Language:
http://support.novell.com/security/cve/CVE-2010-4091.html
http://support.novell.com/security/cve/CVE-2011-0558.html
http://support.novell.com/security/cve/CVE-2011-0559.html
http://support.novell.com/security/cve/CVE-2011-0560.html
http://support.novell.com/security/cve/CVE-2011-0561.html
http://support.novell.com/security/cve/CVE-2011-0562.html
http://support.novell.com/security/cve/CVE-2011-0563.html
http://support.novell.com/security/cve/CVE-2011-0565.html
http://support.novell.com/security/cve/CVE-2011-0566.html
http://support.novell.com/security/cve/CVE-2011-0567.html
http://support.novell.com/security/cve/CVE-2011-0570.html
http://support.novell.com/security/cve/CVE-2011-0571.html
http://support.novell.com/security/cve/CVE-2011-0572.html
http://support.novell.com/security/cve/CVE-2011-0573.html
http://support.novell.com/security/cve/CVE-2011-0574.html
http://support.novell.com/security/cve/CVE-2011-0575.html
http://support.novell.com/security/cve/CVE-2011-0577.html
http://support.novell.com/security/cve/CVE-2011-0578.html
http://support.novell.com/security/cve/CVE-2011-0585.html
http://support.novell.com/security/cve/CVE-2011-0586.html
http://support.novell.com/security/cve/CVE-2011-0587.html
http://support.novell.com/security/cve/CVE-2011-0588.html
http://support.novell.com/security/cve/CVE-2011-0589.html
http://support.novell.com/security/cve/CVE-2011-0590.html
http://support.novell.com/security/cve/CVE-2011-0591.html
http://support.novell.com/security/cve/CVE-2011-0592.html
http://support.novell.com/security/cve/CVE-2011-0593.html
http://support.novell.com/security/cve/CVE-2011-0594.html
http://support.novell.com/security/cve/CVE-2011-0595.html
http://support.novell.com/security/cve/CVE-2011-0596.html
http://support.novell.com/security/cve/CVE-2011-0598.html
http://support.novell.com/security/cve/CVE-2011-0599.html
http://support.novell.com/security/cve/CVE-2011-0600.html
http://support.novell.com/security/cve/CVE-2011-0602.html
http://support.novell.com/security/cve/CVE-2011-0603.html
http://support.novell.com/security/cve/CVE-2011-0604.html
http://support.novell.com/security/cve/CVE-2011-0606.html
Severity: High
ID: 52567
File Name: suse_acroread-7358.nasl
Version: 1.12
Type: local
Agent: unix
Family: SuSE Local Security Checks
Published: 3/7/2011
Updated: 1/19/2021
Supported Sensors: Nessus Agent, Nessus
Risk Factor: Critical
Score: 9.0
Risk Factor: High
Base Score: 9.3
Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C
CPE: cpe:/o:suse:suse_linux
Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 3/1/2011
CVE: CVE-2010-4091, CVE-2011-0558, CVE-2011-0559, CVE-2011-0560, CVE-2011-0561, CVE-2011-0562, CVE-2011-0563, CVE-2011-0565, CVE-2011-0566, CVE-2011-0567, CVE-2011-0570, CVE-2011-0571, CVE-2011-0572, CVE-2011-0573, CVE-2011-0574, CVE-2011-0575, CVE-2011-0577, CVE-2011-0578, CVE-2011-0585, CVE-2011-0586, CVE-2011-0587, CVE-2011-0588, CVE-2011-0589, CVE-2011-0590, CVE-2011-0591, CVE-2011-0592, CVE-2011-0593, CVE-2011-0594, CVE-2011-0595, CVE-2011-0596, CVE-2011-0598, CVE-2011-0599, CVE-2011-0600, CVE-2011-0602, CVE-2011-0603, CVE-2011-0604, CVE-2011-0606, CVE-2011-0607, CVE-2011-0608