9.3

CVE-2010-3629

Unspecified vulnerability in Adobe Reader and Acrobat 9.x before 9.4, and 8.x before 8.2.5 on Windows and Mac OS X, allows attackers to execute arbitrary code via a crafted image, a different vulnerability than CVE-2010-3620.

Data is provided by the National Vulnerability Database (NVD)
AdobeAcrobat Version8.0
AdobeAcrobat Version8.1
AdobeAcrobat Version8.1.1
AdobeAcrobat Version8.1.2
AdobeAcrobat Version8.1.3
AdobeAcrobat Version8.1.4
AdobeAcrobat Version8.1.5
AdobeAcrobat Version8.1.6
AdobeAcrobat Version8.1.7
AdobeAcrobat Version8.2
AdobeAcrobat Version8.2.1
AdobeAcrobat Version8.2.2
AdobeAcrobat Version8.2.3
AdobeAcrobat Version8.2.4
AdobeAcrobat Reader Version8.0
AdobeAcrobat Reader Version8.1
AdobeAcrobat Reader Version8.1.1
AdobeAcrobat Reader Version8.1.2
AdobeAcrobat Reader Version8.1.4
AdobeAcrobat Reader Version8.1.5
AdobeAcrobat Reader Version8.1.6
AdobeAcrobat Reader Version8.1.7
AdobeAcrobat Reader Version8.2
AdobeAcrobat Reader Version8.2.1
AdobeAcrobat Reader Version8.2.2
AdobeAcrobat Reader Version8.2.3
AdobeAcrobat Reader Version8.2.4
AdobeAcrobat Version9.0
AdobeAcrobat Version9.1
AdobeAcrobat Version9.1.1
AdobeAcrobat Version9.1.2
AdobeAcrobat Version9.1.3
AdobeAcrobat Version9.2
AdobeAcrobat Version9.3
AdobeAcrobat Version9.3.1
AdobeAcrobat Version9.3.2
AdobeAcrobat Version9.3.3
AdobeAcrobat Version9.3.4
AdobeAcrobat Reader Version9.0
AdobeAcrobat Reader Version9.1
AdobeAcrobat Reader Version9.1.1
AdobeAcrobat Reader Version9.1.2
AdobeAcrobat Reader Version9.1.3
AdobeAcrobat Reader Version9.2
AdobeAcrobat Reader Version9.3
AdobeAcrobat Reader Version9.3.1
AdobeAcrobat Reader Version9.3.2
AdobeAcrobat Reader Version9.3.3
AdobeAcrobat Reader Version9.3.4
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 5.96% 0.903
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 9.3 8.6 10
AV:N/AC:M/Au:N/C:C/I:C/A:C
CWE-20 Improper Input Validation

The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.