Lucene search

K
cve[email protected]CVE-2013-2723
HistoryMay 16, 2013 - 11:45 a.m.

CVE-2013-2723

2013-05-1611:45:31
CWE-119
web.nvd.nist.gov
36
In Wild
cve-2013-2723
adobe reader
acrobat
memory corruption
arbitrary code execution
denial of service

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

7.7 High

AI Score

Confidence

Low

0.292 Low

EPSS

Percentile

96.9%

Adobe Reader and Acrobat 9.x before 9.5.5, 10.x before 10.1.7, and 11.x before 11.0.03 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-2718, CVE-2013-2719, CVE-2013-2720, CVE-2013-2721, CVE-2013-2722, CVE-2013-2725, CVE-2013-2726, CVE-2013-2731, CVE-2013-2732, CVE-2013-2734, CVE-2013-2735, CVE-2013-2736, CVE-2013-3337, CVE-2013-3338, CVE-2013-3339, CVE-2013-3340, and CVE-2013-3341.

Affected configurations

NVD
Node
adobeacrobat_readerMatch9.0
OR
adobeacrobat_readerMatch9.1
OR
adobeacrobat_readerMatch9.1.1
OR
adobeacrobat_readerMatch9.1.2
OR
adobeacrobat_readerMatch9.1.3
OR
adobeacrobat_readerMatch9.2
OR
adobeacrobat_readerMatch9.3
OR
adobeacrobat_readerMatch9.3.1
OR
adobeacrobat_readerMatch9.3.2
OR
adobeacrobat_readerMatch9.3.3
OR
adobeacrobat_readerMatch9.3.4
OR
adobeacrobat_readerMatch9.4
OR
adobeacrobat_readerMatch9.4.1
OR
adobeacrobat_readerMatch9.4.2
OR
adobeacrobat_readerMatch9.4.3
OR
adobeacrobat_readerMatch9.4.4
OR
adobeacrobat_readerMatch9.4.5
OR
adobeacrobat_readerMatch9.4.6
OR
adobeacrobat_readerMatch9.4.7
OR
adobeacrobat_readerMatch9.5
OR
adobeacrobat_readerMatch9.5.1
OR
adobeacrobat_readerMatch9.5.2
OR
adobeacrobat_readerMatch9.5.3
OR
adobeacrobat_readerMatch9.5.4
Node
adobeacrobat_readerMatch10.0
OR
adobeacrobat_readerMatch10.0.1
OR
adobeacrobat_readerMatch10.0.2
OR
adobeacrobat_readerMatch10.0.3
OR
adobeacrobat_readerMatch10.1
OR
adobeacrobat_readerMatch10.1.1
OR
adobeacrobat_readerMatch10.1.2
OR
adobeacrobat_readerMatch10.1.3
OR
adobeacrobat_readerMatch10.1.4
OR
adobeacrobat_readerMatch10.1.5
OR
adobeacrobat_readerMatch10.1.6
Node
adobeacrobat_readerMatch11.0
OR
adobeacrobat_readerMatch11.0.1
OR
adobeacrobat_readerMatch11.0.2
Node
adobeacrobatMatch9.0
OR
adobeacrobatMatch9.0-pro
OR
adobeacrobatMatch9.1
OR
adobeacrobatMatch9.1-pro
OR
adobeacrobatMatch9.1.1
OR
adobeacrobatMatch9.1.1-
OR
adobeacrobatMatch9.1.2
OR
adobeacrobatMatch9.1.3
OR
adobeacrobatMatch9.1.3-
OR
adobeacrobatMatch9.2
OR
adobeacrobatMatch9.2-
OR
adobeacrobatMatch9.3
OR
adobeacrobatMatch9.3-pro
OR
adobeacrobatMatch9.3.1
OR
adobeacrobatMatch9.3.1-
OR
adobeacrobatMatch9.3.2
OR
adobeacrobatMatch9.3.2-
OR
adobeacrobatMatch9.3.3
OR
adobeacrobatMatch9.3.4
OR
adobeacrobatMatch9.3.4-
OR
adobeacrobatMatch9.4
OR
adobeacrobatMatch9.4.1
OR
adobeacrobatMatch9.4.1-
OR
adobeacrobatMatch9.4.2
OR
adobeacrobatMatch9.4.2-
OR
adobeacrobatMatch9.4.3
OR
adobeacrobatMatch9.4.3-
OR
adobeacrobatMatch9.4.4
OR
adobeacrobatMatch9.4.4-
OR
adobeacrobatMatch9.4.5
OR
adobeacrobatMatch9.4.5-
OR
adobeacrobatMatch9.4.6
OR
adobeacrobatMatch9.4.6-
OR
adobeacrobatMatch9.4.7
OR
adobeacrobatMatch9.5
OR
adobeacrobatMatch9.5.1
OR
adobeacrobatMatch9.5.2
OR
adobeacrobatMatch9.5.3
OR
adobeacrobatMatch9.5.4
Node
adobeacrobatMatch10.0
OR
adobeacrobatMatch10.0-pro
OR
adobeacrobatMatch10.0.1
OR
adobeacrobatMatch10.0.1-pro
OR
adobeacrobatMatch10.0.2
OR
adobeacrobatMatch10.0.3
OR
adobeacrobatMatch10.1
OR
adobeacrobatMatch10.1.1
OR
adobeacrobatMatch10.1.2
OR
adobeacrobatMatch10.1.3
OR
adobeacrobatMatch10.1.4
OR
adobeacrobatMatch10.1.5
OR
adobeacrobatMatch10.1.6
Node
adobeacrobatMatch11.0
OR
adobeacrobatMatch11.0.1
OR
adobeacrobatMatch11.0.2

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

7.7 High

AI Score

Confidence

Low

0.292 Low

EPSS

Percentile

96.9%