10
CVE-2013-0608
- EPSS 8.48%
- Published 10.01.2013 11:56:53
- Last modified 11.04.2025 00:51:21
- Source psirt@adobe.com
- Teams watchlist Login
- Open Login
Adobe Reader and Acrobat 9.x before 9.5.3, 10.x before 10.1.5, and 11.x before 11.0.1 allow attackers to execute arbitrary code via unspecified vectors, related to a "logic error," a different vulnerability than CVE-2013-0607, CVE-2013-0611, CVE-2013-0614, and CVE-2013-0618.
Data is provided by the National Vulnerability Database (NVD)
Adobe ≫ Acrobat Reader Version9.0
Adobe ≫ Acrobat Reader Version9.1
Adobe ≫ Acrobat Reader Version9.1.1
Adobe ≫ Acrobat Reader Version9.1.2
Adobe ≫ Acrobat Reader Version9.1.3
Adobe ≫ Acrobat Reader Version9.2
Adobe ≫ Acrobat Reader Version9.3
Adobe ≫ Acrobat Reader Version9.3.1
Adobe ≫ Acrobat Reader Version9.3.2
Adobe ≫ Acrobat Reader Version9.3.3
Adobe ≫ Acrobat Reader Version9.3.4
Adobe ≫ Acrobat Reader Version9.4
Adobe ≫ Acrobat Reader Version9.4.1
Adobe ≫ Acrobat Reader Version9.4.2
Adobe ≫ Acrobat Reader Version9.4.3
Adobe ≫ Acrobat Reader Version9.4.4
Adobe ≫ Acrobat Reader Version9.4.5
Adobe ≫ Acrobat Reader Version9.4.6
Adobe ≫ Acrobat Reader Version9.4.7
Adobe ≫ Acrobat Reader Version9.5
Adobe ≫ Acrobat Reader Version9.5.1
Adobe ≫ Acrobat Reader Version9.5.2
Adobe ≫ Acrobat Reader Version10.0
Adobe ≫ Acrobat Reader Version10.0.1
Adobe ≫ Acrobat Reader Version10.0.2
Adobe ≫ Acrobat Reader Version10.0.3
Adobe ≫ Acrobat Reader Version10.1
Adobe ≫ Acrobat Reader Version10.1.1
Adobe ≫ Acrobat Reader Version10.1.2
Adobe ≫ Acrobat Reader Version10.1.3
Adobe ≫ Acrobat Reader Version10.1.4
Adobe ≫ Acrobat Reader Version11.0
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 8.48% | 0.918 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 10 | 10 | 10 |
AV:N/AC:L/Au:N/C:C/I:C/A:C
|
CWE-94 Improper Control of Generation of Code ('Code Injection')
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.