Lucene search

K
cve[email protected]CVE-2013-2726
HistoryMay 16, 2013 - 11:45 a.m.

CVE-2013-2726

2013-05-1611:45:31
CWE-119
web.nvd.nist.gov
39
In Wild
cve-2013-2726
adobe reader
acrobat
arbitrary code execution
memory corruption
cve

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

7.7 High

AI Score

Confidence

Low

0.292 Low

EPSS

Percentile

96.9%

Adobe Reader and Acrobat 9.x before 9.5.5, 10.x before 10.1.7, and 11.x before 11.0.03 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-2718, CVE-2013-2719, CVE-2013-2720, CVE-2013-2721, CVE-2013-2722, CVE-2013-2723, CVE-2013-2725, CVE-2013-2731, CVE-2013-2732, CVE-2013-2734, CVE-2013-2735, CVE-2013-2736, CVE-2013-3337, CVE-2013-3338, CVE-2013-3339, CVE-2013-3340, and CVE-2013-3341.

Affected configurations

NVD
Node
adobeacrobat_readerMatch9.0
OR
adobeacrobat_readerMatch9.1
OR
adobeacrobat_readerMatch9.1.1
OR
adobeacrobat_readerMatch9.1.2
OR
adobeacrobat_readerMatch9.1.3
OR
adobeacrobat_readerMatch9.2
OR
adobeacrobat_readerMatch9.3
OR
adobeacrobat_readerMatch9.3.1
OR
adobeacrobat_readerMatch9.3.2
OR
adobeacrobat_readerMatch9.3.3
OR
adobeacrobat_readerMatch9.3.4
OR
adobeacrobat_readerMatch9.4
OR
adobeacrobat_readerMatch9.4.1
OR
adobeacrobat_readerMatch9.4.2
OR
adobeacrobat_readerMatch9.4.3
OR
adobeacrobat_readerMatch9.4.4
OR
adobeacrobat_readerMatch9.4.5
OR
adobeacrobat_readerMatch9.4.6
OR
adobeacrobat_readerMatch9.4.7
OR
adobeacrobat_readerMatch9.5
OR
adobeacrobat_readerMatch9.5.1
OR
adobeacrobat_readerMatch9.5.2
OR
adobeacrobat_readerMatch9.5.3
OR
adobeacrobat_readerMatch9.5.4
Node
adobeacrobat_readerMatch10.0
OR
adobeacrobat_readerMatch10.0.1
OR
adobeacrobat_readerMatch10.0.2
OR
adobeacrobat_readerMatch10.0.3
OR
adobeacrobat_readerMatch10.1
OR
adobeacrobat_readerMatch10.1.1
OR
adobeacrobat_readerMatch10.1.2
OR
adobeacrobat_readerMatch10.1.3
OR
adobeacrobat_readerMatch10.1.4
OR
adobeacrobat_readerMatch10.1.5
OR
adobeacrobat_readerMatch10.1.6
Node
adobeacrobat_readerMatch11.0
OR
adobeacrobat_readerMatch11.0.1
OR
adobeacrobat_readerMatch11.0.2
Node
adobeacrobatMatch9.0
OR
adobeacrobatMatch9.0-pro
OR
adobeacrobatMatch9.1
OR
adobeacrobatMatch9.1-pro
OR
adobeacrobatMatch9.1.1
OR
adobeacrobatMatch9.1.1-
OR
adobeacrobatMatch9.1.2
OR
adobeacrobatMatch9.1.3
OR
adobeacrobatMatch9.1.3-
OR
adobeacrobatMatch9.2
OR
adobeacrobatMatch9.2-
OR
adobeacrobatMatch9.3
OR
adobeacrobatMatch9.3-pro
OR
adobeacrobatMatch9.3.1
OR
adobeacrobatMatch9.3.1-
OR
adobeacrobatMatch9.3.2
OR
adobeacrobatMatch9.3.2-
OR
adobeacrobatMatch9.3.3
OR
adobeacrobatMatch9.3.4
OR
adobeacrobatMatch9.3.4-
OR
adobeacrobatMatch9.4
OR
adobeacrobatMatch9.4.1
OR
adobeacrobatMatch9.4.1-
OR
adobeacrobatMatch9.4.2
OR
adobeacrobatMatch9.4.2-
OR
adobeacrobatMatch9.4.3
OR
adobeacrobatMatch9.4.3-
OR
adobeacrobatMatch9.4.4
OR
adobeacrobatMatch9.4.4-
OR
adobeacrobatMatch9.4.5
OR
adobeacrobatMatch9.4.5-
OR
adobeacrobatMatch9.4.6
OR
adobeacrobatMatch9.4.6-
OR
adobeacrobatMatch9.4.7
OR
adobeacrobatMatch9.5
OR
adobeacrobatMatch9.5.1
OR
adobeacrobatMatch9.5.2
OR
adobeacrobatMatch9.5.3
OR
adobeacrobatMatch9.5.4
Node
adobeacrobatMatch10.0
OR
adobeacrobatMatch10.0-pro
OR
adobeacrobatMatch10.0.1
OR
adobeacrobatMatch10.0.1-pro
OR
adobeacrobatMatch10.0.2
OR
adobeacrobatMatch10.0.3
OR
adobeacrobatMatch10.1
OR
adobeacrobatMatch10.1.1
OR
adobeacrobatMatch10.1.2
OR
adobeacrobatMatch10.1.3
OR
adobeacrobatMatch10.1.4
OR
adobeacrobatMatch10.1.5
OR
adobeacrobatMatch10.1.6
Node
adobeacrobatMatch11.0
OR
adobeacrobatMatch11.0.1
OR
adobeacrobatMatch11.0.2

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

7.7 High

AI Score

Confidence

Low

0.292 Low

EPSS

Percentile

96.9%