cve-2013-0630
Vulnerability from cvelistv5
Published
2013-01-11 22:00
Modified
2024-08-06 14:33
Severity ?
Summary
Buffer overflow in Adobe Flash Player before 10.3.183.50 and 11.x before 11.5.502.146 on Windows and Mac OS X, before 10.3.183.50 and 11.x before 11.2.202.261 on Linux, before 11.1.111.31 on Android 2.x and 3.x, and before 11.1.115.36 on Android 4.x; Adobe AIR before 3.5.0.1060; and Adobe AIR SDK before 3.5.0.1060 allows attackers to execute arbitrary code via unspecified vectors.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T14:33:05.207Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "openSUSE-SU-2013:0168",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00059.html"
          },
          {
            "name": "openSUSE-SU-2013:0121",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00012.html"
          },
          {
            "name": "SUSE-SU-2013:0033",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00003.html"
          },
          {
            "name": "RHSA-2013:0149",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2013-0149.html"
          },
          {
            "name": "openSUSE-SU-2013:0364",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2013-02/msg00084.html"
          },
          {
            "name": "openSUSE-SU-2013:0128",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00019.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.adobe.com/support/security/bulletins/apsb13-01.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2013-01-08T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Buffer overflow in Adobe Flash Player before 10.3.183.50 and 11.x before 11.5.502.146 on Windows and Mac OS X, before 10.3.183.50 and 11.x before 11.2.202.261 on Linux, before 11.1.111.31 on Android 2.x and 3.x, and before 11.1.115.36 on Android 4.x; Adobe AIR before 3.5.0.1060; and Adobe AIR SDK before 3.5.0.1060 allows attackers to execute arbitrary code via unspecified vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2013-02-07T10:00:00",
        "orgId": "078d4453-3bcd-4900-85e6-15281da43538",
        "shortName": "adobe"
      },
      "references": [
        {
          "name": "openSUSE-SU-2013:0168",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00059.html"
        },
        {
          "name": "openSUSE-SU-2013:0121",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00012.html"
        },
        {
          "name": "SUSE-SU-2013:0033",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00003.html"
        },
        {
          "name": "RHSA-2013:0149",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2013-0149.html"
        },
        {
          "name": "openSUSE-SU-2013:0364",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2013-02/msg00084.html"
        },
        {
          "name": "openSUSE-SU-2013:0128",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00019.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.adobe.com/support/security/bulletins/apsb13-01.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@adobe.com",
          "ID": "CVE-2013-0630",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Buffer overflow in Adobe Flash Player before 10.3.183.50 and 11.x before 11.5.502.146 on Windows and Mac OS X, before 10.3.183.50 and 11.x before 11.2.202.261 on Linux, before 11.1.111.31 on Android 2.x and 3.x, and before 11.1.115.36 on Android 4.x; Adobe AIR before 3.5.0.1060; and Adobe AIR SDK before 3.5.0.1060 allows attackers to execute arbitrary code via unspecified vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "openSUSE-SU-2013:0168",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00059.html"
            },
            {
              "name": "openSUSE-SU-2013:0121",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00012.html"
            },
            {
              "name": "SUSE-SU-2013:0033",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00003.html"
            },
            {
              "name": "RHSA-2013:0149",
              "refsource": "REDHAT",
              "url": "http://rhn.redhat.com/errata/RHSA-2013-0149.html"
            },
            {
              "name": "openSUSE-SU-2013:0364",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-updates/2013-02/msg00084.html"
            },
            {
              "name": "openSUSE-SU-2013:0128",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00019.html"
            },
            {
              "name": "http://www.adobe.com/support/security/bulletins/apsb13-01.html",
              "refsource": "CONFIRM",
              "url": "http://www.adobe.com/support/security/bulletins/apsb13-01.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538",
    "assignerShortName": "adobe",
    "cveId": "CVE-2013-0630",
    "datePublished": "2013-01-11T22:00:00",
    "dateReserved": "2012-12-18T00:00:00",
    "dateUpdated": "2024-08-06T14:33:05.207Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "configurations": "[{\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"10.3.183.48\", \"matchCriteriaId\": \"777CB526-C6E2-4245-84AF-04B345861E6E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:flash_player:10.3.181.14:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4011899D-C2A3-463F-9C1A-A3478CA467B5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:flash_player:10.3.181.16:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"330104CE-F418-4F6F-833E-725AF862BEB9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:flash_player:10.3.181.22:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A148CC5B-60B5-4098-AE1C-75349E50D301\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:flash_player:10.3.181.23:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1C2E61C2-6640-43AC-B435-17DD1DD68C47\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:flash_player:10.3.181.26:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"457D9876-959D-40A6-9B7A-6FA2C526F224\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:flash_player:10.3.181.34:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BA540D54-40C3-4C0B-9BF4-CB0B3FF22F60\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:flash_player:10.3.183.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3F86D2BF-E3D5-4F7B-931D-02C44AA9B61A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:flash_player:10.3.183.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"78C73959-8BDF-45F1-B453-DEF20C75DC8E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:flash_player:10.3.183.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B7081373-1693-4412-8B35-B594DE7EED64\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:flash_player:10.3.183.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"46ADCE2B-03B1-45A8-A6F0-88369C314473\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:flash_player:10.3.183.15:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9143B30C-28AD-4844-92C9-65445B4A2050\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:flash_player:10.3.183.16:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5CD017D9-3C1D-4E50-A0A4-DDC205ED0859\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:flash_player:10.3.183.18:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7C80FBFB-7562-4574-A0A9-33E0F5B46065\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:flash_player:10.3.183.19:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E60C0475-10A5-44DD-9E7B-CA17A5BAB5FB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:flash_player:10.3.183.20:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A8578EF3-9AAA-4E03-A74A-6973265427B5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:flash_player:10.3.183.23:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7B67A163-6F07-43F3-8C2F-BEE69B0EBF12\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:flash_player:10.3.183.25:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"74E1F5D3-7DBA-400A-A335-54C22EFF8796\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:flash_player:10.3.183.29:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C055FA74-E573-4C82-BAEA-17BD3032DA42\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:flash_player:10.3.183.43:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"555E97A6-F1BA-4A7D-AD0C-DB737D16500B\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0FF5999A-9D12-4CDD-8DE9-A89C10B2D574\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"155AD4FB-E527-4103-BCEF-801B653DEA37\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2CF61F35-5905-4BA9-AD7E-7DB261D2F256\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"11.5.502.136\", \"matchCriteriaId\": \"62E0EB75-6B39-429C-957F-67234FD1D136\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:flash_player:11.5.502.110:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2641F2EC-F514-47F9-845F-8DBF41CE268F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:flash_player:11.5.502.135:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"92AD164C-A1C7-4E3A-A16F-E49BBB74A80A\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0FF5999A-9D12-4CDD-8DE9-A89C10B2D574\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2CF61F35-5905-4BA9-AD7E-7DB261D2F256\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"11.2.202.258\", \"matchCriteriaId\": \"308B155D-8C66-4853-A1E8-573D87176C84\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:flash_player:11.2.202.223:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"146E1EAC-B9AF-4511-A0DC-A048428E3B68\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:flash_player:11.2.202.228:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5AFBB9EA-1A66-4FBC-BF89-7DF04FDD6788\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:flash_player:11.2.202.233:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"39065E60-3680-4384-95C0-EF4F874D2400\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:flash_player:11.2.202.235:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2B0603B3-5C98-422D-A49D-EBE1798DAE69\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:flash_player:11.2.202.236:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5AC7882D-1577-4CEA-B1C0-0FEBC91A441A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:flash_player:11.2.202.238:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CED86796-B721-49B1-A021-82FA769FA024\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:flash_player:11.2.202.243:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FF7843C6-628A-4091-8A09-6E126A89870E\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"155AD4FB-E527-4103-BCEF-801B653DEA37\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:flash_player_for_android:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"11.1.115.34\", \"matchCriteriaId\": \"2F92764B-9428-48EA-8498-13F25CF583B8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:flash_player_for_android:11.1.115.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"30C7A3D1-0F5E-447E-B6E2-E0144AD2E123\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:flash_player_for_android:11.1.115.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AEB00E81-9DD9-4652-A758-39CA040257D2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:flash_player_for_android:11.1.115.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4BC133FD-F856-4039-8981-81D42B355CE1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:flash_player_for_android:11.1.115.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9FC1D9DF-A32F-4514-8425-516FB19631EF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:flash_player_for_android:11.1.115.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AFD2501F-C071-4C27-9BA5-440A13F2EAA4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:flash_player_for_android:11.1.115.17:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B81AAB75-C6A9-4772-8E55-0A16B7C3C151\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:flash_player_for_android:11.1.115.20:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D2948D0F-39E5-48F1-80CA-E50A7BFA66D0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:flash_player_for_android:11.1.115.27:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FF0FDD57-C951-40DE-A7C8-BCD04EBB5C7F\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:google:android:4.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A39C31E3-75C0-4E92-A6B5-7D67B22E3449\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:google:android:4.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BB318EA4-2908-4B91-8DBB-20008FDF528A\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:google:android:4.0.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1F4E46A9-B652-47CE-92E8-01021E57724B\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:google:android:4.0.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AB9B53C6-AE84-4A45-B83E-8E5CE44F7B93\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:google:android:4.0.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"36DD8E3F-6308-4680-B932-4CBD8E58A7FB\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:google:android:4.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1DA9F0F7-D592-481E-884C-B1A94E702825\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:google:android:4.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FBDABB6C-FFF9-4E79-9EF1-BDC0BBDEA9F1\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:flash_player_for_android:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"11.1.111.29\", \"matchCriteriaId\": \"F14E1C39-6242-4D12-8AD4-26867392CF44\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:flash_player_for_android:11.0.1.153:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8097D00F-452A-4103-A443-8D218768680E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:flash_player_for_android:11.1.102.59:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"47D6CD90-E088-4291-9241-3D2CCA7CE0E3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:flash_player_for_android:11.1.111.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"467151E5-6B25-4CC9-BA26-4403F74416F5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:flash_player_for_android:11.1.111.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"26010AE4-79C7-4350-BF05-EA8773D279A7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:flash_player_for_android:11.1.111.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D5C9764E-7AFD-466A-B802-0CB4A5FFAD2B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:flash_player_for_android:11.1.111.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8360D0F0-F284-4653-9428-D8B644E0F21E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:flash_player_for_android:11.1.111.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A3B5C925-34CB-4413-8DA0-2DBA375D628B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:flash_player_for_android:11.1.111.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"19684437-4997-444F-A356-02EB82AE33F6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:flash_player_for_android:11.1.111.16:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2FECBDC1-34B4-483A-B844-7A930562F4D5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:flash_player_for_android:11.1.111.19:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"89030595-DD01-42BF-BECD-370CCD7BFD36\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:flash_player_for_android:11.1.111.24:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"31E3365E-2D70-495A-8309-557EA9FAD814\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:google:android:2.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4685EA90-1E01-4FFB-AE31-91FD5D69E2D8\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:google:android:2.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"938DC86D-C783-4EFA-9AB6-3ADC8CD7BB41\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:google:android:2.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A33DBF65-09A6-4149-BABE-2FFFBF10C31D\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:google:android:2.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"78B69434-13B2-4A43-AEB0-55E0ED403E54\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:google:android:2.2:rev1:*:*:*:*:*:*\", \"matchCriteriaId\": \"D1755B91-1B6B-4A9E-BB6B-22B399A6DD02\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:google:android:2.2.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1A92E88F-CCED-41D7-AFB7-CE1F9265E546\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:google:android:2.2.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D13D3A00-27A0-4635-9D50-05CA81950691\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:google:android:2.2.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4EB959DB-AFE7-4667-9662-949ADAB81CE3\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:google:android:2.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"18669EEC-ABB9-4CE4-8C0E-A88BE08EC368\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:google:android:2.3:rev1:*:*:*:*:*:*\", \"matchCriteriaId\": \"61D64B87-F1F1-4E52-86AE-F28E2C43A9A8\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:google:android:2.3.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"83AB2497-59DE-4253-A758-A3D03FAEB913\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:google:android:2.3.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6E197EC0-82DF-49D5-BD1A-7EA22EC0B806\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:google:android:2.3.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"286EED24-E011-4009-BC2E-B63CA06072CE\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:google:android:2.3.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D634E2E3-4E8A-4C88-A6BF-DBE7439EB3B0\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:google:android:2.3.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"77E6F4DF-F80F-4A9B-871E-155C0D3DD449\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:google:android:2.3.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5CC08431-C70E-4964-B7C0-C9C45F70DCD2\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:google:android:2.3.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3A2A79C6-A7BD-46C2-8320-B9652135F3BC\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:google:android:3.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6997F035-D2F5-4174-B979-5D42FF69D9AC\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:google:android:3.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E1FD2E59-59BF-4611-B65B-A2981127CAC0\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:google:android:3.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"86BFE05E-9749-43AA-8DB6-E2F13C2E1759\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:google:android:3.2.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"48DCE4AD-D629-4F0B-AFA8-6CAD061D5FA6\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:google:android:3.2.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4DAAB25F-26E4-4493-B3DA-F87240633031\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:google:android:3.2.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"96CD6B49-B9D4-493E-902D-B4EF48260BB0\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:google:android:3.2.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FB73EBA4-A9BE-4C40-9E6D-649E89D2C3F2\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:adobe_air:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"3.5.0.890\", \"matchCriteriaId\": \"82F8205F-2B68-4F1D-B417-76C1AB99FDFA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:adobe_air:3.5.0.600:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3526BEB1-0EB0-495F-A28F-D0C6189C0EA3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:adobe_air:3.5.0.880:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D44932EC-5BFD-4586-8D47-CC4446599C20\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:adobe_air_sdk:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"3.5.0.890\", \"matchCriteriaId\": \"1ACC36DC-87D2-442A-8D70-8AE467738A8C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:adobe_air_sdk:3.5.0.600:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D7F4A73A-DE76-41D5-BDA9-271699ABA0F6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:adobe_air_sdk:3.5.0.880:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"250E6F08-06DD-481E-B8DA-20DD3E69E498\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"Buffer overflow in Adobe Flash Player before 10.3.183.50 and 11.x before 11.5.502.146 on Windows and Mac OS X, before 10.3.183.50 and 11.x before 11.2.202.261 on Linux, before 11.1.111.31 on Android 2.x and 3.x, and before 11.1.115.36 on Android 4.x; Adobe AIR before 3.5.0.1060; and Adobe AIR SDK before 3.5.0.1060 allows attackers to execute arbitrary code via unspecified vectors.\"}, {\"lang\": \"es\", \"value\": \"Desbordamiento de b\\u00fafer en Adobe Flash Player anteriores a v10.3.183.50 y 11.x anteriores a v11.5.502.146 en Windows y Mac OS X, anteriores a v10.3.183.50 y 11.x anteriores a v11.2.202.261 en Linux, anteriores a v11.1.111.31 en Android 2.x y 3.x, y anteriores a v11.1.115.36 en Android 4.x; Adobe AIR anteriores a v3.5.0.1060; y Adobe AIR SDK anteriores a v3.5.0.1060 permite a atacantes remotos a ejecutar c\\u00f3digo a trav\\u00e9s de vectores no especificados.\"}]",
      "id": "CVE-2013-0630",
      "lastModified": "2024-11-21T01:47:54.110",
      "metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:C/I:C/A:C\", \"baseScore\": 10.0, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"COMPLETE\", \"integrityImpact\": \"COMPLETE\", \"availabilityImpact\": \"COMPLETE\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 10.0, \"impactScore\": 10.0, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
      "published": "2013-01-11T22:55:01.400",
      "references": "[{\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00003.html\", \"source\": \"psirt@adobe.com\"}, {\"url\": \"http://lists.opensuse.org/opensuse-updates/2013-01/msg00012.html\", \"source\": \"psirt@adobe.com\"}, {\"url\": \"http://lists.opensuse.org/opensuse-updates/2013-01/msg00019.html\", \"source\": \"psirt@adobe.com\"}, {\"url\": \"http://lists.opensuse.org/opensuse-updates/2013-01/msg00059.html\", \"source\": \"psirt@adobe.com\"}, {\"url\": \"http://lists.opensuse.org/opensuse-updates/2013-02/msg00084.html\", \"source\": \"psirt@adobe.com\"}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2013-0149.html\", \"source\": \"psirt@adobe.com\"}, {\"url\": \"http://www.adobe.com/support/security/bulletins/apsb13-01.html\", \"source\": \"psirt@adobe.com\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00003.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://lists.opensuse.org/opensuse-updates/2013-01/msg00012.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://lists.opensuse.org/opensuse-updates/2013-01/msg00019.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://lists.opensuse.org/opensuse-updates/2013-01/msg00059.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://lists.opensuse.org/opensuse-updates/2013-02/msg00084.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2013-0149.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.adobe.com/support/security/bulletins/apsb13-01.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}]",
      "sourceIdentifier": "psirt@adobe.com",
      "vulnStatus": "Modified",
      "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-119\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2013-0630\",\"sourceIdentifier\":\"psirt@adobe.com\",\"published\":\"2013-01-11T22:55:01.400\",\"lastModified\":\"2024-11-21T01:47:54.110\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Buffer overflow in Adobe Flash Player before 10.3.183.50 and 11.x before 11.5.502.146 on Windows and Mac OS X, before 10.3.183.50 and 11.x before 11.2.202.261 on Linux, before 11.1.111.31 on Android 2.x and 3.x, and before 11.1.115.36 on Android 4.x; Adobe AIR before 3.5.0.1060; and Adobe AIR SDK before 3.5.0.1060 allows attackers to execute arbitrary code via unspecified vectors.\"},{\"lang\":\"es\",\"value\":\"Desbordamiento de b\u00fafer en Adobe Flash Player anteriores a v10.3.183.50 y 11.x anteriores a v11.5.502.146 en Windows y Mac OS X, anteriores a v10.3.183.50 y 11.x anteriores a v11.2.202.261 en Linux, anteriores a v11.1.111.31 en Android 2.x y 3.x, y anteriores a v11.1.115.36 en Android 4.x; Adobe AIR anteriores a v3.5.0.1060; y Adobe AIR SDK anteriores a v3.5.0.1060 permite a atacantes remotos a ejecutar c\u00f3digo a trav\u00e9s de vectores no especificados.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:C/I:C/A:C\",\"baseScore\":10.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-119\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"10.3.183.48\",\"matchCriteriaId\":\"777CB526-C6E2-4245-84AF-04B345861E6E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:10.3.181.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4011899D-C2A3-463F-9C1A-A3478CA467B5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:10.3.181.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"330104CE-F418-4F6F-833E-725AF862BEB9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:10.3.181.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A148CC5B-60B5-4098-AE1C-75349E50D301\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:10.3.181.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1C2E61C2-6640-43AC-B435-17DD1DD68C47\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:10.3.181.26:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"457D9876-959D-40A6-9B7A-6FA2C526F224\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:10.3.181.34:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BA540D54-40C3-4C0B-9BF4-CB0B3FF22F60\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:10.3.183.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F86D2BF-E3D5-4F7B-931D-02C44AA9B61A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:10.3.183.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"78C73959-8BDF-45F1-B453-DEF20C75DC8E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:10.3.183.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B7081373-1693-4412-8B35-B594DE7EED64\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:10.3.183.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"46ADCE2B-03B1-45A8-A6F0-88369C314473\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:10.3.183.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9143B30C-28AD-4844-92C9-65445B4A2050\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:10.3.183.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5CD017D9-3C1D-4E50-A0A4-DDC205ED0859\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:10.3.183.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C80FBFB-7562-4574-A0A9-33E0F5B46065\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:10.3.183.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E60C0475-10A5-44DD-9E7B-CA17A5BAB5FB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:10.3.183.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8578EF3-9AAA-4E03-A74A-6973265427B5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:10.3.183.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B67A163-6F07-43F3-8C2F-BEE69B0EBF12\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:10.3.183.25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"74E1F5D3-7DBA-400A-A335-54C22EFF8796\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:10.3.183.29:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C055FA74-E573-4C82-BAEA-17BD3032DA42\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:10.3.183.43:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"555E97A6-F1BA-4A7D-AD0C-DB737D16500B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0FF5999A-9D12-4CDD-8DE9-A89C10B2D574\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"155AD4FB-E527-4103-BCEF-801B653DEA37\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2CF61F35-5905-4BA9-AD7E-7DB261D2F256\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"11.5.502.136\",\"matchCriteriaId\":\"62E0EB75-6B39-429C-957F-67234FD1D136\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:11.5.502.110:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2641F2EC-F514-47F9-845F-8DBF41CE268F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:11.5.502.135:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"92AD164C-A1C7-4E3A-A16F-E49BBB74A80A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0FF5999A-9D12-4CDD-8DE9-A89C10B2D574\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2CF61F35-5905-4BA9-AD7E-7DB261D2F256\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"11.2.202.258\",\"matchCriteriaId\":\"308B155D-8C66-4853-A1E8-573D87176C84\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:11.2.202.223:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"146E1EAC-B9AF-4511-A0DC-A048428E3B68\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:11.2.202.228:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5AFBB9EA-1A66-4FBC-BF89-7DF04FDD6788\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:11.2.202.233:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"39065E60-3680-4384-95C0-EF4F874D2400\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:11.2.202.235:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B0603B3-5C98-422D-A49D-EBE1798DAE69\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:11.2.202.236:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5AC7882D-1577-4CEA-B1C0-0FEBC91A441A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:11.2.202.238:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CED86796-B721-49B1-A021-82FA769FA024\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:11.2.202.243:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF7843C6-628A-4091-8A09-6E126A89870E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"155AD4FB-E527-4103-BCEF-801B653DEA37\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player_for_android:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"11.1.115.34\",\"matchCriteriaId\":\"2F92764B-9428-48EA-8498-13F25CF583B8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player_for_android:11.1.115.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"30C7A3D1-0F5E-447E-B6E2-E0144AD2E123\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player_for_android:11.1.115.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AEB00E81-9DD9-4652-A758-39CA040257D2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player_for_android:11.1.115.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4BC133FD-F856-4039-8981-81D42B355CE1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player_for_android:11.1.115.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9FC1D9DF-A32F-4514-8425-516FB19631EF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player_for_android:11.1.115.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AFD2501F-C071-4C27-9BA5-440A13F2EAA4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player_for_android:11.1.115.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B81AAB75-C6A9-4772-8E55-0A16B7C3C151\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player_for_android:11.1.115.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D2948D0F-39E5-48F1-80CA-E50A7BFA66D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player_for_android:11.1.115.27:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF0FDD57-C951-40DE-A7C8-BCD04EBB5C7F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:google:android:4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A39C31E3-75C0-4E92-A6B5-7D67B22E3449\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:google:android:4.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BB318EA4-2908-4B91-8DBB-20008FDF528A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:google:android:4.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1F4E46A9-B652-47CE-92E8-01021E57724B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:google:android:4.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB9B53C6-AE84-4A45-B83E-8E5CE44F7B93\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:google:android:4.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"36DD8E3F-6308-4680-B932-4CBD8E58A7FB\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:google:android:4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1DA9F0F7-D592-481E-884C-B1A94E702825\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:google:android:4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FBDABB6C-FFF9-4E79-9EF1-BDC0BBDEA9F1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player_for_android:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"11.1.111.29\",\"matchCriteriaId\":\"F14E1C39-6242-4D12-8AD4-26867392CF44\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player_for_android:11.0.1.153:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8097D00F-452A-4103-A443-8D218768680E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player_for_android:11.1.102.59:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"47D6CD90-E088-4291-9241-3D2CCA7CE0E3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player_for_android:11.1.111.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"467151E5-6B25-4CC9-BA26-4403F74416F5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player_for_android:11.1.111.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"26010AE4-79C7-4350-BF05-EA8773D279A7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player_for_android:11.1.111.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D5C9764E-7AFD-466A-B802-0CB4A5FFAD2B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player_for_android:11.1.111.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8360D0F0-F284-4653-9428-D8B644E0F21E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player_for_android:11.1.111.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A3B5C925-34CB-4413-8DA0-2DBA375D628B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player_for_android:11.1.111.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19684437-4997-444F-A356-02EB82AE33F6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player_for_android:11.1.111.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2FECBDC1-34B4-483A-B844-7A930562F4D5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player_for_android:11.1.111.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"89030595-DD01-42BF-BECD-370CCD7BFD36\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player_for_android:11.1.111.24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"31E3365E-2D70-495A-8309-557EA9FAD814\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:google:android:2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4685EA90-1E01-4FFB-AE31-91FD5D69E2D8\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:google:android:2.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"938DC86D-C783-4EFA-9AB6-3ADC8CD7BB41\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:google:android:2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A33DBF65-09A6-4149-BABE-2FFFBF10C31D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:google:android:2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"78B69434-13B2-4A43-AEB0-55E0ED403E54\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:google:android:2.2:rev1:*:*:*:*:*:*\",\"matchCriteriaId\":\"D1755B91-1B6B-4A9E-BB6B-22B399A6DD02\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:google:android:2.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A92E88F-CCED-41D7-AFB7-CE1F9265E546\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:google:android:2.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D13D3A00-27A0-4635-9D50-05CA81950691\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:google:android:2.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4EB959DB-AFE7-4667-9662-949ADAB81CE3\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:google:android:2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"18669EEC-ABB9-4CE4-8C0E-A88BE08EC368\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:google:android:2.3:rev1:*:*:*:*:*:*\",\"matchCriteriaId\":\"61D64B87-F1F1-4E52-86AE-F28E2C43A9A8\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:google:android:2.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"83AB2497-59DE-4253-A758-A3D03FAEB913\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:google:android:2.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E197EC0-82DF-49D5-BD1A-7EA22EC0B806\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:google:android:2.3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"286EED24-E011-4009-BC2E-B63CA06072CE\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:google:android:2.3.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D634E2E3-4E8A-4C88-A6BF-DBE7439EB3B0\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:google:android:2.3.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"77E6F4DF-F80F-4A9B-871E-155C0D3DD449\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:google:android:2.3.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5CC08431-C70E-4964-B7C0-C9C45F70DCD2\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:google:android:2.3.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A2A79C6-A7BD-46C2-8320-B9652135F3BC\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:google:android:3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6997F035-D2F5-4174-B979-5D42FF69D9AC\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:google:android:3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E1FD2E59-59BF-4611-B65B-A2981127CAC0\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:google:android:3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"86BFE05E-9749-43AA-8DB6-E2F13C2E1759\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:google:android:3.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"48DCE4AD-D629-4F0B-AFA8-6CAD061D5FA6\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:google:android:3.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4DAAB25F-26E4-4493-B3DA-F87240633031\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:google:android:3.2.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"96CD6B49-B9D4-493E-902D-B4EF48260BB0\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:google:android:3.2.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB73EBA4-A9BE-4C40-9E6D-649E89D2C3F2\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:adobe_air:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.5.0.890\",\"matchCriteriaId\":\"82F8205F-2B68-4F1D-B417-76C1AB99FDFA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:adobe_air:3.5.0.600:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3526BEB1-0EB0-495F-A28F-D0C6189C0EA3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:adobe_air:3.5.0.880:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D44932EC-5BFD-4586-8D47-CC4446599C20\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:adobe_air_sdk:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.5.0.890\",\"matchCriteriaId\":\"1ACC36DC-87D2-442A-8D70-8AE467738A8C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:adobe_air_sdk:3.5.0.600:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D7F4A73A-DE76-41D5-BDA9-271699ABA0F6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:adobe_air_sdk:3.5.0.880:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"250E6F08-06DD-481E-B8DA-20DD3E69E498\"}]}]}],\"references\":[{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00003.html\",\"source\":\"psirt@adobe.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2013-01/msg00012.html\",\"source\":\"psirt@adobe.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2013-01/msg00019.html\",\"source\":\"psirt@adobe.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2013-01/msg00059.html\",\"source\":\"psirt@adobe.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2013-02/msg00084.html\",\"source\":\"psirt@adobe.com\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2013-0149.html\",\"source\":\"psirt@adobe.com\"},{\"url\":\"http://www.adobe.com/support/security/bulletins/apsb13-01.html\",\"source\":\"psirt@adobe.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00003.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2013-01/msg00012.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2013-01/msg00019.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2013-01/msg00059.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2013-02/msg00084.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2013-0149.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.adobe.com/support/security/bulletins/apsb13-01.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.