityfocus.com/bid/43057 No Types Assigned
http://www.securityfocus.com/bid/43057 Broken Link, Third Party Advisory, VDB Entry
Changed Reference Type
http://www.turbolinux.co.jp/security/2011/TLSA-2011-2j.txt No Types Assigned
http://www.turbolinux.co.jp/security/2011/TLSA-2011-2j.txt Broken Link
Changed Reference Type
http://www.us-cert.gov/cas/techalerts/TA10-279A.html US Government Resource
http://www.us-cert.gov/cas/techalerts/TA10-279A.html Third Party Advisory, US Government Resource
Changed Reference Type
http://www.vupen.com/english/advisories/2010/2331 Vendor Advisory
http://www.vupen.com/english/advisories/2010/2331 Broken Link, Vendor Advisory
Changed Reference Type
http://www.vupen.com/english/advisories/2011/0191 Vendor Advisory
http://www.vupen.com/english/advisories/2011/0191 Broken Link, Vendor Advisory
Changed Reference Type
http://www.vupen.com/english/advisories/2011/0344 Vendor Advisory
http://www.vupen.com/english/advisories/2011/0344 Broken Link, Vendor Advisory
Changed Reference Type
https://exchange.xforce.ibmcloud.com/vulnerabilities/61635 No Types Assigned
https://exchange.xforce.ibmcloud.com/vulnerabilities/61635 Third Party Advisory, VDB Entry
Changed Reference Type
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11586 No Types Assigned
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11586 Broken Link