10
CVSSv2

CVE-2013-5330

Published: 13/11/2013 Updated: 13/12/2018
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
VMScore: 890
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

Adobe Flash Player prior to 11.7.700.252 and 11.8.x and 11.9.x prior to 11.9.900.152 on Windows and Mac OS X and prior to 11.2.202.327 on Linux, Adobe AIR prior to 3.9.0.1210, Adobe AIR SDK prior to 3.9.0.1210, and Adobe AIR SDK & Compiler prior to 3.9.0.1210 allow malicious users to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-5329.

Most Upvoted Vulmon Research Post

There is no Researcher post for this vulnerability
Would you like to share something about it? Sign up now to share your knowledge with the community.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

adobe flash_player

adobe air sdk

adobe air

Vendor Advisories

Synopsis Critical: flash-plugin security update Type/Severity Security Advisory: Critical Topic An updated Adobe Flash Player package that fixes two security issues is nowavailable for Red Hat Enterprise Linux 5 and 6 SupplementaryThe Red Hat Security Response Team has rated this update as having criticals ...

Recent Articles

Two recently patched Adobe Flash vulnerabilities now used in Exploit Kits
welivesecurity • Sébastien Duquette • 31 Oct 2014

Two Flash vulnerabilities that were fixed by Adobe 2 weeks ago are now being used in exploit kits. This is in addition to a third vulnerability, CVE-2014-0556, that was patched in September and that has also been added to Nuclear EK last week.
Before we get into the nitty-gritty detail, we strongly encourage you to take a moment to check that your Flash player is up to date, we have created a step-by-step guide explaining how to do so which you can read here.
The first exploit, CVE-...

Intruder alert: Cyber thugs are using steganography to slip in malware badness
The Register • John Leyden • 08 Aug 2014

Signature-sniffers WILL be fooled – researcher

Common or garden cybercrooks have taken to using steganography – the art of hiding secret information within another image or message file – to run a click-fraud scam.
Steganography has long been the stuff of spy trade-craft and cypherpunk novels, but now cybercrooks have made the practice downmarket by applying it to the Lurk malware downloader.
Lurk uses an algorithm that can embed encrypted downloader URLs into an image file by inconspicuously manipulating individual pixels. T...

Intruder alert: Cyber thugs are using steganography to slip in malware badness
The Register • John Leyden • 08 Aug 2014

Signature-sniffers WILL be fooled – researcher

Common or garden cybercrooks have taken to using steganography – the art of hiding secret information within another image or message file – to run a click-fraud scam.
Steganography has long been the stuff of spy trade-craft and cypherpunk novels, but now cybercrooks have made the practice downmarket by applying it to the Lurk malware downloader.
Lurk uses an algorithm that can embed encrypted downloader URLs into an image file by inconspicuously manipulating individual pixels. T...