10
CVE-2013-3335
- EPSS 4%
- Veröffentlicht 16.05.2013 11:45:31
- Zuletzt bearbeitet 11.04.2025 00:51:21
- Quelle psirt@adobe.com
- Teams Watchlist Login
- Unerledigt Login
Adobe Flash Player before 10.3.183.86 and 11.x before 11.7.700.202 on Windows and Mac OS X, before 10.3.183.86 and 11.x before 11.2.202.285 on Linux, before 11.1.111.54 on Android 2.x and 3.x, and before 11.1.115.58 on Android 4.x; Adobe AIR before 3.7.0.1860; and Adobe AIR SDK & Compiler before 3.7.0.1860 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-2728, CVE-2013-3324, CVE-2013-3325, CVE-2013-3326, CVE-2013-3327, CVE-2013-3328, CVE-2013-3329, CVE-2013-3330, CVE-2013-3331, CVE-2013-3332, CVE-2013-3333, and CVE-2013-3334.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Adobe ≫ Flash Player Version < 10.3.183.86
Adobe ≫ Flash Player Version >= 11.0 < 11.2.202.285
Adobe ≫ Flash Player Version < 11.1.111.54
Adobe ≫ Flash Player Version < 11.1.115.58
Adobe ≫ Adobe Air Sdk Version < 3.7.0.1860
Redhat ≫ Enterprise Linux Desktop Version6.0
Redhat ≫ Enterprise Linux Eus Version5.9
Redhat ≫ Enterprise Linux Eus Version6.4
Redhat ≫ Enterprise Linux Server Version6.0
Redhat ≫ Enterprise Linux Server Eus Version5.9
Redhat ≫ Enterprise Linux Server Eus Version6.4
Redhat ≫ Enterprise Linux Workstation Version6.0
Suse ≫ Linux Enterprise Desktop Version10 Updatesp4 SwEdition-
Suse ≫ Linux Enterprise Desktop Version11 Updatesp2
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 4% | 0.873 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
nvd@nist.gov | 10 | 10 | 10 |
AV:N/AC:L/Au:N/C:C/I:C/A:C
|
CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.