{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-03T03:09:01.340","vulnerabilities":[{"cve":{"id":"CVE-2010-2219","sourceIdentifier":"psirt@adobe.com","published":"2010-08-11T18:47:50.563","lastModified":"2026-04-29T01:13:23.040","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Unspecified vulnerability in Adobe Flash Media Server (FMS) before 3.0.6, and 3.5.x before 3.5.4, allows attackers to cause a denial of service (memory consumption) via unknown vectors."},{"lang":"es","value":"Vulnerabilidad no especificada en Adobe Flash Media Server (FMS) anterior v3.0.6, y v3.5.x anterior v3.5.4, permite a atacantes causar una denegación de servicio (corrupción de memoria) a través de vectores desconocidos. \r\n\r\n\r\n"}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":true,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-399"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:flash_media_server:*:*:*:*:*:*:*:*","versionEndIncluding":"3.0.5","matchCriteriaId":"07158C97-6E0B-4481-975A-5132A45CFEC2"},{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:flash_media_server:2.0:*:*:*:*:*:*:*","matchCriteriaId":"27046DD1-3C16-486F-B685-26DBAA024578"},{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:flash_media_server:2.0.1:*:*:*:*:*:*:*","matchCriteriaId":"73544702-D995-43BA-92CB-01ED3642D22E"},{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:flash_media_server:2.0.2:*:*:*:*:*:*:*","matchCriteriaId":"7C5602CE-0860-46EC-9D31-13A83A81476A"},{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:flash_media_server:2.0.3:*:*:*:*:*:*:*","matchCriteriaId":"CE2057CB-905A-4E81-A9EB-898105B2DF0A"},{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:flash_media_server:2.0.4:*:*:*:*:*:*:*","matchCriteriaId":"95E05CA6-B186-4213-A46F-C4E0458B2CA2"},{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:flash_media_server:2.0.5:*:*:*:*:*:*:*","matchCriteriaId":"9F9D585C-DBD6-4E13-A8FF-E043EC162D9D"},{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:flash_media_server:3.0:*:*:*:*:*:*:*","matchCriteriaId":"EE4A07B6-E5DA-4781-ABB3-DB2663E2A737"},{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:flash_media_server:3.0.1:*:*:*:*:*:*:*","matchCriteriaId":"84681400-0CBD-41D1-94D0-B9045958793D"},{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:flash_media_server:3.0.2:*:*:*:*:*:*:*","matchCriteriaId":"29A5E8DC-E664-4FAF-9ED9-7191433F01E5"},{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:flash_media_server:3.0.3:*:*:*:*:*:*:*","matchCriteriaId":"7718612E-7563-4E7B-B8F1-0DA6DAA74E97"},{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:flash_media_server:3.0.4:*:*:*:*:*:*:*","matchCriteriaId":"CCFF63A0-DCF8-484A-A8B0-010ECED76CED"},{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:flash_media_server:3.5:*:*:*:*:*:*:*","matchCriteriaId":"897B12DA-8749-44F7-AA1E-AB1F01BB205E"},{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:flash_media_server:3.5.1:*:*:*:*:*:*:*","matchCriteriaId":"8334A448-0DFF-4571-81BC-81ADEDBD9D7C"},{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:flash_media_server:3.5.2:*:*:*:*:*:*:*","matchCriteriaId":"65D4F566-8F2D-4803-B19C-294306CA7852"},{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:flash_media_server:3.5.3:*:*:*:*:*:*:*","matchCriteriaId":"898F42A4-93D4-441A-8DEE-FB935255D5AC"},{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:flash_media_server_2:*:*:*:*:*:*:*:*","matchCriteriaId":"3C52D611-B361-4845-9365-44253A61ABBD"},{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:flash_media_server_2:2.0.4:*:*:*:*:*:*:*","matchCriteriaId":"BE626734-82AA-4D43-A0B2-0E20DDD708B1"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","matchCriteriaId":"155AD4FB-E527-4103-BCEF-801B653DEA37"},{"vulnerable":false,"criteria":"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*","matchCriteriaId":"2CF61F35-5905-4BA9-AD7E-7DB261D2F256"}]}]}],"references":[{"url":"http://www.adobe.com/support/security/bulletins/apsb10-19.html","source":"psirt@adobe.com","tags":["Vendor Advisory"]},{"url":"http://www.adobe.com/support/security/bulletins/apsb10-19.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}