9.3
CVSSv2

CVE-2010-3619

Published: 06/10/2010 Updated: 30/10/2018
CVSS v2 Base Score: 9.3 | Impact Score: 10 | Exploitability Score: 8.6
VMScore: 828
Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

Adobe Reader and Acrobat 9.x prior to 9.4, and 8.x prior to 8.2.5 on Windows and Mac OS X, allow malicious users to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-2890, CVE-2010-3621, CVE-2010-3622, CVE-2010-3628, CVE-2010-3632, and CVE-2010-3658.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

adobe acrobat 8.1

adobe acrobat 8.1.5

adobe acrobat 8.1.6

adobe acrobat reader 8.1.5

adobe acrobat reader 8.2

adobe acrobat reader 8.1.1

adobe acrobat reader 8.2.2

adobe acrobat 8.1.3

adobe acrobat 8.2.3

adobe acrobat 8.2.1

adobe acrobat 8.2

adobe acrobat reader 8.1.7

adobe acrobat reader 8.2.3

adobe acrobat 8.0

adobe acrobat 8.1.2

adobe acrobat 8.1.7

adobe acrobat reader 8.1.4

adobe acrobat reader 8.0

adobe acrobat reader 8.1.2

adobe acrobat reader 8.2.1

adobe acrobat 8.1.1

adobe acrobat 8.1.4

adobe acrobat 8.2.4

adobe acrobat 8.2.2

adobe acrobat reader 8.1.6

adobe acrobat reader 8.1

adobe acrobat reader 8.2.4

adobe acrobat 9.1

adobe acrobat 9.3.2

adobe acrobat reader 9.1.1

adobe acrobat 9.2

adobe acrobat 9.0

adobe acrobat 9.3.3

adobe acrobat 9.1.2

adobe acrobat reader 9.3

adobe acrobat reader 9.1

adobe acrobat reader 9.1.3

adobe acrobat reader 9.3.4

adobe acrobat 9.3

adobe acrobat 9.3.4

adobe acrobat 9.1.3

adobe acrobat reader 9.1.2

adobe acrobat reader 9.2

adobe acrobat reader 9.3.3

adobe acrobat reader 9.3.2

adobe acrobat 9.3.1

adobe acrobat 9.1.1

adobe acrobat reader 9.0

adobe acrobat reader 9.3.1

Vendor Advisories

Synopsis Critical: acroread security update Type/Severity Security Advisory: Critical Topic Updated acroread packages that fix multiple security issues are nowavailable for Red Hat Enterprise Linux 4 Extras and Red Hat EnterpriseLinux 5 SupplementaryThe Red Hat Security Response Team has rated this update ...