Show plain JSON{"id": "CVE-2013-0504", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 10.0, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "authentication": "NONE", "integrityImpact": "COMPLETE", "accessComplexity": "LOW", "availabilityImpact": "COMPLETE", "confidentialityImpact": "COMPLETE"}, "acInsufInfo": false, "impactScore": 10.0, "baseSeverity": "HIGH", "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "published": "2013-02-27T00:55:00.970", "references": [{"url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00025.html", "tags": ["Mailing List", "Third Party Advisory"], "source": "psirt@us.ibm.com"}, {"url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00026.html", "tags": ["Mailing List", "Third Party Advisory"], "source": "psirt@us.ibm.com"}, {"url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00035.html", "tags": ["Mailing List", "Third Party Advisory"], "source": "psirt@us.ibm.com"}, {"url": "http://rhn.redhat.com/errata/RHSA-2013-0574.html", "tags": ["Third Party Advisory"], "source": "psirt@us.ibm.com"}, {"url": "http://www.adobe.com/support/security/bulletins/apsb13-08.html", "tags": ["Patch", "Vendor Advisory"], "source": "psirt@us.ibm.com"}, {"url": "http://www.securityfocus.com/bid/58184", "tags": ["Third Party Advisory", "VDB Entry"], "source": "psirt@us.ibm.com"}, {"url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00025.html", "tags": ["Mailing List", "Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00026.html", "tags": ["Mailing List", "Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00035.html", "tags": ["Mailing List", "Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://rhn.redhat.com/errata/RHSA-2013-0574.html", "tags": ["Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.adobe.com/support/security/bulletins/apsb13-08.html", "tags": ["Patch", "Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/bid/58184", "tags": ["Third Party Advisory", "VDB Entry"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Deferred", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-119"}]}], "descriptions": [{"lang": "en", "value": "Buffer overflow in the broker service in Adobe Flash Player before 10.3.183.67 and 11.x before 11.6.602.171 on Windows and Mac OS X, and before 10.3.183.67 and 11.x before 11.2.202.273 on Linux, allows attackers to execute arbitrary code via unspecified vectors."}, {"lang": "es", "value": "Desbordamiento del de b\u00fafer en el servicio de agente en Adobe Flash Player antes de v10.3.183.67 y v11.x antes de v11.6.602.171 para Windows y Mac OS X, y antes de v10.3.183.67 y v11.x antes de v11.2.202.273 para Linux, que permite ataques de ejecuci\u00f3n de c\u00f3digo arbitrario usando vectores sin especificar."}], "lastModified": "2025-04-11T00:51:21.963", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "335A8B62-0556-4DEB-A786-A06B9F396D57", "versionEndExcluding": "10.3.183.67", "versionStartIncluding": "10.3"}, {"criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "280E545D-5BD8-476F-85BD-D75C4E2FB1DF", "versionEndExcluding": "11.6.602.168", "versionStartIncluding": "11.6"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "4781BF1E-8A4E-4AFF-9540-23D523EE30DD"}, {"criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "335A8B62-0556-4DEB-A786-A06B9F396D57", "versionEndExcluding": "10.3.183.67", "versionStartIncluding": "10.3"}, {"criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BB9395A3-F409-45B2-B877-5D4F5DD20F72", "versionEndExcluding": "11.2.202.273", "versionStartIncluding": "11.2"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1"}], "operator": "OR"}], "operator": "AND"}], "evaluatorImpact": "Per: http://www.adobe.com/support/security/bulletins/apsb13-08.html\r\n\r\n'Flash Player 11.6.602.168 and earlier versions for Windows \r\nFlash Player 11.6.602.167 and earlier versions for Macintosh\r\nFlash Player 11.2.202.270 and earlier for Linux'", "sourceIdentifier": "psirt@us.ibm.com"}