CVE-2010-2164

N/A Unknown
Published: June 15, 2010 Modified: April 29, 2026
View on NVD

Description

Use-after-free vulnerability in Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610, might allow attackers to execute arbitrary code via unspecified vectors related to an unspecified "image type within a certain function."

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://secunia.com/advisories/40144
Source: psirt@adobe.com
Vendor Advisory
http://secunia.com/advisories/40545
Source: psirt@adobe.com
Vendor Advisory
http://secunia.com/advisories/43026
Source: psirt@adobe.com
Vendor Advisory
http://support.apple.com/kb/HT4435
Source: psirt@adobe.com
http://www.adobe.com/support/security/bulletins/apsb10-14.html
Source: psirt@adobe.com
Patch Vendor Advisory
http://www.us-cert.gov/cas/techalerts/TA10-162A.html
Source: psirt@adobe.com
US Government Resource
http://www.vupen.com/english/advisories/2010/1421
Source: psirt@adobe.com
Vendor Advisory
http://www.vupen.com/english/advisories/2010/1432
Source: psirt@adobe.com
Vendor Advisory
http://www.vupen.com/english/advisories/2010/1434
Source: psirt@adobe.com
Vendor Advisory
http://www.vupen.com/english/advisories/2010/1453
Source: psirt@adobe.com
Vendor Advisory
http://www.vupen.com/english/advisories/2010/1482
Source: psirt@adobe.com
Vendor Advisory
http://www.vupen.com/english/advisories/2010/1522
Source: psirt@adobe.com
Vendor Advisory
http://www.vupen.com/english/advisories/2010/1793
Source: psirt@adobe.com
Vendor Advisory
http://www.vupen.com/english/advisories/2011/0192
Source: psirt@adobe.com
Vendor Advisory
http://secunia.com/advisories/40144
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/40545
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/43026
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://security.gentoo.org/glsa/glsa-201101-09.xml
Source: af854a3a-2127-422b-91ae-364da2661108
http://securitytracker.com/id?1024085
Source: af854a3a-2127-422b-91ae-364da2661108
http://securitytracker.com/id?1024086
Source: af854a3a-2127-422b-91ae-364da2661108
http://support.apple.com/kb/HT4435
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.adobe.com/support/security/bulletins/apsb10-14.html
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://www.redhat.com/support/errata/RHSA-2010-0464.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.redhat.com/support/errata/RHSA-2010-0470.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/40759
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/40780
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.turbolinux.co.jp/security/2010/TLSA-2010-19j.txt
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.us-cert.gov/cas/techalerts/TA10-162A.html
Source: af854a3a-2127-422b-91ae-364da2661108
US Government Resource
http://www.vupen.com/english/advisories/2010/1421
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.vupen.com/english/advisories/2010/1432
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.vupen.com/english/advisories/2010/1434
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.vupen.com/english/advisories/2010/1453
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.vupen.com/english/advisories/2010/1482
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.vupen.com/english/advisories/2010/1522
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.vupen.com/english/advisories/2010/1793
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.vupen.com/english/advisories/2011/0192
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory

58 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
0.7%
71th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

adobe macromedia