Language:
http://support.novell.com/security/cve/CVE-2010-0190.html
http://support.novell.com/security/cve/CVE-2010-0191.html
http://support.novell.com/security/cve/CVE-2010-0192.html
http://support.novell.com/security/cve/CVE-2010-0193.html
http://support.novell.com/security/cve/CVE-2010-0194.html
http://support.novell.com/security/cve/CVE-2010-0195.html
http://support.novell.com/security/cve/CVE-2010-0196.html
http://support.novell.com/security/cve/CVE-2010-0197.html
http://support.novell.com/security/cve/CVE-2010-0198.html
http://support.novell.com/security/cve/CVE-2010-0199.html
http://support.novell.com/security/cve/CVE-2010-0201.html
http://support.novell.com/security/cve/CVE-2010-0202.html
http://support.novell.com/security/cve/CVE-2010-0203.html
Severity: High
ID: 51700
File Name: suse_acroread-6994.nasl
Version: 1.10
Type: local
Agent: unix
Family: SuSE Local Security Checks
Published: 1/27/2011
Updated: 1/14/2021
Supported Sensors: Continuous Assessment, Nessus Agent, Nessus
Risk Factor: Critical
Score: 9.0
Risk Factor: High
Base Score: 9.3
Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C
CPE: cpe:/o:suse:suse_linux
Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 4/18/2010
CVE: CVE-2010-0190, CVE-2010-0191, CVE-2010-0192, CVE-2010-0193, CVE-2010-0194, CVE-2010-0195, CVE-2010-0196, CVE-2010-0197, CVE-2010-0198, CVE-2010-0199, CVE-2010-0201, CVE-2010-0202, CVE-2010-0203, CVE-2010-0204, CVE-2010-1241