mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
137 lines
5.1 KiB
JSON
137 lines
5.1 KiB
JSON
{
|
|
"CVE_data_meta": {
|
|
"ASSIGNER": "psirt@adobe.com",
|
|
"ID": "CVE-2010-3976",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "n/a",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name": "n/a"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Untrusted search path vulnerability in Adobe Flash Player before 9.0.289.0 and 10.x before 10.1.102.64 on Windows allows local users, and possibly remote attackers, to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse dwmapi.dll that is located in the same folder as a file that is processed by Flash Player."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"name": "ADV-2011-0192",
|
|
"refsource": "VUPEN",
|
|
"url": "http://www.vupen.com/english/advisories/2011/0192"
|
|
},
|
|
{
|
|
"name": "20101105 ASPR #2010-11-05-01: Remote Binary Planting in Adobe Flash Player",
|
|
"refsource": "BUGTRAQ",
|
|
"url": "http://www.securityfocus.com/archive/1/514653/100/0/threaded"
|
|
},
|
|
{
|
|
"name": "http://support.apple.com/kb/HT4435",
|
|
"refsource": "CONFIRM",
|
|
"url": "http://support.apple.com/kb/HT4435"
|
|
},
|
|
{
|
|
"name": "oval:org.mitre.oval:def:6926",
|
|
"refsource": "OVAL",
|
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6926"
|
|
},
|
|
{
|
|
"name": "http://core.yehg.net/lab/pr0js/advisories/dll_hijacking/%5Bflash_player%5D_10.1.x_insecure_dll_hijacking_%28dwmapi.dll%29",
|
|
"refsource": "MISC",
|
|
"url": "http://core.yehg.net/lab/pr0js/advisories/dll_hijacking/%5Bflash_player%5D_10.1.x_insecure_dll_hijacking_%28dwmapi.dll%29"
|
|
},
|
|
{
|
|
"name": "43026",
|
|
"refsource": "SECUNIA",
|
|
"url": "http://secunia.com/advisories/43026"
|
|
},
|
|
{
|
|
"name": "GLSA-201101-09",
|
|
"refsource": "GENTOO",
|
|
"url": "http://security.gentoo.org/glsa/glsa-201101-09.xml"
|
|
},
|
|
{
|
|
"name": "APPLE-SA-2010-11-10-1",
|
|
"refsource": "APPLE",
|
|
"url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html"
|
|
},
|
|
{
|
|
"name": "http://www.acrossecurity.com/aspr/ASPR-2010-11-05-1-PUB.txt",
|
|
"refsource": "MISC",
|
|
"url": "http://www.acrossecurity.com/aspr/ASPR-2010-11-05-1-PUB.txt"
|
|
},
|
|
{
|
|
"name": "SUSE-SA:2010:055",
|
|
"refsource": "SUSE",
|
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00002.html"
|
|
},
|
|
{
|
|
"name": "SSRT100428",
|
|
"refsource": "HP",
|
|
"url": "http://marc.info/?l=bugtraq&m=130331642631603&w=2"
|
|
},
|
|
{
|
|
"name": "ADV-2010-2903",
|
|
"refsource": "VUPEN",
|
|
"url": "http://www.vupen.com/english/advisories/2010/2903"
|
|
},
|
|
{
|
|
"name": "HPSBMA02663",
|
|
"refsource": "HP",
|
|
"url": "http://marc.info/?l=bugtraq&m=130331642631603&w=2"
|
|
},
|
|
{
|
|
"name": "http://www.adobe.com/support/security/bulletins/apsb10-26.html",
|
|
"refsource": "CONFIRM",
|
|
"url": "http://www.adobe.com/support/security/bulletins/apsb10-26.html"
|
|
},
|
|
{
|
|
"name": "20100910 Adobe Flash Player IE version 10.1.x Insecure DLL Hijacking Vulnerability (dwmapi.dll)",
|
|
"refsource": "BUGTRAQ",
|
|
"url": "http://www.derkeiler.com/Mailing-Lists/securityfocus/bugtraq/2010-09/msg00070.html"
|
|
},
|
|
{
|
|
"name": "44671",
|
|
"refsource": "BID",
|
|
"url": "http://www.securityfocus.com/bid/44671"
|
|
}
|
|
]
|
|
}
|
|
} |