Lucene search

K
cve[email protected]CVE-2013-2721
HistoryMay 16, 2013 - 11:45 a.m.

CVE-2013-2721

2013-05-1611:45:31
CWE-119
web.nvd.nist.gov
45
In Wild
adobe
acrobat
cve-2013-2721
memory corruption
security
vulnerability
pdf

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

7.7 High

AI Score

Confidence

Low

0.292 Low

EPSS

Percentile

96.9%

Adobe Reader and Acrobat 9.x before 9.5.5, 10.x before 10.1.7, and 11.x before 11.0.03 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-2718, CVE-2013-2719, CVE-2013-2720, CVE-2013-2722, CVE-2013-2723, CVE-2013-2725, CVE-2013-2726, CVE-2013-2731, CVE-2013-2732, CVE-2013-2734, CVE-2013-2735, CVE-2013-2736, CVE-2013-3337, CVE-2013-3338, CVE-2013-3339, CVE-2013-3340, and CVE-2013-3341.

Affected configurations

NVD
Node
adobeacrobat_readerMatch9.0
OR
adobeacrobat_readerMatch9.1
OR
adobeacrobat_readerMatch9.1.1
OR
adobeacrobat_readerMatch9.1.2
OR
adobeacrobat_readerMatch9.1.3
OR
adobeacrobat_readerMatch9.2
OR
adobeacrobat_readerMatch9.3
OR
adobeacrobat_readerMatch9.3.1
OR
adobeacrobat_readerMatch9.3.2
OR
adobeacrobat_readerMatch9.3.3
OR
adobeacrobat_readerMatch9.3.4
OR
adobeacrobat_readerMatch9.4
OR
adobeacrobat_readerMatch9.4.1
OR
adobeacrobat_readerMatch9.4.2
OR
adobeacrobat_readerMatch9.4.3
OR
adobeacrobat_readerMatch9.4.4
OR
adobeacrobat_readerMatch9.4.5
OR
adobeacrobat_readerMatch9.4.6
OR
adobeacrobat_readerMatch9.4.7
OR
adobeacrobat_readerMatch9.5
OR
adobeacrobat_readerMatch9.5.1
OR
adobeacrobat_readerMatch9.5.2
OR
adobeacrobat_readerMatch9.5.3
OR
adobeacrobat_readerMatch9.5.4
Node
adobeacrobat_readerMatch10.0
OR
adobeacrobat_readerMatch10.0.1
OR
adobeacrobat_readerMatch10.0.2
OR
adobeacrobat_readerMatch10.0.3
OR
adobeacrobat_readerMatch10.1
OR
adobeacrobat_readerMatch10.1.1
OR
adobeacrobat_readerMatch10.1.2
OR
adobeacrobat_readerMatch10.1.3
OR
adobeacrobat_readerMatch10.1.4
OR
adobeacrobat_readerMatch10.1.5
OR
adobeacrobat_readerMatch10.1.6
Node
adobeacrobat_readerMatch11.0
OR
adobeacrobat_readerMatch11.0.1
OR
adobeacrobat_readerMatch11.0.2
Node
adobeacrobatMatch9.0
OR
adobeacrobatMatch9.0-pro
OR
adobeacrobatMatch9.1
OR
adobeacrobatMatch9.1-pro
OR
adobeacrobatMatch9.1.1
OR
adobeacrobatMatch9.1.1-
OR
adobeacrobatMatch9.1.2
OR
adobeacrobatMatch9.1.3
OR
adobeacrobatMatch9.1.3-
OR
adobeacrobatMatch9.2
OR
adobeacrobatMatch9.2-
OR
adobeacrobatMatch9.3
OR
adobeacrobatMatch9.3-pro
OR
adobeacrobatMatch9.3.1
OR
adobeacrobatMatch9.3.1-
OR
adobeacrobatMatch9.3.2
OR
adobeacrobatMatch9.3.2-
OR
adobeacrobatMatch9.3.3
OR
adobeacrobatMatch9.3.4
OR
adobeacrobatMatch9.3.4-
OR
adobeacrobatMatch9.4
OR
adobeacrobatMatch9.4.1
OR
adobeacrobatMatch9.4.1-
OR
adobeacrobatMatch9.4.2
OR
adobeacrobatMatch9.4.2-
OR
adobeacrobatMatch9.4.3
OR
adobeacrobatMatch9.4.3-
OR
adobeacrobatMatch9.4.4
OR
adobeacrobatMatch9.4.4-
OR
adobeacrobatMatch9.4.5
OR
adobeacrobatMatch9.4.5-
OR
adobeacrobatMatch9.4.6
OR
adobeacrobatMatch9.4.6-
OR
adobeacrobatMatch9.4.7
OR
adobeacrobatMatch9.5
OR
adobeacrobatMatch9.5.1
OR
adobeacrobatMatch9.5.2
OR
adobeacrobatMatch9.5.3
OR
adobeacrobatMatch9.5.4
Node
adobeacrobatMatch10.0
OR
adobeacrobatMatch10.0-pro
OR
adobeacrobatMatch10.0.1
OR
adobeacrobatMatch10.0.1-pro
OR
adobeacrobatMatch10.0.2
OR
adobeacrobatMatch10.0.3
OR
adobeacrobatMatch10.1
OR
adobeacrobatMatch10.1.1
OR
adobeacrobatMatch10.1.2
OR
adobeacrobatMatch10.1.3
OR
adobeacrobatMatch10.1.4
OR
adobeacrobatMatch10.1.5
OR
adobeacrobatMatch10.1.6
Node
adobeacrobatMatch11.0
OR
adobeacrobatMatch11.0.1
OR
adobeacrobatMatch11.0.2

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

7.7 High

AI Score

Confidence

Low

0.292 Low

EPSS

Percentile

96.9%