{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-22T10:44:35.533","vulnerabilities":[{"cve":{"id":"CVE-2013-0649","sourceIdentifier":"psirt@adobe.com","published":"2013-02-12T20:55:04.590","lastModified":"2025-04-11T00:51:21.963","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"Use-after-free vulnerability in Adobe Flash Player before 10.3.183.63 and 11.x before 11.6.602.168 on Windows, before 10.3.183.61 and 11.x before 11.6.602.167 on Mac OS X, before 10.3.183.61 and 11.x before 11.2.202.270 on Linux, before 11.1.111.43 on Android 2.x and 3.x, and before 11.1.115.47 on Android 4.x; Adobe AIR before 3.6.0.597; and Adobe AIR SDK before 3.6.0.599 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2013-0644 and CVE-2013-1374."},{"lang":"es","value":"Vulnerabilidad de uso después de liberación en Adobe Flash Player v10.3.183.63 y antes v11.x antes v11.6.602.168 en Windows, antes v10.3.183.61 y v11.x antes v11.6.602.167 en Mac OS X, antes v10.3.183.61 y v11.x antes v11.2.202.270 en Linux, antes v11.1.111.43 en Android v2.x y v3.x, y antes v11.1.115.47 en Android v4.x; Adobe AIR antes v3.6.0.597, y Adobe AIR SDK antes v3.6.0.599 permite a los atacantes ejecutar código arbitrario a través de vectores no especificados, una vulnerabilidad diferente a CVE-2013-0644 y CVE-2013 1374."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-399"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*","versionStartIncluding":"10.3","versionEndExcluding":"10.3.183.63","matchCriteriaId":"D74A4017-3145-4AC0-B58A-1B20A344553E"},{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*","versionStartIncluding":"11.6","versionEndExcluding":"11.6.602.168","matchCriteriaId":"280E545D-5BD8-476F-85BD-D75C4E2FB1DF"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*","matchCriteriaId":"A2572D17-1DE6-457B-99CC-64AFD54487EA"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*","versionStartIncluding":"10.3","versionEndExcluding":"10.3.183.61","matchCriteriaId":"A47384CE-9685-4BCF-9BF9-BEB37B2BF2E0"},{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*","versionStartIncluding":"11.2","versionEndExcluding":"11.2.202.270","matchCriteriaId":"5DD16048-5B57-4D3C-81D2-DF66743466F0"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*","matchCriteriaId":"703AF700-7A70-47E2-BC3A-7FD03B3CA9C1"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*","versionStartIncluding":"11.1","versionEndExcluding":"11.1.111.43","matchCriteriaId":"D5DC97D0-648E-49FD-9622-E3692D2D97FF"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:o:google:android:*:*:*:*:*:*:*:*","versionStartIncluding":"2.0","versionEndIncluding":"2.3.7","matchCriteriaId":"1F3C0381-865A-4176-A291-988E12612161"},{"vulnerable":false,"criteria":"cpe:2.3:o:google:android:*:*:*:*:*:*:*:*","versionStartIncluding":"3.0","versionEndIncluding":"3.2.6","matchCriteriaId":"EBEB1CC1-D410-4157-8BF3-8EB8BAC444DD"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*","versionStartIncluding":"11.1","versionEndExcluding":"11.1.115.47","matchCriteriaId":"C4A317C9-5817-4F9A-95AD-4013CF290F44"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:o:google:android:*:*:*:*:*:*:*:*","versionStartIncluding":"4.0","versionEndIncluding":"4.4.4","matchCriteriaId":"539FC1E0-6987-48EE-8FE9-7A27D4C3B69A"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*","versionEndExcluding":"3.6.0.597","matchCriteriaId":"3B3F3711-70A1-4133-A184-765DD11A6D02"},{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*","versionEndExcluding":"3.6.0.599","matchCriteriaId":"E608B8F0-994A-431C-8F37-936C47598F0F"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*","versionStartIncluding":"10.3","versionEndExcluding":"10.3.183.61","matchCriteriaId":"A47384CE-9685-4BCF-9BF9-BEB37B2BF2E0"},{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*","versionStartIncluding":"11.6","versionEndExcluding":"11.6.602.167","matchCriteriaId":"F4875744-A793-4C40-B724-FB702517C828"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*","matchCriteriaId":"4781BF1E-8A4E-4AFF-9540-23D523EE30DD"}]}]}],"references":[{"url":"http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00009.html","source":"psirt@adobe.com","tags":["Mailing List","Third Party Advisory"]},{"url":"http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00010.html","source":"psirt@adobe.com","tags":["Mailing List","Third Party Advisory"]},{"url":"http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00011.html","source":"psirt@adobe.com","tags":["Mailing List","Third Party Advisory"]},{"url":"http://rhn.redhat.com/errata/RHSA-2013-0254.html","source":"psirt@adobe.com","tags":["Third Party Advisory"]},{"url":"http://www.adobe.com/support/security/bulletins/apsb13-05.html","source":"psirt@adobe.com","tags":["Vendor Advisory"]},{"url":"http://www.us-cert.gov/cas/techalerts/TA13-043A.html","source":"psirt@adobe.com","tags":["Third Party Advisory","US Government Resource"]},{"url":"http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00009.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"]},{"url":"http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00010.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"]},{"url":"http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00011.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"]},{"url":"http://rhn.redhat.com/errata/RHSA-2013-0254.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"http://www.adobe.com/support/security/bulletins/apsb13-05.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://www.us-cert.gov/cas/techalerts/TA13-043A.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","US Government Resource"]}]}}]}