Search for vulnerabilities
Vulnerability details: VCID-vspg-9eep-aaae
Vulnerability ID VCID-vspg-9eep-aaae
Aliases CVE-2013-4852
Summary Integer overflow in PuTTY 0.62 and earlier, WinSCP before 5.1.6, and other products that use PuTTY allows remote SSH servers to cause a denial of service (crash) and possibly execute arbitrary code in certain applications that use PuTTY via a negative size value in an RSA key signature during the SSH handshake, which triggers a heap-based buffer overflow.
Status Published
Exploitability 0.5
Weighted Severity 6.2
Risk 3.1
Affected and Fixed Packages Package Details
Weaknesses (1)
System Score Found at
generic_textual Medium http://people.canonical.com/~ubuntu-security/cve/2013/CVE-2013-4852.html
epss 0.01751 https://api.first.org/data/v1/epss?cve=CVE-2013-4852
epss 0.01751 https://api.first.org/data/v1/epss?cve=CVE-2013-4852
epss 0.01751 https://api.first.org/data/v1/epss?cve=CVE-2013-4852
epss 0.01751 https://api.first.org/data/v1/epss?cve=CVE-2013-4852
epss 0.01751 https://api.first.org/data/v1/epss?cve=CVE-2013-4852
epss 0.01751 https://api.first.org/data/v1/epss?cve=CVE-2013-4852
epss 0.01751 https://api.first.org/data/v1/epss?cve=CVE-2013-4852
epss 0.01751 https://api.first.org/data/v1/epss?cve=CVE-2013-4852
epss 0.01751 https://api.first.org/data/v1/epss?cve=CVE-2013-4852
epss 0.01751 https://api.first.org/data/v1/epss?cve=CVE-2013-4852
epss 0.01751 https://api.first.org/data/v1/epss?cve=CVE-2013-4852
epss 0.01751 https://api.first.org/data/v1/epss?cve=CVE-2013-4852
epss 0.01751 https://api.first.org/data/v1/epss?cve=CVE-2013-4852
epss 0.01751 https://api.first.org/data/v1/epss?cve=CVE-2013-4852
epss 0.01751 https://api.first.org/data/v1/epss?cve=CVE-2013-4852
epss 0.01751 https://api.first.org/data/v1/epss?cve=CVE-2013-4852
epss 0.01751 https://api.first.org/data/v1/epss?cve=CVE-2013-4852
epss 0.01751 https://api.first.org/data/v1/epss?cve=CVE-2013-4852
epss 0.01751 https://api.first.org/data/v1/epss?cve=CVE-2013-4852
epss 0.01751 https://api.first.org/data/v1/epss?cve=CVE-2013-4852
epss 0.01751 https://api.first.org/data/v1/epss?cve=CVE-2013-4852
epss 0.01751 https://api.first.org/data/v1/epss?cve=CVE-2013-4852
epss 0.01751 https://api.first.org/data/v1/epss?cve=CVE-2013-4852
epss 0.01751 https://api.first.org/data/v1/epss?cve=CVE-2013-4852
epss 0.01751 https://api.first.org/data/v1/epss?cve=CVE-2013-4852
epss 0.01751 https://api.first.org/data/v1/epss?cve=CVE-2013-4852
epss 0.01751 https://api.first.org/data/v1/epss?cve=CVE-2013-4852
epss 0.01751 https://api.first.org/data/v1/epss?cve=CVE-2013-4852
epss 0.01751 https://api.first.org/data/v1/epss?cve=CVE-2013-4852
epss 0.01751 https://api.first.org/data/v1/epss?cve=CVE-2013-4852
epss 0.01751 https://api.first.org/data/v1/epss?cve=CVE-2013-4852
epss 0.01751 https://api.first.org/data/v1/epss?cve=CVE-2013-4852
epss 0.01751 https://api.first.org/data/v1/epss?cve=CVE-2013-4852
epss 0.01751 https://api.first.org/data/v1/epss?cve=CVE-2013-4852
epss 0.01751 https://api.first.org/data/v1/epss?cve=CVE-2013-4852
epss 0.01751 https://api.first.org/data/v1/epss?cve=CVE-2013-4852
epss 0.01751 https://api.first.org/data/v1/epss?cve=CVE-2013-4852
epss 0.01751 https://api.first.org/data/v1/epss?cve=CVE-2013-4852
epss 0.01751 https://api.first.org/data/v1/epss?cve=CVE-2013-4852
epss 0.01751 https://api.first.org/data/v1/epss?cve=CVE-2013-4852
epss 0.01751 https://api.first.org/data/v1/epss?cve=CVE-2013-4852
epss 0.01751 https://api.first.org/data/v1/epss?cve=CVE-2013-4852
epss 0.01751 https://api.first.org/data/v1/epss?cve=CVE-2013-4852
epss 0.01751 https://api.first.org/data/v1/epss?cve=CVE-2013-4852
epss 0.01751 https://api.first.org/data/v1/epss?cve=CVE-2013-4852
epss 0.01751 https://api.first.org/data/v1/epss?cve=CVE-2013-4852
epss 0.01751 https://api.first.org/data/v1/epss?cve=CVE-2013-4852
epss 0.01751 https://api.first.org/data/v1/epss?cve=CVE-2013-4852
epss 0.01751 https://api.first.org/data/v1/epss?cve=CVE-2013-4852
epss 0.01751 https://api.first.org/data/v1/epss?cve=CVE-2013-4852
epss 0.01751 https://api.first.org/data/v1/epss?cve=CVE-2013-4852
epss 0.01751 https://api.first.org/data/v1/epss?cve=CVE-2013-4852
epss 0.01751 https://api.first.org/data/v1/epss?cve=CVE-2013-4852
epss 0.01751 https://api.first.org/data/v1/epss?cve=CVE-2013-4852
epss 0.01751 https://api.first.org/data/v1/epss?cve=CVE-2013-4852
epss 0.01751 https://api.first.org/data/v1/epss?cve=CVE-2013-4852
epss 0.01751 https://api.first.org/data/v1/epss?cve=CVE-2013-4852
epss 0.01751 https://api.first.org/data/v1/epss?cve=CVE-2013-4852
epss 0.01751 https://api.first.org/data/v1/epss?cve=CVE-2013-4852
epss 0.01751 https://api.first.org/data/v1/epss?cve=CVE-2013-4852
epss 0.01751 https://api.first.org/data/v1/epss?cve=CVE-2013-4852
epss 0.01751 https://api.first.org/data/v1/epss?cve=CVE-2013-4852
epss 0.01751 https://api.first.org/data/v1/epss?cve=CVE-2013-4852
epss 0.01751 https://api.first.org/data/v1/epss?cve=CVE-2013-4852
epss 0.01751 https://api.first.org/data/v1/epss?cve=CVE-2013-4852
epss 0.01751 https://api.first.org/data/v1/epss?cve=CVE-2013-4852
epss 0.01751 https://api.first.org/data/v1/epss?cve=CVE-2013-4852
epss 0.01751 https://api.first.org/data/v1/epss?cve=CVE-2013-4852
epss 0.02141 https://api.first.org/data/v1/epss?cve=CVE-2013-4852
epss 0.02141 https://api.first.org/data/v1/epss?cve=CVE-2013-4852
epss 0.02141 https://api.first.org/data/v1/epss?cve=CVE-2013-4852
epss 0.02141 https://api.first.org/data/v1/epss?cve=CVE-2013-4852
epss 0.02141 https://api.first.org/data/v1/epss?cve=CVE-2013-4852
epss 0.02141 https://api.first.org/data/v1/epss?cve=CVE-2013-4852
epss 0.02141 https://api.first.org/data/v1/epss?cve=CVE-2013-4852
epss 0.02141 https://api.first.org/data/v1/epss?cve=CVE-2013-4852
epss 0.02141 https://api.first.org/data/v1/epss?cve=CVE-2013-4852
epss 0.02141 https://api.first.org/data/v1/epss?cve=CVE-2013-4852
epss 0.02141 https://api.first.org/data/v1/epss?cve=CVE-2013-4852
epss 0.02141 https://api.first.org/data/v1/epss?cve=CVE-2013-4852
epss 0.02141 https://api.first.org/data/v1/epss?cve=CVE-2013-4852
epss 0.02141 https://api.first.org/data/v1/epss?cve=CVE-2013-4852
epss 0.02141 https://api.first.org/data/v1/epss?cve=CVE-2013-4852
epss 0.02141 https://api.first.org/data/v1/epss?cve=CVE-2013-4852
epss 0.02562 https://api.first.org/data/v1/epss?cve=CVE-2013-4852
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4852
cvssv2 6.8 https://nvd.nist.gov/vuln/detail/CVE-2013-4852
generic_textual Medium http://svn.tartarus.org/sgt?view=revision&sortby=date&revision=9896
generic_textual Medium http://www.securityfocus.com/archive/1/527763/30/0
Reference id Reference type URL
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=718779
http://lists.opensuse.org/opensuse-updates/2013-08/msg00035.html
http://lists.opensuse.org/opensuse-updates/2013-08/msg00041.html
http://people.canonical.com/~ubuntu-security/cve/2013/CVE-2013-4852.html
https://api.first.org/data/v1/epss?cve=CVE-2013-4852
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4206
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4207
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4208
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4852
http://secunia.com/advisories/54379
http://secunia.com/advisories/54517
http://secunia.com/advisories/54533
http://svn.tartarus.org/sgt?view=revision&sortby=date&revision=9896
http://winscp.net/tracker/show_bug.cgi?id=1017
http://www.chiark.greenend.org.uk/~sgtatham/putty/wishlist/vuln-signature-stringlen.html
http://www.debian.org/security/2013/dsa-2736
http://www.search-lab.hu/advisories/secadv-20130722
http://www.securityfocus.com/archive/1/527763/30/0
718779 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=718779
cpe:2.3:a:putty:putty:0.45:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:putty:putty:0.45:*:*:*:*:*:*:*
cpe:2.3:a:putty:putty:0.46:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:putty:putty:0.46:*:*:*:*:*:*:*
cpe:2.3:a:putty:putty:0.47:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:putty:putty:0.47:*:*:*:*:*:*:*
cpe:2.3:a:putty:putty:0.48:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:putty:putty:0.48:*:*:*:*:*:*:*
cpe:2.3:a:putty:putty:0.49:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:putty:putty:0.49:*:*:*:*:*:*:*
cpe:2.3:a:putty:putty:0.50:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:putty:putty:0.50:*:*:*:*:*:*:*
cpe:2.3:a:putty:putty:0.51:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:putty:putty:0.51:*:*:*:*:*:*:*
cpe:2.3:a:putty:putty:0.52:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:putty:putty:0.52:*:*:*:*:*:*:*
cpe:2.3:a:putty:putty:0.53b:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:putty:putty:0.53b:*:*:*:*:*:*:*
cpe:2.3:a:putty:putty:0.54:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:putty:putty:0.54:*:*:*:*:*:*:*
cpe:2.3:a:putty:putty:0.55:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:putty:putty:0.55:*:*:*:*:*:*:*
cpe:2.3:a:putty:putty:0.56:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:putty:putty:0.56:*:*:*:*:*:*:*
cpe:2.3:a:putty:putty:0.57:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:putty:putty:0.57:*:*:*:*:*:*:*
cpe:2.3:a:putty:putty:0.58:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:putty:putty:0.58:*:*:*:*:*:*:*
cpe:2.3:a:putty:putty:0.59:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:putty:putty:0.59:*:*:*:*:*:*:*
cpe:2.3:a:putty:putty:0.60:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:putty:putty:0.60:*:*:*:*:*:*:*
cpe:2.3:a:putty:putty:0.61:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:putty:putty:0.61:*:*:*:*:*:*:*
cpe:2.3:a:putty:putty:2010-06-01:r8967:*:*:development_snapshot:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:putty:putty:2010-06-01:r8967:*:*:development_snapshot:*:*:*
cpe:2.3:a:simon_tatham:putty:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:simon_tatham:putty:*:*:*:*:*:*:*:*
cpe:2.3:a:simon_tatham:putty:0.53:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:simon_tatham:putty:0.53:*:*:*:*:*:*:*
cpe:2.3:a:winscp:winscp:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:winscp:winscp:*:*:*:*:*:*:*:*
cpe:2.3:a:winscp:winscp:3.7.6:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:winscp:winscp:3.7.6:*:*:*:*:*:*:*
cpe:2.3:a:winscp:winscp:3.8.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:winscp:winscp:3.8.2:*:*:*:*:*:*:*
cpe:2.3:a:winscp:winscp:3.8_beta:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:winscp:winscp:3.8_beta:*:*:*:*:*:*:*
cpe:2.3:a:winscp:winscp:4.0.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:winscp:winscp:4.0.4:*:*:*:*:*:*:*
cpe:2.3:a:winscp:winscp:4.0.5:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:winscp:winscp:4.0.5:*:*:*:*:*:*:*
cpe:2.3:a:winscp:winscp:4.2.6:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:winscp:winscp:4.2.6:*:*:*:*:*:*:*
cpe:2.3:a:winscp:winscp:4.2.7:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:winscp:winscp:4.2.7:*:*:*:*:*:*:*
cpe:2.3:a:winscp:winscp:4.2.8:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:winscp:winscp:4.2.8:*:*:*:*:*:*:*
cpe:2.3:a:winscp:winscp:4.2.9:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:winscp:winscp:4.2.9:*:*:*:*:*:*:*
cpe:2.3:a:winscp:winscp:4.3.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:winscp:winscp:4.3.2:*:*:*:*:*:*:*
cpe:2.3:a:winscp:winscp:4.3.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:winscp:winscp:4.3.4:*:*:*:*:*:*:*
cpe:2.3:a:winscp:winscp:4.3.5:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:winscp:winscp:4.3.5:*:*:*:*:*:*:*
cpe:2.3:a:winscp:winscp:4.3.6:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:winscp:winscp:4.3.6:*:*:*:*:*:*:*
cpe:2.3:a:winscp:winscp:4.3.7:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:winscp:winscp:4.3.7:*:*:*:*:*:*:*
cpe:2.3:a:winscp:winscp:4.3.8:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:winscp:winscp:4.3.8:*:*:*:*:*:*:*
cpe:2.3:a:winscp:winscp:4.3.9:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:winscp:winscp:4.3.9:*:*:*:*:*:*:*
cpe:2.3:a:winscp:winscp:4.4.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:winscp:winscp:4.4.0:*:*:*:*:*:*:*
cpe:2.3:a:winscp:winscp:5.0.1:beta:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:winscp:winscp:5.0.1:beta:*:*:*:*:*:*
cpe:2.3:a:winscp:winscp:5.0.2:beta:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:winscp:winscp:5.0.2:beta:*:*:*:*:*:*
cpe:2.3:a:winscp:winscp:5.0.3:beta:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:winscp:winscp:5.0.3:beta:*:*:*:*:*:*
cpe:2.3:a:winscp:winscp:5.0.4:beta:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:winscp:winscp:5.0.4:beta:*:*:*:*:*:*
cpe:2.3:a:winscp:winscp:5.0.5:beta:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:winscp:winscp:5.0.5:beta:*:*:*:*:*:*
cpe:2.3:a:winscp:winscp:5.0.6:beta:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:winscp:winscp:5.0.6:beta:*:*:*:*:*:*
cpe:2.3:a:winscp:winscp:5.0.7:beta:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:winscp:winscp:5.0.7:beta:*:*:*:*:*:*
cpe:2.3:a:winscp:winscp:5.0.8:rc:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:winscp:winscp:5.0.8:rc:*:*:*:*:*:*
cpe:2.3:a:winscp:winscp:5.0.9:rc:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:winscp:winscp:5.0.9:rc:*:*:*:*:*:*
cpe:2.3:a:winscp:winscp:5.0:beta:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:winscp:winscp:5.0:beta:*:*:*:*:*:*
cpe:2.3:a:winscp:winscp:5.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:winscp:winscp:5.1:*:*:*:*:*:*:*
cpe:2.3:a:winscp:winscp:5.1.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:winscp:winscp:5.1.1:*:*:*:*:*:*:*
cpe:2.3:a:winscp:winscp:5.1.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:winscp:winscp:5.1.2:*:*:*:*:*:*:*
cpe:2.3:a:winscp:winscp:5.1.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:winscp:winscp:5.1.3:*:*:*:*:*:*:*
cpe:2.3:a:winscp:winscp:5.1.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:winscp:winscp:5.1.4:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:7.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.1:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*
CVE-2013-4852 https://nvd.nist.gov/vuln/detail/CVE-2013-4852
GLSA-201308-01 https://security.gentoo.org/glsa/201308-01
GLSA-201309-08 https://security.gentoo.org/glsa/201309-08
No exploits are available.
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P Found at https://nvd.nist.gov/vuln/detail/CVE-2013-4852
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Exploit Prediction Scoring System (EPSS)
Percentile 0.80889
EPSS Score 0.01751
Published At March 28, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
There are no relevant records.