cve-2013-3129
Vulnerability from cvelistv5
Published
2013-07-10 01:00
Modified
2025-01-16 20:26
Severity ?
EPSS score ?
Summary
Microsoft .NET Framework 3.0 SP2, 3.5, 3.5.1, 4, and 4.5; Silverlight 5 before 5.1.20513.0; win32k.sys in the kernel-mode drivers, and GDI+, DirectWrite, and Journal, in Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT; GDI+ in Office 2003 SP3, 2007 SP3, and 2010 SP1; GDI+ in Visual Studio .NET 2003 SP1; and GDI+ in Lync 2010, 2010 Attendee, 2013, and Basic 2013 allow remote attackers to execute arbitrary code via a crafted TrueType Font (TTF) file, aka "TrueType Font Parsing Vulnerability."
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T16:00:09.955Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "MS13-052", tags: [ "vendor-advisory", "x_refsource_MS", "x_transferred", ], url: "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-052", }, { name: "oval:org.mitre.oval:def:17341", tags: [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17341", }, { name: "MS13-054", tags: [ "vendor-advisory", "x_refsource_MS", "x_transferred", ], url: "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-054", }, { name: "TA13-190A", tags: [ "third-party-advisory", "x_refsource_CERT", "x_transferred", ], url: "http://www.us-cert.gov/ncas/alerts/TA13-190A", }, { name: "MS13-053", tags: [ "vendor-advisory", "x_refsource_MS", "x_transferred", ], url: "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-053", }, { name: "oval:org.mitre.oval:def:17323", tags: [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17323", }, ], title: "CVE Program Container", }, { metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, }, { other: { content: { id: "CVE-2013-3129", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2023-12-11T17:19:03.099867Z", version: "2.0.3", }, type: "ssvc", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-94", description: "CWE-94 Improper Control of Generation of Code ('Code Injection')", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2025-01-16T20:26:50.042Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2013-07-09T00:00:00", descriptions: [ { lang: "en", value: "Microsoft .NET Framework 3.0 SP2, 3.5, 3.5.1, 4, and 4.5; Silverlight 5 before 5.1.20513.0; win32k.sys in the kernel-mode drivers, and GDI+, DirectWrite, and Journal, in Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT; GDI+ in Office 2003 SP3, 2007 SP3, and 2010 SP1; GDI+ in Visual Studio .NET 2003 SP1; and GDI+ in Lync 2010, 2010 Attendee, 2013, and Basic 2013 allow remote attackers to execute arbitrary code via a crafted TrueType Font (TTF) file, aka \"TrueType Font Parsing Vulnerability.\"", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-10-12T19:57:01", orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8", shortName: "microsoft", }, references: [ { name: "MS13-052", tags: [ "vendor-advisory", "x_refsource_MS", ], url: "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-052", }, { name: "oval:org.mitre.oval:def:17341", tags: [ "vdb-entry", "signature", "x_refsource_OVAL", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17341", }, { name: "MS13-054", tags: [ "vendor-advisory", "x_refsource_MS", ], url: "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-054", }, { name: "TA13-190A", tags: [ "third-party-advisory", "x_refsource_CERT", ], url: "http://www.us-cert.gov/ncas/alerts/TA13-190A", }, { name: "MS13-053", tags: [ "vendor-advisory", "x_refsource_MS", ], url: "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-053", }, { name: "oval:org.mitre.oval:def:17323", tags: [ "vdb-entry", "signature", "x_refsource_OVAL", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17323", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secure@microsoft.com", ID: "CVE-2013-3129", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Microsoft .NET Framework 3.0 SP2, 3.5, 3.5.1, 4, and 4.5; Silverlight 5 before 5.1.20513.0; win32k.sys in the kernel-mode drivers, and GDI+, DirectWrite, and Journal, in Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT; GDI+ in Office 2003 SP3, 2007 SP3, and 2010 SP1; GDI+ in Visual Studio .NET 2003 SP1; and GDI+ in Lync 2010, 2010 Attendee, 2013, and Basic 2013 allow remote attackers to execute arbitrary code via a crafted TrueType Font (TTF) file, aka \"TrueType Font Parsing Vulnerability.\"", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "MS13-052", refsource: "MS", url: "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-052", }, { name: "oval:org.mitre.oval:def:17341", refsource: "OVAL", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17341", }, { name: "MS13-054", refsource: "MS", url: "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-054", }, { name: "TA13-190A", refsource: "CERT", url: "http://www.us-cert.gov/ncas/alerts/TA13-190A", }, { name: "MS13-053", refsource: "MS", url: "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-053", }, { name: "oval:org.mitre.oval:def:17323", refsource: "OVAL", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17323", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8", assignerShortName: "microsoft", cveId: "CVE-2013-3129", datePublished: "2013-07-10T01:00:00", dateReserved: "2013-04-17T00:00:00", dateUpdated: "2025-01-16T20:26:50.042Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", "vulnerability-lookup:meta": { fkie_nvd: { configurations: "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:microsoft:.net_framework:3.0:sp2:*:*:*:*:*:*\", \"matchCriteriaId\": \"D400E856-2B2E-4CEA-8CA5-309FDF371CEA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:microsoft:.net_framework:3.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E039CE1F-B988-4741-AE2E-5B36E2AF9688\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:microsoft:.net_framework:3.5.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8EDC4407-7E92-4E60-82F0-0C87D1860D3A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:microsoft:.net_framework:4.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"792B417F-96A0-4E9D-9E79-5D7F982E2225\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:microsoft:.net_framework:4.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"61FAD9EE-FA7F-4B39-8A9B-AFFAEC8BF214\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:microsoft:lync:2010:*:attendee:*:*:*:*:*\", \"matchCriteriaId\": \"EE98CEE9-200B-494A-B645-D14ACB577250\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:microsoft:lync:2010:*:x64:*:*:*:*:*\", \"matchCriteriaId\": \"AF2C62AD-CC37-42B4-88AD-75F8F603ADEB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:microsoft:lync:2010:*:x86:*:*:*:*:*\", \"matchCriteriaId\": \"F01B787D-6263-4753-977D-211432447E38\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:microsoft:lync:2013:-:x64:*:*:*:*:*\", \"matchCriteriaId\": \"F3A59686-65D9-4003-BBA1-9BEB424A6C52\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:microsoft:lync:2013:-:x86:*:*:*:*:*\", \"matchCriteriaId\": \"1764CD62-F012-4CD9-B883-EEFEDEFBBCA1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:microsoft:lync_basic:2013:-:x64:*:*:*:*:*\", \"matchCriteriaId\": \"3599EF09-BCE4-44C2-90D7-7257BAF1480E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:microsoft:lync_basic:2013:-:x86:*:*:*:*:*\", \"matchCriteriaId\": \"EFAA17A7-7FD5-40E6-81C8-BD16BAAD96FC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:microsoft:office:2003:sp3:*:*:*:*:*:*\", \"matchCriteriaId\": \"A332D04D-CC8C-4F68-A261-BA2F2D8EAD1E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:microsoft:office:2007:sp3:*:*:*:*:*:*\", \"matchCriteriaId\": \"FEECD12A-5BEF-4675-B62E-86CF4A7474D7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:microsoft:office:2010:sp1:x64:*:*:*:*:*\", \"matchCriteriaId\": \"8239CEF1-BD02-4ACE-A0C2-75A9EAA15914\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:microsoft:office:2010:sp1:x86:*:*:*:*:*\", \"matchCriteriaId\": \"8383FADC-9391-4570-AAF9-92A952A4F04F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:microsoft:silverlight:5.0.60401.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2AA0FEB3-5F4B-4B80-A1C8-C266FD94FAAA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:microsoft:silverlight:5.0.60818.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7857A98D-A532-4AD4-A565-87C1D86F67DC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:microsoft:silverlight:5.0.60818.0:rc:*:*:*:*:*:*\", \"matchCriteriaId\": \"0988E68C-BB81-44B6-977E-33EF7EF6832B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:microsoft:silverlight:5.0.61118.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D8A4133E-7BC4-4CE7-B55A-BBB47DE51134\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:microsoft:silverlight:5.1.10411.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AF75D8B8-024E-4919-8B65-1F28377BC97C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:microsoft:silverlight:5.1.20125.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"604FEABE-24BC-40A3-9F36-F49A3F91559C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:microsoft:visual_studio_.net:2003:sp1:*:*:*:*:*:*\", \"matchCriteriaId\": \"85959AEB-2FE5-4A25-B298-F8223CE260D6\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:microsoft:windows_7:*:sp1:x64:*:*:*:*:*\", \"matchCriteriaId\": \"4FA15D65-7C32-4C7A-9915-746AB3F454EE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:microsoft:windows_7:*:sp1:x86:*:*:*:*:*\", \"matchCriteriaId\": \"976EFC05-9B37-4661-AD34-4FFDB5AB48E0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:microsoft:windows_8:-:-:x64:*:*:*:*:*\", \"matchCriteriaId\": \"DE8E7D74-0DCB-4633-B502-EDC2112229BA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:microsoft:windows_8:-:-:x86:*:*:*:*:*\", \"matchCriteriaId\": \"9DAA2E6F-A666-4136-8F6B-E35C313CAB2B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:microsoft:windows_rt:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"ABC7A32C-4A4A-4533-B42E-350E728ADFEB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*\", \"matchCriteriaId\": \"4D3B5E4F-56A6-4696-BBB4-19DF3613D020\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:microsoft:windows_server_2008:*:sp2:itanium:*:*:*:*:*\", \"matchCriteriaId\": \"7C684420-1614-4DAE-9BD9-F1FE9102A50F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x64:*:*:*:*:*\", \"matchCriteriaId\": \"FFF81F4B-7D92-4398-8658-84530FB8F518\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x86:*:*:*:*:*\", \"matchCriteriaId\": \"32C28EC2-8A34-4E30-A76A-86921D7332C1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A7DF96F8-BA6A-4780-9CA3-F719B3F81074\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*\", \"matchCriteriaId\": \"0A0D2704-C058-420B-B368-372D1129E914\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*\", \"matchCriteriaId\": \"CE477A73-4EE4-41E9-8694-5A3D5DC88656\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:microsoft:windows_xp:-:sp2:x64:*:*:*:*:*\", \"matchCriteriaId\": \"FFAC3F90-77BF-4F56-A89B-8A3D2D1FC6D6\"}]}]}]", descriptions: "[{\"lang\": \"en\", \"value\": \"Microsoft .NET Framework 3.0 SP2, 3.5, 3.5.1, 4, and 4.5; Silverlight 5 before 5.1.20513.0; win32k.sys in the kernel-mode drivers, and GDI+, DirectWrite, and Journal, in Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT; GDI+ in Office 2003 SP3, 2007 SP3, and 2010 SP1; GDI+ in Visual Studio .NET 2003 SP1; and GDI+ in Lync 2010, 2010 Attendee, 2013, and Basic 2013 allow remote attackers to execute arbitrary code via a crafted TrueType Font (TTF) file, aka \\\"TrueType Font Parsing Vulnerability.\\\"\"}, {\"lang\": \"es\", \"value\": \"Microsoft .NET Framework v3.0 SP2, v3.5, v3.5.1, v4, y v4.5; Silverlight v5 anteriores a v5.1.20513.0; win32k.sys en the kernel-mode drivers, y GDI+, DirectWrite, y Journal, en Windows XP SP2 y SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 y R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, y Windows RT; GDI+ en Office 2003 SP3, 2007 SP3, y 2010 SP1; GDI+ en Visual Studio .NET 2003 SP1; y GDI+ in Lync 2010, 2010 Attendee, 2013, y Basic 2013 permiten a atacantes remotos a ejecutar c\\u00f3digo a trav\\u00e9s de ficheros de fuentes TrueType manipulados, tamb\\u00eden conocido como \\\"TrueType Font Parsing Vulnerability.\\\"\"}]", id: "CVE-2013-3129", lastModified: "2024-11-21T01:53:03.020", metrics: "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:M/Au:N/C:C/I:C/A:C\", \"baseScore\": 9.3, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"COMPLETE\", \"integrityImpact\": \"COMPLETE\", \"availabilityImpact\": \"COMPLETE\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 8.6, \"impactScore\": 10.0, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": true}]}", published: "2013-07-10T03:46:09.810", references: "[{\"url\": \"http://www.us-cert.gov/ncas/alerts/TA13-190A\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\", \"US Government Resource\"]}, {\"url\": \"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-052\", \"source\": \"secure@microsoft.com\"}, {\"url\": \"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-053\", \"source\": \"secure@microsoft.com\"}, {\"url\": \"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-054\", \"source\": \"secure@microsoft.com\"}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17323\", \"source\": \"secure@microsoft.com\"}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17341\", \"source\": \"secure@microsoft.com\"}, {\"url\": \"http://www.us-cert.gov/ncas/alerts/TA13-190A\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"US Government Resource\"]}, {\"url\": \"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-052\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-053\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-054\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17323\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17341\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]", sourceIdentifier: "secure@microsoft.com", vulnStatus: "Modified", weaknesses: "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-94\"}]}]", }, nvd: "{\"cve\":{\"id\":\"CVE-2013-3129\",\"sourceIdentifier\":\"secure@microsoft.com\",\"published\":\"2013-07-10T03:46:09.810\",\"lastModified\":\"2025-01-16T21:15:12.187\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Microsoft .NET Framework 3.0 SP2, 3.5, 3.5.1, 4, and 4.5; Silverlight 5 before 5.1.20513.0; win32k.sys in the kernel-mode drivers, and GDI+, DirectWrite, and Journal, in Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT; GDI+ in Office 2003 SP3, 2007 SP3, and 2010 SP1; GDI+ in Visual Studio .NET 2003 SP1; and GDI+ in Lync 2010, 2010 Attendee, 2013, and Basic 2013 allow remote attackers to execute arbitrary code via a crafted TrueType Font (TTF) file, aka \\\"TrueType Font Parsing Vulnerability.\\\"\"},{\"lang\":\"es\",\"value\":\"Microsoft .NET Framework v3.0 SP2, v3.5, v3.5.1, v4, y v4.5; Silverlight v5 anteriores a v5.1.20513.0; win32k.sys en the kernel-mode drivers, y GDI+, DirectWrite, y Journal, en Windows XP SP2 y SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 y R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, y Windows RT; GDI+ en Office 2003 SP3, 2007 SP3, y 2010 SP1; GDI+ en Visual Studio .NET 2003 SP1; y GDI+ in Lync 2010, 2010 Attendee, 2013, y Basic 2013 permiten a atacantes remotos a ejecutar código a través de ficheros de fuentes TrueType manipulados, tambíen conocido como \\\"TrueType Font Parsing Vulnerability.\\\"\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:C/I:C/A:C\",\"baseScore\":9.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":8.6,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-94\"}]},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-94\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:.net_framework:3.0:sp2:*:*:*:*:*:*\",\"matchCriteriaId\":\"D400E856-2B2E-4CEA-8CA5-309FDF371CEA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:.net_framework:3.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E039CE1F-B988-4741-AE2E-5B36E2AF9688\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:.net_framework:3.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8EDC4407-7E92-4E60-82F0-0C87D1860D3A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:.net_framework:4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"792B417F-96A0-4E9D-9E79-5D7F982E2225\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:.net_framework:4.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"61FAD9EE-FA7F-4B39-8A9B-AFFAEC8BF214\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:lync:2010:*:attendee:*:*:*:*:*\",\"matchCriteriaId\":\"EE98CEE9-200B-494A-B645-D14ACB577250\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:lync:2010:*:x64:*:*:*:*:*\",\"matchCriteriaId\":\"AF2C62AD-CC37-42B4-88AD-75F8F603ADEB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:lync:2010:*:x86:*:*:*:*:*\",\"matchCriteriaId\":\"F01B787D-6263-4753-977D-211432447E38\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:lync:2013:-:x64:*:*:*:*:*\",\"matchCriteriaId\":\"F3A59686-65D9-4003-BBA1-9BEB424A6C52\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:lync:2013:-:x86:*:*:*:*:*\",\"matchCriteriaId\":\"1764CD62-F012-4CD9-B883-EEFEDEFBBCA1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:lync_basic:2013:-:x64:*:*:*:*:*\",\"matchCriteriaId\":\"3599EF09-BCE4-44C2-90D7-7257BAF1480E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:lync_basic:2013:-:x86:*:*:*:*:*\",\"matchCriteriaId\":\"EFAA17A7-7FD5-40E6-81C8-BD16BAAD96FC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:office:2003:sp3:*:*:*:*:*:*\",\"matchCriteriaId\":\"A332D04D-CC8C-4F68-A261-BA2F2D8EAD1E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:office:2007:sp3:*:*:*:*:*:*\",\"matchCriteriaId\":\"FEECD12A-5BEF-4675-B62E-86CF4A7474D7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:office:2010:sp1:x64:*:*:*:*:*\",\"matchCriteriaId\":\"8239CEF1-BD02-4ACE-A0C2-75A9EAA15914\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:office:2010:sp1:x86:*:*:*:*:*\",\"matchCriteriaId\":\"8383FADC-9391-4570-AAF9-92A952A4F04F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:silverlight:5.0.60401.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2AA0FEB3-5F4B-4B80-A1C8-C266FD94FAAA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:silverlight:5.0.60818.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7857A98D-A532-4AD4-A565-87C1D86F67DC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:silverlight:5.0.60818.0:rc:*:*:*:*:*:*\",\"matchCriteriaId\":\"0988E68C-BB81-44B6-977E-33EF7EF6832B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:silverlight:5.0.61118.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D8A4133E-7BC4-4CE7-B55A-BBB47DE51134\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:silverlight:5.1.10411.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AF75D8B8-024E-4919-8B65-1F28377BC97C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:silverlight:5.1.20125.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"604FEABE-24BC-40A3-9F36-F49A3F91559C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:visual_studio_.net:2003:sp1:*:*:*:*:*:*\",\"matchCriteriaId\":\"85959AEB-2FE5-4A25-B298-F8223CE260D6\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_7:*:sp1:x64:*:*:*:*:*\",\"matchCriteriaId\":\"4FA15D65-7C32-4C7A-9915-746AB3F454EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_7:*:sp1:x86:*:*:*:*:*\",\"matchCriteriaId\":\"976EFC05-9B37-4661-AD34-4FFDB5AB48E0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_8:-:-:x64:*:*:*:*:*\",\"matchCriteriaId\":\"DE8E7D74-0DCB-4633-B502-EDC2112229BA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_8:-:-:x86:*:*:*:*:*\",\"matchCriteriaId\":\"9DAA2E6F-A666-4136-8F6B-E35C313CAB2B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_rt:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ABC7A32C-4A4A-4533-B42E-350E728ADFEB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D3B5E4F-56A6-4696-BBB4-19DF3613D020\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_server_2008:*:sp2:itanium:*:*:*:*:*\",\"matchCriteriaId\":\"7C684420-1614-4DAE-9BD9-F1FE9102A50F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x64:*:*:*:*:*\",\"matchCriteriaId\":\"FFF81F4B-7D92-4398-8658-84530FB8F518\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x86:*:*:*:*:*\",\"matchCriteriaId\":\"32C28EC2-8A34-4E30-A76A-86921D7332C1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A7DF96F8-BA6A-4780-9CA3-F719B3F81074\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*\",\"matchCriteriaId\":\"0A0D2704-C058-420B-B368-372D1129E914\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*\",\"matchCriteriaId\":\"CE477A73-4EE4-41E9-8694-5A3D5DC88656\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_xp:-:sp2:x64:*:*:*:*:*\",\"matchCriteriaId\":\"FFAC3F90-77BF-4F56-A89B-8A3D2D1FC6D6\"}]}]}],\"references\":[{\"url\":\"http://www.us-cert.gov/ncas/alerts/TA13-190A\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-052\",\"source\":\"secure@microsoft.com\"},{\"url\":\"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-053\",\"source\":\"secure@microsoft.com\"},{\"url\":\"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-054\",\"source\":\"secure@microsoft.com\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17323\",\"source\":\"secure@microsoft.com\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17341\",\"source\":\"secure@microsoft.com\"},{\"url\":\"http://www.us-cert.gov/ncas/alerts/TA13-190A\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-052\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-053\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-054\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17323\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17341\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}", vulnrichment: { containers: "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-052\", \"name\": \"MS13-052\", \"tags\": [\"vendor-advisory\", \"x_refsource_MS\", \"x_transferred\"]}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17341\", \"name\": \"oval:org.mitre.oval:def:17341\", \"tags\": [\"vdb-entry\", \"signature\", \"x_refsource_OVAL\", \"x_transferred\"]}, {\"url\": \"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-054\", \"name\": \"MS13-054\", \"tags\": [\"vendor-advisory\", \"x_refsource_MS\", \"x_transferred\"]}, {\"url\": \"http://www.us-cert.gov/ncas/alerts/TA13-190A\", \"name\": \"TA13-190A\", \"tags\": [\"third-party-advisory\", \"x_refsource_CERT\", \"x_transferred\"]}, {\"url\": \"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-053\", \"name\": \"MS13-053\", \"tags\": [\"vendor-advisory\", \"x_refsource_MS\", \"x_transferred\"]}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17323\", \"name\": \"oval:org.mitre.oval:def:17323\", \"tags\": [\"vdb-entry\", \"signature\", \"x_refsource_OVAL\", \"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-06T16:00:09.955Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 7.8, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"REQUIRED\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"HIGH\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2013-3129\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2023-12-11T17:19:03.099867Z\"}}}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-94\", \"description\": \"CWE-94 Improper Control of Generation of Code ('Code Injection')\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-01-16T20:26:41.088Z\"}}], \"cna\": {\"affected\": [{\"vendor\": \"n/a\", \"product\": \"n/a\", \"versions\": [{\"status\": \"affected\", \"version\": \"n/a\"}]}], \"datePublic\": \"2013-07-09T00:00:00\", \"references\": [{\"url\": \"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-052\", \"name\": \"MS13-052\", \"tags\": [\"vendor-advisory\", \"x_refsource_MS\"]}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17341\", \"name\": \"oval:org.mitre.oval:def:17341\", \"tags\": [\"vdb-entry\", \"signature\", \"x_refsource_OVAL\"]}, {\"url\": \"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-054\", \"name\": \"MS13-054\", \"tags\": [\"vendor-advisory\", \"x_refsource_MS\"]}, {\"url\": \"http://www.us-cert.gov/ncas/alerts/TA13-190A\", \"name\": \"TA13-190A\", \"tags\": [\"third-party-advisory\", \"x_refsource_CERT\"]}, {\"url\": \"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-053\", \"name\": \"MS13-053\", \"tags\": [\"vendor-advisory\", \"x_refsource_MS\"]}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17323\", \"name\": \"oval:org.mitre.oval:def:17323\", \"tags\": [\"vdb-entry\", \"signature\", \"x_refsource_OVAL\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"Microsoft .NET Framework 3.0 SP2, 3.5, 3.5.1, 4, and 4.5; Silverlight 5 before 5.1.20513.0; win32k.sys in the kernel-mode drivers, and GDI+, DirectWrite, and Journal, in Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT; GDI+ in Office 2003 SP3, 2007 SP3, and 2010 SP1; GDI+ in Visual Studio .NET 2003 SP1; and GDI+ in Lync 2010, 2010 Attendee, 2013, and Basic 2013 allow remote attackers to execute arbitrary code via a crafted TrueType Font (TTF) file, aka \\\"TrueType Font Parsing Vulnerability.\\\"\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"text\", \"description\": \"n/a\"}]}], \"providerMetadata\": {\"orgId\": \"f38d906d-7342-40ea-92c1-6c4a2c6478c8\", \"shortName\": \"microsoft\", \"dateUpdated\": \"2018-10-12T19:57:01\"}, \"x_legacyV4Record\": {\"affects\": {\"vendor\": {\"vendor_data\": [{\"product\": {\"product_data\": [{\"version\": {\"version_data\": [{\"version_value\": \"n/a\"}]}, \"product_name\": \"n/a\"}]}, \"vendor_name\": \"n/a\"}]}}, \"data_type\": \"CVE\", \"references\": {\"reference_data\": [{\"url\": \"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-052\", \"name\": \"MS13-052\", \"refsource\": \"MS\"}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17341\", \"name\": \"oval:org.mitre.oval:def:17341\", \"refsource\": \"OVAL\"}, {\"url\": \"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-054\", \"name\": \"MS13-054\", \"refsource\": \"MS\"}, {\"url\": \"http://www.us-cert.gov/ncas/alerts/TA13-190A\", \"name\": \"TA13-190A\", \"refsource\": \"CERT\"}, {\"url\": \"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-053\", \"name\": \"MS13-053\", \"refsource\": \"MS\"}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17323\", \"name\": \"oval:org.mitre.oval:def:17323\", \"refsource\": \"OVAL\"}]}, \"data_format\": \"MITRE\", \"description\": {\"description_data\": [{\"lang\": \"eng\", \"value\": \"Microsoft .NET Framework 3.0 SP2, 3.5, 3.5.1, 4, and 4.5; Silverlight 5 before 5.1.20513.0; win32k.sys in the kernel-mode drivers, and GDI+, DirectWrite, and Journal, in Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT; GDI+ in Office 2003 SP3, 2007 SP3, and 2010 SP1; GDI+ in Visual Studio .NET 2003 SP1; and GDI+ in Lync 2010, 2010 Attendee, 2013, and Basic 2013 allow remote attackers to execute arbitrary code via a crafted TrueType Font (TTF) file, aka \\\"TrueType Font Parsing Vulnerability.\\\"\"}]}, \"problemtype\": {\"problemtype_data\": [{\"description\": [{\"lang\": \"eng\", \"value\": \"n/a\"}]}]}, \"data_version\": \"4.0\", \"CVE_data_meta\": {\"ID\": \"CVE-2013-3129\", \"STATE\": \"PUBLIC\", \"ASSIGNER\": \"secure@microsoft.com\"}}}}", cveMetadata: "{\"cveId\": \"CVE-2013-3129\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-01-16T20:26:50.042Z\", \"dateReserved\": \"2013-04-17T00:00:00\", \"assignerOrgId\": \"f38d906d-7342-40ea-92c1-6c4a2c6478c8\", \"datePublished\": \"2013-07-10T01:00:00\", \"assignerShortName\": \"microsoft\"}", dataType: "CVE_RECORD", dataVersion: "5.1", }, }, }
Log in or create an account to share your comment.
Security Advisory comment format.
This schema specifies the format of a comment related to a security advisory.
Title of the comment
Description of the comment
Loading…
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.