var-201009-0241
Vulnerability from variot

Adobe Flash Player 10.1.82.76 and earlier on Windows, Mac OS X, Linux, and Solaris and 10.1.92.10 on Android; authplay.dll in Adobe Reader and Acrobat 9.x before 9.4; and authplay.dll in Adobe Reader and Acrobat 8.x before 8.2.5 on Windows and Mac OS X allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, as exploited in the wild in September 2010. Adobe Flash Contains a vulnerability. Attack activity using this vulnerability has been confirmed.Crafted Flash By browsing a document with embedded content, arbitrary code may be executed. Failed attacks may cause denial-of-service conditions. The product enables viewing of applications, content and video across screens and browsers.

Background

The Adobe Flash Player is a renderer for the SWF file format, which is commonly used to provide interactive websites. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201101-08

                                        http://security.gentoo.org/

Severity: Normal Title: Adobe Reader: Multiple vulnerabilities Date: January 21, 2011 Bugs: #336508, #343091 ID: 201101-08

Synopsis

Multiple vulnerabilities in Adobe Reader might result in the execution of arbitrary code.

Background

Adobe Reader (formerly Adobe Acrobat Reader) is a closed-source PDF reader.

Affected packages

-------------------------------------------------------------------
 Package             /  Vulnerable  /                   Unaffected
-------------------------------------------------------------------

1 app-text/acroread < 9.4.1 >= 9.4.1

Description

Multiple vulnerabilities were discovered in Adobe Reader. For further information please consult the CVE entries and the Adobe Security Bulletins referenced below.

Workaround

There is no known workaround at this time.

Resolution

All Adobe Reader users should upgrade to the latest stable version:

# emerge --sync
# emerge --ask --oneshot --verbose ">=app-text/acroread-9.4.1"

References

[ 1 ] APSB10-21 http://www.adobe.com/support/security/bulletins/apsb10-21.html [ 2 ] APSB10-28 http://www.adobe.com/support/security/bulletins/apsb10-28.html [ 3 ] CVE-2010-2883 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2883 [ 4 ] CVE-2010-2884 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2884 [ 5 ] CVE-2010-2887 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2887 [ 6 ] CVE-2010-2889 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2889 [ 7 ] CVE-2010-2890 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2890 [ 8 ] CVE-2010-3619 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3619 [ 9 ] CVE-2010-3620 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3620 [ 10 ] CVE-2010-3621 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3621 [ 11 ] CVE-2010-3622 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3622 [ 12 ] CVE-2010-3625 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3625 [ 13 ] CVE-2010-3626 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3626 [ 14 ] CVE-2010-3627 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3627 [ 15 ] CVE-2010-3628 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3628 [ 16 ] CVE-2010-3629 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3629 [ 17 ] CVE-2010-3630 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3630 [ 18 ] CVE-2010-3632 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3632 [ 19 ] CVE-2010-3654 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3654 [ 20 ] CVE-2010-3656 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3656 [ 21 ] CVE-2010-3657 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3657 [ 22 ] CVE-2010-3658 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3658 [ 23 ] CVE-2010-4091 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4091

Availability

This GLSA and any updates to it are available for viewing at the Gentoo Security Website:

http://security.gentoo.org/glsa/glsa-201101-08.xml

Concerns?

Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.

License

Copyright 2011 Gentoo Foundation, Inc; referenced text belongs to its owner(s).

The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.5

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-201009-0241",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "acrobat",
            scope: "lte",
            trust: 1.8,
            vendor: "adobe",
            version: "9.3.4",
         },
         {
            model: "acrobat reader",
            scope: "eq",
            trust: 1.6,
            vendor: "adobe",
            version: "5.0.6",
         },
         {
            model: "acrobat reader",
            scope: "eq",
            trust: 1.6,
            vendor: "adobe",
            version: "5.0.10",
         },
         {
            model: "acrobat reader",
            scope: "eq",
            trust: 1.6,
            vendor: "adobe",
            version: "9.3.3",
         },
         {
            model: "acrobat reader",
            scope: "eq",
            trust: 1.6,
            vendor: "adobe",
            version: "5.0",
         },
         {
            model: "acrobat reader",
            scope: "eq",
            trust: 1.6,
            vendor: "adobe",
            version: "5.0.11",
         },
         {
            model: "acrobat reader",
            scope: "eq",
            trust: 1.6,
            vendor: "adobe",
            version: "5.0.9",
         },
         {
            model: "acrobat reader",
            scope: "eq",
            trust: 1.6,
            vendor: "adobe",
            version: "7.0.6",
         },
         {
            model: "acrobat reader",
            scope: "eq",
            trust: 1.6,
            vendor: "adobe",
            version: "5.0.5",
         },
         {
            model: "acrobat reader",
            scope: "eq",
            trust: 1.6,
            vendor: "adobe",
            version: "5.0.7",
         },
         {
            model: "acrobat reader",
            scope: "eq",
            trust: 1.6,
            vendor: "adobe",
            version: "8.0",
         },
         {
            model: "acrobat",
            scope: "eq",
            trust: 1.3,
            vendor: "adobe",
            version: "7.0.1",
         },
         {
            model: "acrobat",
            scope: "eq",
            trust: 1.3,
            vendor: "adobe",
            version: "8.2.3",
         },
         {
            model: "acrobat",
            scope: "eq",
            trust: 1.3,
            vendor: "adobe",
            version: "7.0.3",
         },
         {
            model: "acrobat",
            scope: "eq",
            trust: 1.3,
            vendor: "adobe",
            version: "8.2.2",
         },
         {
            model: "acrobat",
            scope: "eq",
            trust: 1.3,
            vendor: "adobe",
            version: "9.3.1",
         },
         {
            model: "acrobat",
            scope: "eq",
            trust: 1.3,
            vendor: "adobe",
            version: "9.3",
         },
         {
            model: "flash player",
            scope: "eq",
            trust: 1.3,
            vendor: "adobe",
            version: "10.0.32.18",
         },
         {
            model: "acrobat",
            scope: "eq",
            trust: 1.3,
            vendor: "adobe",
            version: "9.1.1",
         },
         {
            model: "flash player",
            scope: "eq",
            trust: 1.3,
            vendor: "adobe",
            version: "10.0.12.36",
         },
         {
            model: "acrobat",
            scope: "eq",
            trust: 1.3,
            vendor: "adobe",
            version: "7.1.2",
         },
         {
            model: "flash player",
            scope: "eq",
            trust: 1.3,
            vendor: "adobe",
            version: "10.0.22.87",
         },
         {
            model: "acrobat",
            scope: "eq",
            trust: 1.3,
            vendor: "adobe",
            version: "7.0",
         },
         {
            model: "flash player",
            scope: "eq",
            trust: 1.3,
            vendor: "adobe",
            version: "10.0.15.3",
         },
         {
            model: "acrobat",
            scope: "eq",
            trust: 1.3,
            vendor: "adobe",
            version: "7.0.9",
         },
         {
            model: "acrobat",
            scope: "eq",
            trust: 1.3,
            vendor: "adobe",
            version: "9.2",
         },
         {
            model: "flash player",
            scope: "eq",
            trust: 1.3,
            vendor: "adobe",
            version: "10.0.42.34",
         },
         {
            model: "acrobat",
            scope: "eq",
            trust: 1.3,
            vendor: "adobe",
            version: "9.3.3",
         },
         {
            model: "acrobat",
            scope: "eq",
            trust: 1.3,
            vendor: "adobe",
            version: "9.3.2",
         },
         {
            model: "acrobat",
            scope: "eq",
            trust: 1.3,
            vendor: "adobe",
            version: "7.0.2",
         },
         {
            model: "acrobat reader",
            scope: "eq",
            trust: 1,
            vendor: "adobe",
            version: "8.2.3",
         },
         {
            model: "acrobat",
            scope: "eq",
            trust: 1,
            vendor: "adobe",
            version: "5.0.10",
         },
         {
            model: "flash player",
            scope: "eq",
            trust: 1,
            vendor: "adobe",
            version: "7.1",
         },
         {
            model: "flash player",
            scope: "eq",
            trust: 1,
            vendor: "adobe",
            version: "8.0.24.0",
         },
         {
            model: "acrobat",
            scope: "eq",
            trust: 1,
            vendor: "adobe",
            version: "6.0.3",
         },
         {
            model: "acrobat reader",
            scope: "eq",
            trust: 1,
            vendor: "adobe",
            version: "3.01",
         },
         {
            model: "acrobat",
            scope: "eq",
            trust: 1,
            vendor: "adobe",
            version: "7.0.7",
         },
         {
            model: "acrobat",
            scope: "eq",
            trust: 1,
            vendor: "adobe",
            version: "6.0.2",
         },
         {
            model: "flash player",
            scope: "eq",
            trust: 1,
            vendor: "adobe",
            version: "9.0.20",
         },
         {
            model: "acrobat",
            scope: "eq",
            trust: 1,
            vendor: "adobe",
            version: "9.1",
         },
         {
            model: "acrobat",
            scope: "eq",
            trust: 1,
            vendor: "adobe",
            version: "7.0.5",
         },
         {
            model: "flash player",
            scope: "eq",
            trust: 1,
            vendor: "adobe",
            version: "8.0.34.0",
         },
         {
            model: "flash player",
            scope: "eq",
            trust: 1,
            vendor: "adobe",
            version: "7.2",
         },
         {
            model: "acrobat",
            scope: "eq",
            trust: 1,
            vendor: "adobe",
            version: "7.1.1",
         },
         {
            model: "acrobat reader",
            scope: "eq",
            trust: 1,
            vendor: "adobe",
            version: "6.0.3",
         },
         {
            model: "flash player",
            scope: "eq",
            trust: 1,
            vendor: "adobe",
            version: "9.0.16",
         },
         {
            model: "acrobat",
            scope: "eq",
            trust: 1,
            vendor: "adobe",
            version: "8.1.5",
         },
         {
            model: "flash player",
            scope: "eq",
            trust: 1,
            vendor: "adobe",
            version: "9.0.159.0",
         },
         {
            model: "acrobat",
            scope: "eq",
            trust: 1,
            vendor: "adobe",
            version: "8.1.1",
         },
         {
            model: "acrobat reader",
            scope: "eq",
            trust: 1,
            vendor: "adobe",
            version: "7.0.7",
         },
         {
            model: "acrobat",
            scope: "eq",
            trust: 1,
            vendor: "adobe",
            version: "8.0",
         },
         {
            model: "flash player",
            scope: "eq",
            trust: 1,
            vendor: "adobe",
            version: "8.0",
         },
         {
            model: "flash player",
            scope: "lte",
            trust: 1,
            vendor: "adobe",
            version: "10.1.82.76",
         },
         {
            model: "acrobat reader",
            scope: "eq",
            trust: 1,
            vendor: "adobe",
            version: "6.0.2",
         },
         {
            model: "acrobat reader",
            scope: "eq",
            trust: 1,
            vendor: "adobe",
            version: "8.2.2",
         },
         {
            model: "acrobat",
            scope: "eq",
            trust: 1,
            vendor: "adobe",
            version: "6.0.4",
         },
         {
            model: "acrobat reader",
            scope: "eq",
            trust: 1,
            vendor: "adobe",
            version: "9.1",
         },
         {
            model: "acrobat",
            scope: "eq",
            trust: 1,
            vendor: "adobe",
            version: "7.0.8",
         },
         {
            model: "acrobat reader",
            scope: "eq",
            trust: 1,
            vendor: "adobe",
            version: "7.0.5",
         },
         {
            model: "flash player",
            scope: "eq",
            trust: 1,
            vendor: "adobe",
            version: "9.0.28.0",
         },
         {
            model: "acrobat reader",
            scope: "eq",
            trust: 1,
            vendor: "adobe",
            version: "9.1.1",
         },
         {
            model: "flash player",
            scope: "eq",
            trust: 1,
            vendor: "adobe",
            version: "9.0.47.0",
         },
         {
            model: "acrobat reader",
            scope: "eq",
            trust: 1,
            vendor: "adobe",
            version: "8.1.5",
         },
         {
            model: "acrobat",
            scope: "eq",
            trust: 1,
            vendor: "adobe",
            version: "8.2",
         },
         {
            model: "acrobat reader",
            scope: "eq",
            trust: 1,
            vendor: "adobe",
            version: "8.1.1",
         },
         {
            model: "acrobat reader",
            scope: "eq",
            trust: 1,
            vendor: "adobe",
            version: "9.2",
         },
         {
            model: "acrobat",
            scope: "eq",
            trust: 1,
            vendor: "adobe",
            version: "3.0",
         },
         {
            model: "flash player",
            scope: "eq",
            trust: 1,
            vendor: "adobe",
            version: "9.0.151.0",
         },
         {
            model: "acrobat reader",
            scope: "eq",
            trust: 1,
            vendor: "adobe",
            version: "9.3.1",
         },
         {
            model: "acrobat",
            scope: "eq",
            trust: 1,
            vendor: "adobe",
            version: "8.1.6",
         },
         {
            model: "flash player",
            scope: "eq",
            trust: 1,
            vendor: "adobe",
            version: "9.0.112.0",
         },
         {
            model: "acrobat",
            scope: "eq",
            trust: 1,
            vendor: "adobe",
            version: "7.0.6",
         },
         {
            model: "acrobat reader",
            scope: "eq",
            trust: 1,
            vendor: "adobe",
            version: "6.0.4",
         },
         {
            model: "acrobat reader",
            scope: "eq",
            trust: 1,
            vendor: "adobe",
            version: "7.0.8",
         },
         {
            model: "acrobat",
            scope: "eq",
            trust: 1,
            vendor: "adobe",
            version: "7.1.4",
         },
         {
            model: "flash player",
            scope: "eq",
            trust: 1,
            vendor: "adobe",
            version: "10.0.0.584",
         },
         {
            model: "flash player",
            scope: "eq",
            trust: 1,
            vendor: "adobe",
            version: "9.0.125.0",
         },
         {
            model: "acrobat",
            scope: "eq",
            trust: 1,
            vendor: "adobe",
            version: "9.0",
         },
         {
            model: "acrobat",
            scope: "eq",
            trust: 1,
            vendor: "adobe",
            version: "8.1",
         },
         {
            model: "flash player",
            scope: "lte",
            trust: 1,
            vendor: "adobe",
            version: "10.1.92.10",
         },
         {
            model: "flash player",
            scope: "eq",
            trust: 1,
            vendor: "adobe",
            version: "9.0",
         },
         {
            model: "flash player",
            scope: "eq",
            trust: 1,
            vendor: "adobe",
            version: "9.0.152.0",
         },
         {
            model: "flash player",
            scope: "eq",
            trust: 1,
            vendor: "adobe",
            version: "9.0.124.0",
         },
         {
            model: "acrobat reader",
            scope: "eq",
            trust: 1,
            vendor: "adobe",
            version: "8.2",
         },
         {
            model: "acrobat reader",
            scope: "eq",
            trust: 1,
            vendor: "adobe",
            version: "5.1",
         },
         {
            model: "acrobat reader",
            scope: "eq",
            trust: 1,
            vendor: "adobe",
            version: "3.0",
         },
         {
            model: "flash player",
            scope: "eq",
            trust: 1,
            vendor: "adobe",
            version: "9.0.260.0",
         },
         {
            model: "acrobat reader",
            scope: "eq",
            trust: 1,
            vendor: "adobe",
            version: "4.5",
         },
         {
            model: "acrobat",
            scope: "eq",
            trust: 1,
            vendor: "adobe",
            version: "9.1.2",
         },
         {
            model: "flash player",
            scope: "eq",
            trust: 1,
            vendor: "adobe",
            version: "9.0.31",
         },
         {
            model: "acrobat reader",
            scope: "eq",
            trust: 1,
            vendor: "adobe",
            version: "8.1.6",
         },
         {
            model: "flash player",
            scope: "eq",
            trust: 1,
            vendor: "adobe",
            version: "7.0.70.0",
         },
         {
            model: "acrobat",
            scope: "eq",
            trust: 1,
            vendor: "adobe",
            version: "4.0.5",
         },
         {
            model: "flash player",
            scope: "eq",
            trust: 1,
            vendor: "adobe",
            version: "7.0.69.0",
         },
         {
            model: "acrobat reader",
            scope: "eq",
            trust: 1,
            vendor: "adobe",
            version: "9.0",
         },
         {
            model: "acrobat reader",
            scope: "eq",
            trust: 1,
            vendor: "adobe",
            version: "8.1",
         },
         {
            model: "flash player",
            scope: "eq",
            trust: 1,
            vendor: "adobe",
            version: "7.0.1",
         },
         {
            model: "flash player",
            scope: "eq",
            trust: 1,
            vendor: "adobe",
            version: "9.0.115.0",
         },
         {
            model: "flash player",
            scope: "eq",
            trust: 1,
            vendor: "adobe",
            version: "9.0.31.0",
         },
         {
            model: "flash player",
            scope: "eq",
            trust: 1,
            vendor: "adobe",
            version: "9.0.48.0",
         },
         {
            model: "acrobat reader",
            scope: "eq",
            trust: 1,
            vendor: "adobe",
            version: "9.1.2",
         },
         {
            model: "flash player",
            scope: "eq",
            trust: 1,
            vendor: "adobe",
            version: "8.0.33.0",
         },
         {
            model: "acrobat",
            scope: "eq",
            trust: 1,
            vendor: "adobe",
            version: "5.0.6",
         },
         {
            model: "acrobat reader",
            scope: "eq",
            trust: 1,
            vendor: "adobe",
            version: "4.0.5",
         },
         {
            model: "acrobat",
            scope: "eq",
            trust: 1,
            vendor: "adobe",
            version: "4.0.5c",
         },
         {
            model: "acrobat",
            scope: "eq",
            trust: 1,
            vendor: "adobe",
            version: "3.1",
         },
         {
            model: "acrobat",
            scope: "eq",
            trust: 1,
            vendor: "adobe",
            version: "8.1.3",
         },
         {
            model: "acrobat",
            scope: "eq",
            trust: 1,
            vendor: "adobe",
            version: "5.0.5",
         },
         {
            model: "acrobat reader",
            scope: "eq",
            trust: 1,
            vendor: "adobe",
            version: "7.0.1",
         },
         {
            model: "acrobat reader",
            scope: "eq",
            trust: 1,
            vendor: "adobe",
            version: "7.0.9",
         },
         {
            model: "acrobat",
            scope: "eq",
            trust: 1,
            vendor: "adobe",
            version: "8.1.7",
         },
         {
            model: "acrobat",
            scope: "eq",
            trust: 1,
            vendor: "adobe",
            version: "7.1.0",
         },
         {
            model: "acrobat reader",
            scope: "eq",
            trust: 1,
            vendor: "adobe",
            version: "7.0.3",
         },
         {
            model: "acrobat reader",
            scope: "eq",
            trust: 1,
            vendor: "adobe",
            version: "3.02",
         },
         {
            model: "flash player",
            scope: "eq",
            trust: 1,
            vendor: "adobe",
            version: "8.0.22.0",
         },
         {
            model: "acrobat reader",
            scope: "eq",
            trust: 1,
            vendor: "adobe",
            version: "4.0.5c",
         },
         {
            model: "flash player",
            scope: "eq",
            trust: 1,
            vendor: "adobe",
            version: "9.0.246.0",
         },
         {
            model: "flash player",
            scope: "eq",
            trust: 1,
            vendor: "adobe",
            version: "9.0.45.0",
         },
         {
            model: "acrobat reader",
            scope: "lte",
            trust: 1,
            vendor: "adobe",
            version: "9.3.4",
         },
         {
            model: "flash player",
            scope: "eq",
            trust: 1,
            vendor: "adobe",
            version: "7.0.25",
         },
         {
            model: "flash player",
            scope: "eq",
            trust: 1,
            vendor: "adobe",
            version: "9.0.20.0",
         },
         {
            model: "acrobat reader",
            scope: "eq",
            trust: 1,
            vendor: "adobe",
            version: "8.1.7",
         },
         {
            model: "flash player",
            scope: "eq",
            trust: 1,
            vendor: "adobe",
            version: "8.0.35.0",
         },
         {
            model: "acrobat reader",
            scope: "eq",
            trust: 1,
            vendor: "adobe",
            version: "7.1.0",
         },
         {
            model: "flash player",
            scope: "eq",
            trust: 1,
            vendor: "adobe",
            version: "10.0.12.10",
         },
         {
            model: "acrobat",
            scope: "eq",
            trust: 1,
            vendor: "adobe",
            version: "8.1.2",
         },
         {
            model: "acrobat",
            scope: "eq",
            trust: 1,
            vendor: "adobe",
            version: "6.0.1",
         },
         {
            model: "acrobat",
            scope: "eq",
            trust: 1,
            vendor: "adobe",
            version: "7.1.3",
         },
         {
            model: "acrobat",
            scope: "eq",
            trust: 1,
            vendor: "adobe",
            version: "8.1.4",
         },
         {
            model: "acrobat",
            scope: "eq",
            trust: 1,
            vendor: "adobe",
            version: "4.0.5a",
         },
         {
            model: "acrobat",
            scope: "eq",
            trust: 1,
            vendor: "adobe",
            version: "7.0.4",
         },
         {
            model: "acrobat",
            scope: "eq",
            trust: 1,
            vendor: "adobe",
            version: "9.1.3",
         },
         {
            model: "flash player",
            scope: "eq",
            trust: 1,
            vendor: "adobe",
            version: "9.0.114.0",
         },
         {
            model: "acrobat",
            scope: "eq",
            trust: 1,
            vendor: "adobe",
            version: "6.0.6",
         },
         {
            model: "flash player",
            scope: "eq",
            trust: 1,
            vendor: "adobe",
            version: "9.0.18d60",
         },
         {
            model: "acrobat",
            scope: "eq",
            trust: 1,
            vendor: "adobe",
            version: "8.2.1",
         },
         {
            model: "acrobat reader",
            scope: "eq",
            trust: 1,
            vendor: "adobe",
            version: "9.3",
         },
         {
            model: "acrobat",
            scope: "eq",
            trust: 1,
            vendor: "adobe",
            version: "6.0",
         },
         {
            model: "acrobat reader",
            scope: "eq",
            trust: 1,
            vendor: "adobe",
            version: "7.0.2",
         },
         {
            model: "flash player",
            scope: "eq",
            trust: 1,
            vendor: "adobe",
            version: "7.0",
         },
         {
            model: "flash player",
            scope: "eq",
            trust: 1,
            vendor: "adobe",
            version: "7.0.63",
         },
         {
            model: "flash player",
            scope: "eq",
            trust: 1,
            vendor: "adobe",
            version: "9.125.0",
         },
         {
            model: "acrobat",
            scope: "eq",
            trust: 1,
            vendor: "adobe",
            version: "4.0",
         },
         {
            model: "acrobat reader",
            scope: "eq",
            trust: 1,
            vendor: "adobe",
            version: "8.1.2",
         },
         {
            model: "flash player",
            scope: "eq",
            trust: 1,
            vendor: "adobe",
            version: "7.1.1",
         },
         {
            model: "acrobat reader",
            scope: "eq",
            trust: 1,
            vendor: "adobe",
            version: "6.0.1",
         },
         {
            model: "acrobat",
            scope: "eq",
            trust: 1,
            vendor: "adobe",
            version: "6.0.5",
         },
         {
            model: "flash player",
            scope: "eq",
            trust: 1,
            vendor: "adobe",
            version: "9.0.28",
         },
         {
            model: "flash player",
            scope: "eq",
            trust: 1,
            vendor: "adobe",
            version: "8.0.39.0",
         },
         {
            model: "acrobat reader",
            scope: "eq",
            trust: 1,
            vendor: "adobe",
            version: "8.1.4",
         },
         {
            model: "acrobat reader",
            scope: "eq",
            trust: 1,
            vendor: "adobe",
            version: "9.3.2",
         },
         {
            model: "acrobat reader",
            scope: "eq",
            trust: 1,
            vendor: "adobe",
            version: "4.0.5a",
         },
         {
            model: "acrobat reader",
            scope: "eq",
            trust: 1,
            vendor: "adobe",
            version: "7.0.4",
         },
         {
            model: "acrobat reader",
            scope: "eq",
            trust: 1,
            vendor: "adobe",
            version: "9.1.3",
         },
         {
            model: "acrobat reader",
            scope: "eq",
            trust: 1,
            vendor: "adobe",
            version: "8.2.1",
         },
         {
            model: "flash player",
            scope: "eq",
            trust: 1,
            vendor: "adobe",
            version: "8.0.42.0",
         },
         {
            model: "acrobat reader",
            scope: "eq",
            trust: 1,
            vendor: "adobe",
            version: "6.0",
         },
         {
            model: "acrobat reader",
            scope: "eq",
            trust: 1,
            vendor: "adobe",
            version: "7.0",
         },
         {
            model: "acrobat",
            scope: "eq",
            trust: 1,
            vendor: "adobe",
            version: "5.0",
         },
         {
            model: "acrobat reader",
            scope: "eq",
            trust: 1,
            vendor: "adobe",
            version: "4.0",
         },
         {
            model: "acrobat reader",
            scope: "eq",
            trust: 1,
            vendor: "adobe",
            version: "6.0.5",
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "adobe",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "google",
            version: null,
         },
         {
            model: "mac os x",
            scope: "eq",
            trust: 0.8,
            vendor: "apple",
            version: "v10.5.8",
         },
         {
            model: "mac os x",
            scope: "eq",
            trust: 0.8,
            vendor: "apple",
            version: "v10.6 to  v10.6.4",
         },
         {
            model: "mac os x server",
            scope: "eq",
            trust: 0.8,
            vendor: "apple",
            version: "v10.5.8",
         },
         {
            model: "mac os x server",
            scope: "eq",
            trust: 0.8,
            vendor: "apple",
            version: "v10.6 to  v10.6.4",
         },
         {
            model: "flash player",
            scope: "lte",
            trust: 0.8,
            vendor: "adobe",
            version: "10.1.82.76   windows edition",
         },
         {
            model: "flash player",
            scope: "eq",
            trust: 0.8,
            vendor: "adobe",
            version: "macintosh edition",
         },
         {
            model: "flash player",
            scope: "eq",
            trust: 0.8,
            vendor: "adobe",
            version: "linux edition",
         },
         {
            model: "flash player",
            scope: "eq",
            trust: 0.8,
            vendor: "adobe",
            version: "solaris edition",
         },
         {
            model: "flash player",
            scope: "eq",
            trust: 0.8,
            vendor: "adobe",
            version: "10.1.92.10 android edition",
         },
         {
            model: "reader",
            scope: "lte",
            trust: 0.8,
            vendor: "adobe",
            version: "9.3.4",
         },
         {
            model: "solaris",
            scope: "eq",
            trust: 0.8,
            vendor: "oracle",
            version: "10",
         },
         {
            model: "solaris",
            scope: "eq",
            trust: 0.8,
            vendor: "oracle",
            version: "11 express",
         },
         {
            model: "enterprise linux extras",
            scope: "eq",
            trust: 0.8,
            vendor: "red hat",
            version: "3 extras",
         },
         {
            model: "enterprise linux extras",
            scope: "eq",
            trust: 0.8,
            vendor: "red hat",
            version: "4 extras",
         },
         {
            model: "enterprise linux extras",
            scope: "eq",
            trust: 0.8,
            vendor: "red hat",
            version: "4.8.z extras",
         },
         {
            model: "rhel desktop supplementary",
            scope: "eq",
            trust: 0.8,
            vendor: "red hat",
            version: "5 (client)",
         },
         {
            model: "rhel supplementary",
            scope: "eq",
            trust: 0.8,
            vendor: "red hat",
            version: "5 (server)",
         },
         {
            model: "acrobat professional",
            scope: "eq",
            trust: 0.3,
            vendor: "adobe",
            version: "8.1.3",
         },
         {
            model: "acrobat standard",
            scope: "eq",
            trust: 0.3,
            vendor: "adobe",
            version: "7.0.1",
         },
         {
            model: "flash player",
            scope: "eq",
            trust: 0.3,
            vendor: "adobe",
            version: "10.0.12.35",
         },
         {
            model: "acrobat professional",
            scope: "eq",
            trust: 0.3,
            vendor: "adobe",
            version: "7.0.3",
         },
         {
            model: "reader",
            scope: "eq",
            trust: 0.3,
            vendor: "adobe",
            version: "7.0.6",
         },
         {
            model: "opensuse",
            scope: "ne",
            trust: 0.3,
            vendor: "suse",
            version: "11.3",
         },
         {
            model: "acrobat standard",
            scope: "eq",
            trust: 0.3,
            vendor: "adobe",
            version: "8.0",
         },
         {
            model: "acrobat professional",
            scope: "eq",
            trust: 0.3,
            vendor: "adobe",
            version: "7.1.4",
         },
         {
            model: "acrobat standard",
            scope: "eq",
            trust: 0.3,
            vendor: "adobe",
            version: "9.1.2",
         },
         {
            model: "acrobat professional",
            scope: "eq",
            trust: 0.3,
            vendor: "adobe",
            version: "8.2.2",
         },
         {
            model: "air",
            scope: "eq",
            trust: 0.3,
            vendor: "adobe",
            version: "1.5.2",
         },
         {
            model: "linux enterprise sp3",
            scope: "eq",
            trust: 0.3,
            vendor: "suse",
            version: "10",
         },
         {
            model: "chrome",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "6.0.397.0",
         },
         {
            model: "reader",
            scope: "eq",
            trust: 0.3,
            vendor: "adobe",
            version: "9.2",
         },
         {
            model: "chrome",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "5.0.391.0",
         },
         {
            model: "mac os server",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.5.6",
         },
         {
            model: "acrobat",
            scope: "ne",
            trust: 0.3,
            vendor: "adobe",
            version: "8.2.5",
         },
         {
            model: "mac os server",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.5.3",
         },
         {
            model: "reader",
            scope: "eq",
            trust: 0.3,
            vendor: "adobe",
            version: "9.3.3",
         },
         {
            model: "acrobat professional",
            scope: "eq",
            trust: 0.3,
            vendor: "adobe",
            version: "9.3.1",
         },
         {
            model: "acrobat professional",
            scope: "eq",
            trust: 0.3,
            vendor: "adobe",
            version: "9.3",
         },
         {
            model: "reader",
            scope: "eq",
            trust: 0.3,
            vendor: "adobe",
            version: "7.1.3",
         },
         {
            model: "chrome",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "6.0.398.0",
         },
         {
            model: "enterprise linux ws extras",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "3",
         },
         {
            model: "acrobat professional",
            scope: "eq",
            trust: 0.3,
            vendor: "adobe",
            version: "9.1.3",
         },
         {
            model: "mac os server",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.5",
         },
         {
            model: "flash player",
            scope: "ne",
            trust: 0.3,
            vendor: "adobe",
            version: "10.1.95.1",
         },
         {
            model: "reader",
            scope: "eq",
            trust: 0.3,
            vendor: "adobe",
            version: "9.3.4",
         },
         {
            model: "flash player",
            scope: "eq",
            trust: 0.3,
            vendor: "adobe",
            version: "10.1.51.66",
         },
         {
            model: "acrobat professional",
            scope: "eq",
            trust: 0.3,
            vendor: "adobe",
            version: "8.1.6",
         },
         {
            model: "chrome",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "6.0.47255",
         },
         {
            model: "mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.5.7",
         },
         {
            model: "acrobat standard",
            scope: "eq",
            trust: 0.3,
            vendor: "adobe",
            version: "9.3.3",
         },
         {
            model: "mac os server",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.5.4",
         },
         {
            model: "reader",
            scope: "eq",
            trust: 0.3,
            vendor: "adobe",
            version: "7.0",
         },
         {
            model: "acrobat standard",
            scope: "eq",
            trust: 0.3,
            vendor: "adobe",
            version: "7.0.8",
         },
         {
            model: "chrome",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "5.0.381.0",
         },
         {
            model: "acrobat professional",
            scope: "eq",
            trust: 0.3,
            vendor: "adobe",
            version: "7.1.1",
         },
         {
            model: "mac os server",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.6.2",
         },
         {
            model: "acrobat professional",
            scope: "eq",
            trust: 0.3,
            vendor: "adobe",
            version: "7.0.4",
         },
         {
            model: "acrobat professional",
            scope: "eq",
            trust: 0.3,
            vendor: "adobe",
            version: "8.1.4",
         },
         {
            model: "acrobat",
            scope: "eq",
            trust: 0.3,
            vendor: "adobe",
            version: "8.2.4",
         },
         {
            model: "acrobat standard",
            scope: "eq",
            trust: 0.3,
            vendor: "adobe",
            version: "8.2.4",
         },
         {
            model: "opensuse",
            scope: "eq",
            trust: 0.3,
            vendor: "s u s e",
            version: "11.1",
         },
         {
            model: "chrome",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "5.0.394.0",
         },
         {
            model: "reader",
            scope: "eq",
            trust: 0.3,
            vendor: "adobe",
            version: "7.0.1",
         },
         {
            model: "acrobat standard",
            scope: "eq",
            trust: 0.3,
            vendor: "adobe",
            version: "8.2",
         },
         {
            model: "acrobat professional",
            scope: "eq",
            trust: 0.3,
            vendor: "adobe",
            version: "8.1",
         },
         {
            model: "mac os server",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.5.1",
         },
         {
            model: "mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.6.4",
         },
         {
            model: "reader",
            scope: "eq",
            trust: 0.3,
            vendor: "adobe",
            version: "8.0",
         },
         {
            model: "acrobat professional",
            scope: "ne",
            trust: 0.3,
            vendor: "adobe",
            version: "9.4",
         },
         {
            model: "desktop extras",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "4",
         },
         {
            model: "acrobat",
            scope: "ne",
            trust: 0.3,
            vendor: "adobe",
            version: "9.4",
         },
         {
            model: "acrobat standard",
            scope: "eq",
            trust: 0.3,
            vendor: "adobe",
            version: "9.3.2",
         },
         {
            model: "acrobat standard",
            scope: "eq",
            trust: 0.3,
            vendor: "adobe",
            version: "8.1.2",
         },
         {
            model: "chrome",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "5.0.396.0",
         },
         {
            model: "reader",
            scope: "eq",
            trust: 0.3,
            vendor: "adobe",
            version: "9.1.2",
         },
         {
            model: "opensuse",
            scope: "ne",
            trust: 0.3,
            vendor: "s u s e",
            version: "11.1",
         },
         {
            model: "acrobat standard",
            scope: "eq",
            trust: 0.3,
            vendor: "adobe",
            version: "7.0.2",
         },
         {
            model: "air",
            scope: "eq",
            trust: 0.3,
            vendor: "adobe",
            version: "2.0.2.12610",
         },
         {
            model: "acrobat professional",
            scope: "eq",
            trust: 0.3,
            vendor: "adobe",
            version: "9.1",
         },
         {
            model: "acrobat standard",
            scope: "eq",
            trust: 0.3,
            vendor: "adobe",
            version: "8.1.3",
         },
         {
            model: "acrobat standard",
            scope: "eq",
            trust: 0.3,
            vendor: "adobe",
            version: "7.0.3",
         },
         {
            model: "mac os server",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.6",
         },
         {
            model: "reader",
            scope: "eq",
            trust: 0.3,
            vendor: "adobe",
            version: "8.1.5",
         },
         {
            model: "acrobat professional",
            scope: "eq",
            trust: 0.3,
            vendor: "adobe",
            version: "7.0.7",
         },
         {
            model: "acrobat professional",
            scope: "eq",
            trust: 0.3,
            vendor: "adobe",
            version: "7.0.6",
         },
         {
            model: "acrobat professional",
            scope: "eq",
            trust: 0.3,
            vendor: "adobe",
            version: "9",
         },
         {
            model: "chrome",
            scope: "ne",
            trust: 0.3,
            vendor: "google",
            version: "6.0.472.62",
         },
         {
            model: "chrome",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "5.0.395.0",
         },
         {
            model: "acrobat standard",
            scope: "eq",
            trust: 0.3,
            vendor: "adobe",
            version: "7.1.4",
         },
         {
            model: "acrobat professional",
            scope: "eq",
            trust: 0.3,
            vendor: "adobe",
            version: "8.2.1",
         },
         {
            model: "acrobat standard",
            scope: "eq",
            trust: 0.3,
            vendor: "adobe",
            version: "8.2.2",
         },
         {
            model: "acrobat professional",
            scope: "eq",
            trust: 0.3,
            vendor: "adobe",
            version: "8.1.7",
         },
         {
            model: "hat enterprise linux supplementary server",
            scope: "eq",
            trust: 0.3,
            vendor: "red",
            version: "5",
         },
         {
            model: "enterprise linux extras",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "4",
         },
         {
            model: "enterprise linux extras",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "3",
         },
         {
            model: "mac os server",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.6.1",
         },
         {
            model: "linux enterprise desktop sp3",
            scope: "eq",
            trust: 0.3,
            vendor: "suse",
            version: "10",
         },
         {
            model: "solaris express",
            scope: "eq",
            trust: 0.3,
            vendor: "sun",
            version: "11",
         },
         {
            model: "linux enterprise desktop",
            scope: "ne",
            trust: 0.3,
            vendor: "suse",
            version: "11",
         },
         {
            model: "acrobat standard",
            scope: "ne",
            trust: 0.3,
            vendor: "adobe",
            version: "8.2.5",
         },
         {
            model: "reader",
            scope: "eq",
            trust: 0.3,
            vendor: "adobe",
            version: "8.2.3",
         },
         {
            model: "mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.5.8",
         },
         {
            model: "reader",
            scope: "eq",
            trust: 0.3,
            vendor: "adobe",
            version: "7.0.8",
         },
         {
            model: "air",
            scope: "ne",
            trust: 0.3,
            vendor: "adobe",
            version: "2.0.4",
         },
         {
            model: "chrome",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "5.0.385.0",
         },
         {
            model: "linux enterprise desktop sp3",
            scope: "ne",
            trust: 0.3,
            vendor: "suse",
            version: "10",
         },
         {
            model: "mac os server",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.5.5",
         },
         {
            model: "reader",
            scope: "eq",
            trust: 0.3,
            vendor: "adobe",
            version: "8.2.4",
         },
         {
            model: "reader",
            scope: "eq",
            trust: 0.3,
            vendor: "adobe",
            version: "8.2",
         },
         {
            model: "air",
            scope: "eq",
            trust: 0.3,
            vendor: "adobe",
            version: "1.5",
         },
         {
            model: "acrobat",
            scope: "eq",
            trust: 0.3,
            vendor: "adobe",
            version: "8.1.8",
         },
         {
            model: "acrobat professional",
            scope: "eq",
            trust: 0.3,
            vendor: "adobe",
            version: "9.3.4",
         },
         {
            model: "reader",
            scope: "eq",
            trust: 0.3,
            vendor: "adobe",
            version: "9.3.2",
         },
         {
            model: "reader",
            scope: "eq",
            trust: 0.3,
            vendor: "adobe",
            version: "8.1.2",
         },
         {
            model: "acrobat standard",
            scope: "eq",
            trust: 0.3,
            vendor: "adobe",
            version: "7.0.4",
         },
         {
            model: "acrobat professional",
            scope: "eq",
            trust: 0.3,
            vendor: "adobe",
            version: "7.0.5",
         },
         {
            model: "reader",
            scope: "eq",
            trust: 0.3,
            vendor: "adobe",
            version: "7.0.2",
         },
         {
            model: "air",
            scope: "eq",
            trust: 0.3,
            vendor: "adobe",
            version: "1.5.3",
         },
         {
            model: "acrobat standard",
            scope: "eq",
            trust: 0.3,
            vendor: "adobe",
            version: "8.1.4",
         },
         {
            model: "mac os server",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.5.2",
         },
         {
            model: "acrobat professional",
            scope: "eq",
            trust: 0.3,
            vendor: "adobe",
            version: "7.1",
         },
         {
            model: "reader",
            scope: "eq",
            trust: 0.3,
            vendor: "adobe",
            version: "8.1.3",
         },
         {
            model: "mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.6.3",
         },
         {
            model: "reader",
            scope: "eq",
            trust: 0.3,
            vendor: "adobe",
            version: "7.0.3",
         },
         {
            model: "acrobat standard",
            scope: "eq",
            trust: 0.3,
            vendor: "adobe",
            version: "8.1",
         },
         {
            model: "moblin",
            scope: "eq",
            trust: 0.3,
            vendor: "suse",
            version: "2.1",
         },
         {
            model: "acrobat professional",
            scope: "eq",
            trust: 0.3,
            vendor: "adobe",
            version: "8.1.1",
         },
         {
            model: "acrobat standard",
            scope: "ne",
            trust: 0.3,
            vendor: "adobe",
            version: "9.4",
         },
         {
            model: "desktop extras",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "3",
         },
         {
            model: "reader",
            scope: "eq",
            trust: 0.3,
            vendor: "adobe",
            version: "7.1.4",
         },
         {
            model: "chrome",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "6.0.472.59",
         },
         {
            model: "chrome",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "5.0.384.0",
         },
         {
            model: "reader",
            scope: "eq",
            trust: 0.3,
            vendor: "adobe",
            version: "8.2.2",
         },
         {
            model: "linux enterprise desktop",
            scope: "eq",
            trust: 0.3,
            vendor: "suse",
            version: "11",
         },
         {
            model: "flash player",
            scope: "eq",
            trust: 0.3,
            vendor: "adobe",
            version: "10.0.3218",
         },
         {
            model: "air",
            scope: "eq",
            trust: 0.3,
            vendor: "adobe",
            version: "1.5.1",
         },
         {
            model: "acrobat professional security updat",
            scope: "eq",
            trust: 0.3,
            vendor: "adobe",
            version: "8.1.2",
         },
         {
            model: "acrobat professional",
            scope: "eq",
            trust: 0.3,
            vendor: "adobe",
            version: "7.0.9",
         },
         {
            model: "linux enterprise sp1",
            scope: "eq",
            trust: 0.3,
            vendor: "suse",
            version: "11",
         },
         {
            model: "flash player",
            scope: "eq",
            trust: 0.3,
            vendor: "adobe",
            version: "10.1.53.64",
         },
         {
            model: "acrobat standard",
            scope: "eq",
            trust: 0.3,
            vendor: "adobe",
            version: "9.1",
         },
         {
            model: "enterprise linux es extras",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "4",
         },
         {
            model: "enterprise linux es extras",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "3",
         },
         {
            model: "chrome",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "5.0.390.0",
         },
         {
            model: "reader",
            scope: "ne",
            trust: 0.3,
            vendor: "adobe",
            version: "8.2.5",
         },
         {
            model: "air",
            scope: "eq",
            trust: 0.3,
            vendor: "adobe",
            version: "1.5.3.9130",
         },
         {
            model: "mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.5.6",
         },
         {
            model: "linux enterprise",
            scope: "eq",
            trust: 0.3,
            vendor: "suse",
            version: "11",
         },
         {
            model: "mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.5.3",
         },
         {
            model: "acrobat standard",
            scope: "eq",
            trust: 0.3,
            vendor: "adobe",
            version: "7.0.7",
         },
         {
            model: "air",
            scope: "eq",
            trust: 0.3,
            vendor: "adobe",
            version: "1.5.3.9120",
         },
         {
            model: "solaris 10 sparc",
            scope: null,
            trust: 0.3,
            vendor: "sun",
            version: null,
         },
         {
            model: "acrobat standard",
            scope: "eq",
            trust: 0.3,
            vendor: "adobe",
            version: "9",
         },
         {
            model: "mac os server",
            scope: "ne",
            trust: 0.3,
            vendor: "apple",
            version: "x10.6.5",
         },
         {
            model: "reader security updat",
            scope: "eq",
            trust: 0.3,
            vendor: "adobe",
            version: "8.1.2",
         },
         {
            model: "chrome",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "5.0.382.0",
         },
         {
            model: "acrobat standard",
            scope: "eq",
            trust: 0.3,
            vendor: "adobe",
            version: "8.2.1",
         },
         {
            model: "acrobat standard",
            scope: "eq",
            trust: 0.3,
            vendor: "adobe",
            version: "8.1.7",
         },
         {
            model: "linux",
            scope: null,
            trust: 0.3,
            vendor: "gentoo",
            version: null,
         },
         {
            model: "acrobat professional",
            scope: "eq",
            trust: 0.3,
            vendor: "adobe",
            version: "9.2",
         },
         {
            model: "mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.5",
         },
         {
            model: "acrobat standard",
            scope: "eq",
            trust: 0.3,
            vendor: "adobe",
            version: "9.3.1",
         },
         {
            model: "acrobat professional",
            scope: "eq",
            trust: 0.3,
            vendor: "adobe",
            version: "9.3.3",
         },
         {
            model: "reader",
            scope: "eq",
            trust: 0.3,
            vendor: "adobe",
            version: "7.0.4",
         },
         {
            model: "acrobat standard",
            scope: "eq",
            trust: 0.3,
            vendor: "adobe",
            version: "9.3",
         },
         {
            model: "acrobat professional",
            scope: "eq",
            trust: 0.3,
            vendor: "adobe",
            version: "7.0.8",
         },
         {
            model: "mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.5.4",
         },
         {
            model: "reader",
            scope: "eq",
            trust: 0.3,
            vendor: "adobe",
            version: "8.1.4",
         },
         {
            model: "acrobat professional",
            scope: "eq",
            trust: 0.3,
            vendor: "adobe",
            version: "7.1.3",
         },
         {
            model: "mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.6.2",
         },
         {
            model: "chrome",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "5.0.378.0",
         },
         {
            model: "acrobat standard",
            scope: "eq",
            trust: 0.3,
            vendor: "adobe",
            version: "9.1.3",
         },
         {
            model: "reader",
            scope: "eq",
            trust: 0.3,
            vendor: "adobe",
            version: "8.1",
         },
         {
            model: "opensuse",
            scope: "ne",
            trust: 0.3,
            vendor: "s u s e",
            version: "11.2",
         },
         {
            model: "reader",
            scope: "eq",
            trust: 0.3,
            vendor: "adobe",
            version: "9.1.1",
         },
         {
            model: "flash player",
            scope: "eq",
            trust: 0.3,
            vendor: "adobe",
            version: "10.1.82.76",
         },
         {
            model: "acrobat standard",
            scope: "eq",
            trust: 0.3,
            vendor: "adobe",
            version: "8.1.6",
         },
         {
            model: "mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.5.1",
         },
         {
            model: "mac os server",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.5.7",
         },
         {
            model: "reader",
            scope: "ne",
            trust: 0.3,
            vendor: "adobe",
            version: "9.4",
         },
         {
            model: "acrobat standard",
            scope: "eq",
            trust: 0.3,
            vendor: "adobe",
            version: "7.1.1",
         },
         {
            model: "acrobat professional",
            scope: "eq",
            trust: 0.3,
            vendor: "adobe",
            version: "9.3.2",
         },
         {
            model: "acrobat standard",
            scope: "eq",
            trust: 0.3,
            vendor: "adobe",
            version: "7.0.5",
         },
         {
            model: "acrobat professional",
            scope: "eq",
            trust: 0.3,
            vendor: "adobe",
            version: "7.0",
         },
         {
            model: "flash player",
            scope: "ne",
            trust: 0.3,
            vendor: "adobe",
            version: "10.1.85.3",
         },
         {
            model: "acrobat standard",
            scope: "eq",
            trust: 0.3,
            vendor: "adobe",
            version: "7.1",
         },
         {
            model: "flash player",
            scope: "eq",
            trust: 0.3,
            vendor: "adobe",
            version: "10.0.452",
         },
         {
            model: "reader",
            scope: "eq",
            trust: 0.3,
            vendor: "adobe",
            version: "9.1",
         },
         {
            model: "air",
            scope: "eq",
            trust: 0.3,
            vendor: "adobe",
            version: "2.0.3",
         },
         {
            model: "chrome",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "5.0.387.0",
         },
         {
            model: "chrome",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "5.0.393.0",
         },
         {
            model: "acrobat standard",
            scope: "eq",
            trust: 0.3,
            vendor: "adobe",
            version: "8.1.1",
         },
         {
            model: "chrome",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "5.0.382.3",
         },
         {
            model: "mac os server",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.6.4",
         },
         {
            model: "moblin",
            scope: "eq",
            trust: 0.3,
            vendor: "suse",
            version: "2.0",
         },
         {
            model: "acrobat professional",
            scope: "eq",
            trust: 0.3,
            vendor: "adobe",
            version: "7.0.1",
         },
         {
            model: "reader",
            scope: "eq",
            trust: 0.3,
            vendor: "adobe",
            version: "7.0.7",
         },
         {
            model: "reader",
            scope: "eq",
            trust: 0.3,
            vendor: "adobe",
            version: "9",
         },
         {
            model: "mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.6",
         },
         {
            model: "chrome",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "5.0.386.0",
         },
         {
            model: "acrobat professional",
            scope: "eq",
            trust: 0.3,
            vendor: "adobe",
            version: "8.0",
         },
         {
            model: "linux enterprise desktop sp1",
            scope: "eq",
            trust: 0.3,
            vendor: "suse",
            version: "11",
         },
         {
            model: "reader",
            scope: "eq",
            trust: 0.3,
            vendor: "adobe",
            version: "7.1.2",
         },
         {
            model: "reader",
            scope: "eq",
            trust: 0.3,
            vendor: "adobe",
            version: "8.2.1",
         },
         {
            model: "reader",
            scope: "eq",
            trust: 0.3,
            vendor: "adobe",
            version: "8.1.7",
         },
         {
            model: "acrobat professional",
            scope: "eq",
            trust: 0.3,
            vendor: "adobe",
            version: "9.1.2",
         },
         {
            model: "mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.6.1",
         },
         {
            model: "linux enterprise desktop sp1",
            scope: "ne",
            trust: 0.3,
            vendor: "suse",
            version: "11",
         },
         {
            model: "solaris 10 x86",
            scope: null,
            trust: 0.3,
            vendor: "sun",
            version: null,
         },
         {
            model: "acrobat professional",
            scope: "ne",
            trust: 0.3,
            vendor: "adobe",
            version: "8.2.5",
         },
         {
            model: "chrome",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "5.0.392.0",
         },
         {
            model: "flash player",
            scope: "eq",
            trust: 0.3,
            vendor: "adobe",
            version: "10",
         },
         {
            model: "chrome",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "5.0.380.0",
         },
         {
            model: "acrobat standard",
            scope: "eq",
            trust: 0.3,
            vendor: "adobe",
            version: "7.0.6",
         },
         {
            model: "hat enterprise linux desktop supplementary client",
            scope: "eq",
            trust: 0.3,
            vendor: "red",
            version: "5",
         },
         {
            model: "reader",
            scope: "eq",
            trust: 0.3,
            vendor: "adobe",
            version: "9.3.1",
         },
         {
            model: "reader",
            scope: "eq",
            trust: 0.3,
            vendor: "adobe",
            version: "9.3",
         },
         {
            model: "acrobat standard",
            scope: "eq",
            trust: 0.3,
            vendor: "adobe",
            version: "9.2",
         },
         {
            model: "enterprise linux ws extras",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "4",
         },
         {
            model: "chrome",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "6.0.472.53",
         },
         {
            model: "mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.5.5",
         },
         {
            model: "reader",
            scope: "eq",
            trust: 0.3,
            vendor: "adobe",
            version: "9.1.3",
         },
         {
            model: "reader",
            scope: "eq",
            trust: 0.3,
            vendor: "adobe",
            version: "8.1.6",
         },
         {
            model: "mac os server",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.5.8",
         },
         {
            model: "opensuse",
            scope: "eq",
            trust: 0.3,
            vendor: "s u s e",
            version: "11.2",
         },
         {
            model: "reader",
            scope: "eq",
            trust: 0.3,
            vendor: "adobe",
            version: "7.1.1",
         },
         {
            model: "enterprise linux as extras",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "4",
         },
         {
            model: "enterprise linux as extras",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "3",
         },
         {
            model: "reader",
            scope: "eq",
            trust: 0.3,
            vendor: "adobe",
            version: "7.0.5",
         },
         {
            model: "chrome",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "5.0.383.0",
         },
         {
            model: "chrome",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "5.0.376.0",
         },
         {
            model: "reader",
            scope: "eq",
            trust: 0.3,
            vendor: "adobe",
            version: "7.1",
         },
         {
            model: "acrobat standard",
            scope: "eq",
            trust: 0.3,
            vendor: "adobe",
            version: "7.1.3",
         },
         {
            model: "mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.5.2",
         },
         {
            model: "reader",
            scope: "eq",
            trust: 0.3,
            vendor: "adobe",
            version: "8.1.1",
         },
         {
            model: "acrobat professional",
            scope: "eq",
            trust: 0.3,
            vendor: "adobe",
            version: "8.2.4",
         },
         {
            model: "acrobat professional",
            scope: "eq",
            trust: 0.3,
            vendor: "adobe",
            version: "8.2",
         },
         {
            model: "flash player",
            scope: "eq",
            trust: 0.3,
            vendor: "adobe",
            version: "10.1.92.10",
         },
         {
            model: "acrobat standard",
            scope: "eq",
            trust: 0.3,
            vendor: "adobe",
            version: "9.3.4",
         },
         {
            model: "chrome",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "5.0.379.0",
         },
         {
            model: "acrobat professional",
            scope: "eq",
            trust: 0.3,
            vendor: "adobe",
            version: "8.1.2",
         },
         {
            model: "acrobat standard",
            scope: "eq",
            trust: 0.3,
            vendor: "adobe",
            version: "7.0",
         },
         {
            model: "opensuse",
            scope: "eq",
            trust: 0.3,
            vendor: "suse",
            version: "11.3",
         },
         {
            model: "acrobat professional",
            scope: "eq",
            trust: 0.3,
            vendor: "adobe",
            version: "7.0.2",
         },
         {
            model: "reader",
            scope: "eq",
            trust: 0.3,
            vendor: "adobe",
            version: "7.0.9",
         },
         {
            model: "mac os server",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.6.3",
         },
      ],
      sources: [
         {
            db: "CERT/CC",
            id: "VU#275289",
         },
         {
            db: "BID",
            id: "43205",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2010-002089",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201009-136",
         },
         {
            db: "NVD",
            id: "CVE-2010-2884",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  cpe_match: [
                     {
                        cpe22Uri: "cpe:/o:apple:mac_os_x",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/o:apple:mac_os_x_server",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:adobe:acrobat",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:adobe:flash_player",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:adobe:acrobat_reader",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/o:oracle:solaris",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:redhat:enterprise_linux",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:redhat:rhel_desktop_supplementary",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:redhat:rhel_supplementary",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
            ],
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2010-002089",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Steven Adair of the Shadowserver Foundation",
      sources: [
         {
            db: "BID",
            id: "43205",
         },
      ],
      trust: 0.3,
   },
   cve: "CVE-2010-2884",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  accessComplexity: "MEDIUM",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "nvd@nist.gov",
                  availabilityImpact: "COMPLETE",
                  baseScore: 9.3,
                  confidentialityImpact: "COMPLETE",
                  exploitabilityScore: 8.6,
                  id: "CVE-2010-2884",
                  impactScore: 10,
                  integrityImpact: "COMPLETE",
                  severity: "HIGH",
                  trust: 1.8,
                  vectorString: "AV:N/AC:M/Au:N/C:C/I:C/A:C",
                  version: "2.0",
               },
               {
                  accessComplexity: "MEDIUM",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "VULHUB",
                  availabilityImpact: "COMPLETE",
                  baseScore: 9.3,
                  confidentialityImpact: "COMPLETE",
                  exploitabilityScore: 8.6,
                  id: "VHN-45489",
                  impactScore: 10,
                  integrityImpact: "COMPLETE",
                  severity: "HIGH",
                  trust: 0.1,
                  vectorString: "AV:N/AC:M/AU:N/C:C/I:C/A:C",
                  version: "2.0",
               },
            ],
            cvssV3: [],
            severity: [
               {
                  author: "nvd@nist.gov",
                  id: "CVE-2010-2884",
                  trust: 1,
                  value: "HIGH",
               },
               {
                  author: "CARNEGIE MELLON",
                  id: "VU#275289",
                  trust: 0.8,
                  value: "31.59",
               },
               {
                  author: "NVD",
                  id: "CVE-2010-2884",
                  trust: 0.8,
                  value: "High",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-201009-136",
                  trust: 0.6,
                  value: "CRITICAL",
               },
               {
                  author: "VULHUB",
                  id: "VHN-45489",
                  trust: 0.1,
                  value: "HIGH",
               },
            ],
         },
      ],
      sources: [
         {
            db: "CERT/CC",
            id: "VU#275289",
         },
         {
            db: "VULHUB",
            id: "VHN-45489",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2010-002089",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201009-136",
         },
         {
            db: "NVD",
            id: "CVE-2010-2884",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Adobe Flash Player 10.1.82.76 and earlier on Windows, Mac OS X, Linux, and Solaris and 10.1.92.10 on Android; authplay.dll in Adobe Reader and Acrobat 9.x before 9.4; and authplay.dll in Adobe Reader and Acrobat 8.x before 8.2.5 on Windows and Mac OS X allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, as exploited in the wild in September 2010. Adobe Flash Contains a vulnerability. Attack activity using this vulnerability has been confirmed.Crafted Flash By browsing a document with embedded content, arbitrary code may be executed. Failed attacks may cause  denial-of-service conditions. The product enables viewing of applications, content and video across screens and browsers. \n\nBackground\n==========\n\nThe Adobe Flash Player is a renderer for the SWF file format, which is\ncommonly used to provide interactive websites. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\nGentoo Linux Security Advisory                           GLSA 201101-08\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n                                            http://security.gentoo.org/\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\n  Severity: Normal\n     Title: Adobe Reader: Multiple vulnerabilities\n      Date: January 21, 2011\n      Bugs: #336508, #343091\n        ID: 201101-08\n\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\nSynopsis\n========\n\nMultiple vulnerabilities in Adobe Reader might result in the execution\nof arbitrary code. \n\nBackground\n==========\n\nAdobe Reader (formerly Adobe Acrobat Reader) is a closed-source PDF\nreader. \n\nAffected packages\n=================\n\n    -------------------------------------------------------------------\n     Package             /  Vulnerable  /                   Unaffected\n    -------------------------------------------------------------------\n  1  app-text/acroread        < 9.4.1                         >= 9.4.1\n\nDescription\n===========\n\nMultiple vulnerabilities were discovered in Adobe Reader. For further\ninformation please consult the CVE entries and the Adobe Security\nBulletins referenced below. \n\nWorkaround\n==========\n\nThere is no known workaround at this time. \n\nResolution\n==========\n\nAll Adobe Reader users should upgrade to the latest stable version:\n\n    # emerge --sync\n    # emerge --ask --oneshot --verbose \">=app-text/acroread-9.4.1\"\n\nReferences\n==========\n\n  [ 1 ] APSB10-21\n        http://www.adobe.com/support/security/bulletins/apsb10-21.html\n  [ 2 ] APSB10-28\n        http://www.adobe.com/support/security/bulletins/apsb10-28.html\n  [ 3 ] CVE-2010-2883\n        http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2883\n  [ 4 ] CVE-2010-2884\n        http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2884\n  [ 5 ] CVE-2010-2887\n        http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2887\n  [ 6 ] CVE-2010-2889\n        http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2889\n  [ 7 ] CVE-2010-2890\n        http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2890\n  [ 8 ] CVE-2010-3619\n        http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3619\n  [ 9 ] CVE-2010-3620\n        http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3620\n  [ 10 ] CVE-2010-3621\n         http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3621\n  [ 11 ] CVE-2010-3622\n         http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3622\n  [ 12 ] CVE-2010-3625\n         http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3625\n  [ 13 ] CVE-2010-3626\n         http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3626\n  [ 14 ] CVE-2010-3627\n         http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3627\n  [ 15 ] CVE-2010-3628\n         http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3628\n  [ 16 ] CVE-2010-3629\n         http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3629\n  [ 17 ] CVE-2010-3630\n         http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3630\n  [ 18 ] CVE-2010-3632\n         http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3632\n  [ 19 ] CVE-2010-3654\n         http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3654\n  [ 20 ] CVE-2010-3656\n         http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3656\n  [ 21 ] CVE-2010-3657\n         http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3657\n  [ 22 ] CVE-2010-3658\n         http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3658\n  [ 23 ] CVE-2010-4091\n         http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4091\n\nAvailability\n============\n\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n  http://security.gentoo.org/glsa/glsa-201101-08.xml\n\nConcerns?\n=========\n\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users machines is of utmost\nimportance to us. Any security concerns should be addressed to\nsecurity@gentoo.org or alternatively, you may file a bug at\nhttps://bugs.gentoo.org. \n\nLicense\n=======\n\nCopyright 2011 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttp://creativecommons.org/licenses/by-sa/2.5\n\n\n",
      sources: [
         {
            db: "NVD",
            id: "CVE-2010-2884",
         },
         {
            db: "CERT/CC",
            id: "VU#275289",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2010-002089",
         },
         {
            db: "BID",
            id: "43205",
         },
         {
            db: "VULHUB",
            id: "VHN-45489",
         },
         {
            db: "PACKETSTORM",
            id: "97735",
         },
         {
            db: "PACKETSTORM",
            id: "97734",
         },
      ],
      trust: 2.88,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "CERT/CC",
            id: "VU#275289",
            trust: 3,
         },
         {
            db: "NVD",
            id: "CVE-2010-2884",
            trust: 3,
         },
         {
            db: "SECUNIA",
            id: "41435",
            trust: 2.5,
         },
         {
            db: "SECUNIA",
            id: "41443",
            trust: 2.5,
         },
         {
            db: "SECUNIA",
            id: "41434",
            trust: 2.5,
         },
         {
            db: "VUPEN",
            id: "ADV-2010-2348",
            trust: 2.5,
         },
         {
            db: "VUPEN",
            id: "ADV-2010-2349",
            trust: 2.5,
         },
         {
            db: "USCERT",
            id: "TA10-279A",
            trust: 1.9,
         },
         {
            db: "USCERT",
            id: "TA10-263A",
            trust: 1.9,
         },
         {
            db: "XF",
            id: "61771",
            trust: 1.4,
         },
         {
            db: "SECUNIA",
            id: "43025",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "41526",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "43026",
            trust: 1.1,
         },
         {
            db: "VUPEN",
            id: "ADV-2011-0192",
            trust: 1.1,
         },
         {
            db: "VUPEN",
            id: "ADV-2011-0191",
            trust: 1.1,
         },
         {
            db: "USCERT",
            id: "SA10-263A",
            trust: 0.8,
         },
         {
            db: "USCERT",
            id: "SA10-279A",
            trust: 0.8,
         },
         {
            db: "VUPEN",
            id: "ADV-2010-2573",
            trust: 0.8,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2010-002089",
            trust: 0.8,
         },
         {
            db: "CNNVD",
            id: "CNNVD-201009-136",
            trust: 0.7,
         },
         {
            db: "BID",
            id: "43205",
            trust: 0.4,
         },
         {
            db: "VULHUB",
            id: "VHN-45489",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "97735",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "97734",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "CERT/CC",
            id: "VU#275289",
         },
         {
            db: "VULHUB",
            id: "VHN-45489",
         },
         {
            db: "BID",
            id: "43205",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2010-002089",
         },
         {
            db: "PACKETSTORM",
            id: "97735",
         },
         {
            db: "PACKETSTORM",
            id: "97734",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201009-136",
         },
         {
            db: "NVD",
            id: "CVE-2010-2884",
         },
      ],
   },
   id: "VAR-201009-0241",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VULHUB",
            id: "VHN-45489",
         },
      ],
      trust: 0.01,
   },
   last_update_date: "2024-11-29T22:36:42.881000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "APSA10-03",
            trust: 0.8,
            url: "http://www.adobe.com/support/security/advisories/apsa10-03.html",
         },
         {
            title: "APSB10-22",
            trust: 0.8,
            url: "http://www.adobe.com/support/security/bulletins/apsb10-22.html",
         },
         {
            title: "APSB10-21",
            trust: 0.8,
            url: "http://www.adobe.com/support/security/bulletins/apsb10-21.html",
         },
         {
            title: "cpsid_86695",
            trust: 0.8,
            url: "http://kb2.adobe.com/jp/cps/866/cpsid_86695.html",
         },
         {
            title: "APSB10-21",
            trust: 0.8,
            url: "http://www.adobe.com/jp/support/security/bulletins/apsb10-21.html",
         },
         {
            title: "cpsid_86922",
            trust: 0.8,
            url: "http://kb2.adobe.com/jp/cps/869/cpsid_86922.html",
         },
         {
            title: "APSB10-22",
            trust: 0.8,
            url: "http://www.adobe.com/jp/support/security/bulletins/apsb10-22.html",
         },
         {
            title: "APSA10-03",
            trust: 0.8,
            url: "http://www.adobe.com/jp/support/security/advisories/apsa10-03.html",
         },
         {
            title: "HT4435",
            trust: 0.8,
            url: "http://support.apple.com/kb/HT4435",
         },
         {
            title: "HT4435",
            trust: 0.8,
            url: "http://support.apple.com/kb/HT4435?viewlocale=ja_JP",
         },
         {
            title: "RHSA-2010:0743",
            trust: 0.8,
            url: "https://rhn.redhat.com/errata/RHSA-2010-0743.html",
         },
         {
            title: "RHSA-2010:0706",
            trust: 0.8,
            url: "https://rhn.redhat.com/errata/RHSA-2010-0706.html",
         },
         {
            title: "cve_2010_2884_vulnerability_in",
            trust: 0.8,
            url: "http://blogs.sun.com/security/entry/cve_2010_2884_vulnerability_in",
         },
         {
            title: "TA10-279A",
            trust: 0.8,
            url: "http://software.fujitsu.com/jp/security/vulnerabilities/ta10-279a.html",
         },
         {
            title: "TA10-263A",
            trust: 0.8,
            url: "http://software.fujitsu.com/jp/security/vulnerabilities/ta10-263a.html",
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2010-002089",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "NVD-CWE-noinfo",
            trust: 1,
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2010-2884",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 2.8,
            url: "http://www.adobe.com/support/security/advisories/apsa10-03.html",
         },
         {
            trust: 2.5,
            url: "http://secunia.com/advisories/41434",
         },
         {
            trust: 2.5,
            url: "http://secunia.com/advisories/41435",
         },
         {
            trust: 2.5,
            url: "http://secunia.com/advisories/41443",
         },
         {
            trust: 2.5,
            url: "http://www.vupen.com/english/advisories/2010/2348",
         },
         {
            trust: 2.5,
            url: "http://www.vupen.com/english/advisories/2010/2349",
         },
         {
            trust: 2.2,
            url: "http://www.kb.cert.org/vuls/id/275289",
         },
         {
            trust: 1.9,
            url: "http://www.us-cert.gov/cas/techalerts/ta10-263a.html",
         },
         {
            trust: 1.9,
            url: "http://www.us-cert.gov/cas/techalerts/ta10-279a.html",
         },
         {
            trust: 1.8,
            url: "http://www.adobe.com/support/security/bulletins/apsb10-21.html",
         },
         {
            trust: 1.6,
            url: "http://blogs.adobe.com/psirt/2010/09/security-advisory-for-adobe-flash-player-apsa10-03.html",
         },
         {
            trust: 1.6,
            url: "http://www.npa.go.jp/cyberpolice/#topics",
         },
         {
            trust: 1.5,
            url: "http://www.adobe.com/support/security/bulletins/apsb10-22.html",
         },
         {
            trust: 1.4,
            url: "http://xforce.iss.net/xforce/xfdb/61771",
         },
         {
            trust: 1.2,
            url: "http://security.gentoo.org/glsa/glsa-201101-08.xml",
         },
         {
            trust: 1.2,
            url: "http://security.gentoo.org/glsa/glsa-201101-09.xml",
         },
         {
            trust: 1.1,
            url: "http://lists.apple.com/archives/security-announce/2010//nov/msg00000.html",
         },
         {
            trust: 1.1,
            url: "http://support.apple.com/kb/ht4435",
         },
         {
            trust: 1.1,
            url: "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a6852",
         },
         {
            trust: 1.1,
            url: "http://www.redhat.com/support/errata/rhsa-2010-0706.html",
         },
         {
            trust: 1.1,
            url: "http://www.redhat.com/support/errata/rhsa-2010-0743.html",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/41526",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/43025",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/43026",
         },
         {
            trust: 1.1,
            url: "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00001.html",
         },
         {
            trust: 1.1,
            url: "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html",
         },
         {
            trust: 1.1,
            url: "http://www.vupen.com/english/advisories/2011/0191",
         },
         {
            trust: 1.1,
            url: "http://www.vupen.com/english/advisories/2011/0192",
         },
         {
            trust: 1.1,
            url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/61771",
         },
         {
            trust: 1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2884",
         },
         {
            trust: 0.8,
            url: "http://www.ipa.go.jp/security/ciadr/vul/20100921-adobe.html",
         },
         {
            trust: 0.8,
            url: "http://www.ipa.go.jp/security/ciadr/vul/20101006-adobe.html",
         },
         {
            trust: 0.8,
            url: "http://www.jpcert.or.jp/at/2010/at100024.txt",
         },
         {
            trust: 0.8,
            url: "http://www.jpcert.or.jp/at/2010/at100026.txt",
         },
         {
            trust: 0.8,
            url: "http://jvn.jp/cert/jvnvu275289",
         },
         {
            trust: 0.8,
            url: "http://jvn.jp/tr/jvntr-2010-25",
         },
         {
            trust: 0.8,
            url: "http://jvn.jp/cert/jvnta10-279a",
         },
         {
            trust: 0.8,
            url: "http://jvn.jp/cert/jvnvu331391",
         },
         {
            trust: 0.8,
            url: "http://jvn.jp/cert/jvnta10-263a",
         },
         {
            trust: 0.8,
            url: "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2010-2884",
         },
         {
            trust: 0.8,
            url: "http://www.us-cert.gov/cas/alerts/sa10-279a.html",
         },
         {
            trust: 0.8,
            url: "http://www.us-cert.gov/cas/alerts/sa10-263a.html",
         },
         {
            trust: 0.8,
            url: "http://www.vupen.com/english/advisories/2010/2573",
         },
         {
            trust: 0.3,
            url: "http://www.adobe.com/products/flash/",
         },
         {
            trust: 0.3,
            url: "http://www.adobe.com",
         },
         {
            trust: 0.3,
            url: "http://blogs.sun.com/security/entry/cve_2010_2884_vulnerability_in",
         },
         {
            trust: 0.3,
            url: "http://googlechromereleases.blogspot.com/2010/09/stable-beta-channel-updates_17.html",
         },
         {
            trust: 0.2,
            url: "http://creativecommons.org/licenses/by-sa/2.5",
         },
         {
            trust: 0.2,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3654",
         },
         {
            trust: 0.2,
            url: "http://security.gentoo.org/",
         },
         {
            trust: 0.2,
            url: "https://bugs.gentoo.org.",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2010-2182",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3639",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2181",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2161",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0187",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2174",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3644",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2010-2166",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2215",
         },
         {
            trust: 0.1,
            url: "http://www.adobe.com/support/security/bulletins/apsb10-14.html",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2176",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2010-2171",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2162",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2010-2160",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2010-2181",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2008-4546",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-4546",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2010-1297",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2010-2163",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2010-2180",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2171",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2180",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2010-2176",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2010-2164",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2179",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2169",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3648",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2164",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2010-0187",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2163",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2010-0209",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2173",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-1297",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2009-3793",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2177",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3645",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2010-2179",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2010-2165",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2010-2172",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3976",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2216",
         },
         {
            trust: 0.1,
            url: "http://www.adobe.com/support/security/bulletins/apsb10-16.html",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3647",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2010-2173",
         },
         {
            trust: 0.1,
            url: "http://www.adobe.com/support/security/bulletins/apsb10-06.html",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2172",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-3793",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2160",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2213",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2186",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2184",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0186",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2167",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3646",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2010-2169",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2175",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2214",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2178",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2165",
         },
         {
            trust: 0.1,
            url: "http://www.adobe.com/support/security/bulletins/apsb10-26.html",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2188",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2189",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3643",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2010-2161",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2010-0186",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3636",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0209",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2166",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3641",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2185",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2010-2174",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3650",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2183",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2010-2178",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2010-2170",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2010-2177",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3652",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2010-2162",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3640",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2170",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2010-2175",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2187",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3649",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2010-2167",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2182",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3642",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2890",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3620",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2010-3656",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2010-3621",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2010-3619",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2010-2889",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2010-2883",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2010-2890",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3629",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2010-3629",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3619",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2010-3625",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2010-4091",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2010-3628",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2883",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3625",
         },
         {
            trust: 0.1,
            url: "http://www.adobe.com/support/security/bulletins/apsb10-28.html",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3626",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2010-3657",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3657",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3622",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3658",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3627",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2010-2884",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2010-3620",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2010-3632",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2010-3654",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3632",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2889",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2010-3622",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3656",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2010-2887",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3621",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3628",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2010-3626",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2010-3627",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2010-3658",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2887",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-4091",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2010-3630",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3630",
         },
      ],
      sources: [
         {
            db: "CERT/CC",
            id: "VU#275289",
         },
         {
            db: "VULHUB",
            id: "VHN-45489",
         },
         {
            db: "BID",
            id: "43205",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2010-002089",
         },
         {
            db: "PACKETSTORM",
            id: "97735",
         },
         {
            db: "PACKETSTORM",
            id: "97734",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201009-136",
         },
         {
            db: "NVD",
            id: "CVE-2010-2884",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "CERT/CC",
            id: "VU#275289",
         },
         {
            db: "VULHUB",
            id: "VHN-45489",
         },
         {
            db: "BID",
            id: "43205",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2010-002089",
         },
         {
            db: "PACKETSTORM",
            id: "97735",
         },
         {
            db: "PACKETSTORM",
            id: "97734",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201009-136",
         },
         {
            db: "NVD",
            id: "CVE-2010-2884",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2010-09-14T00:00:00",
            db: "CERT/CC",
            id: "VU#275289",
         },
         {
            date: "2010-09-15T00:00:00",
            db: "VULHUB",
            id: "VHN-45489",
         },
         {
            date: "2010-09-13T00:00:00",
            db: "BID",
            id: "43205",
         },
         {
            date: "2010-10-05T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2010-002089",
         },
         {
            date: "2011-01-21T21:15:05",
            db: "PACKETSTORM",
            id: "97735",
         },
         {
            date: "2011-01-21T21:14:13",
            db: "PACKETSTORM",
            id: "97734",
         },
         {
            date: "2010-09-17T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201009-136",
         },
         {
            date: "2010-09-15T18:00:44.073000",
            db: "NVD",
            id: "CVE-2010-2884",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2010-09-21T00:00:00",
            db: "CERT/CC",
            id: "VU#275289",
         },
         {
            date: "2018-10-30T00:00:00",
            db: "VULHUB",
            id: "VHN-45489",
         },
         {
            date: "2015-03-19T08:37:00",
            db: "BID",
            id: "43205",
         },
         {
            date: "2010-12-21T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2010-002089",
         },
         {
            date: "2011-07-11T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201009-136",
         },
         {
            date: "2024-11-21T01:17:33.803000",
            db: "NVD",
            id: "CVE-2010-2884",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "remote",
      sources: [
         {
            db: "PACKETSTORM",
            id: "97735",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201009-136",
         },
      ],
      trust: 0.7,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Adobe Flash unspecified code execution vulnerability",
      sources: [
         {
            db: "CERT/CC",
            id: "VU#275289",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "lack of information",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201009-136",
         },
      ],
      trust: 0.6,
   },
}


Log in or create an account to share your comment.

Security Advisory comment format.

This schema specifies the format of a comment related to a security advisory.

UUIDv4 of the comment
UUIDv4 of the Vulnerability-Lookup instance
When the comment was created originally
When the comment was last updated
Title of the comment
Description of the comment
The identifier of the vulnerability (CVE ID, GHSA-ID, PYSEC ID, etc.).



Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.