Show plain JSON{"id": "CVE-2013-1301", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 4.3, "accessVector": "NETWORK", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "authentication": "NONE", "integrityImpact": "NONE", "accessComplexity": "MEDIUM", "availabilityImpact": "NONE", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": false, "impactScore": 2.9, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 8.6, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "published": "2013-05-15T03:36:33.410", "references": [{"url": "http://www.us-cert.gov/ncas/alerts/TA13-134A", "tags": ["Third Party Advisory", "US Government Resource"], "source": "secure@microsoft.com"}, {"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-044", "source": "secure@microsoft.com"}, {"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16750", "source": "secure@microsoft.com"}, {"url": "http://www.us-cert.gov/ncas/alerts/TA13-134A", "tags": ["Third Party Advisory", "US Government Resource"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-044", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16750", "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Deferred", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-200"}]}], "descriptions": [{"lang": "en", "value": "Microsoft Visio 2003 SP3 2007 SP3, and 2010 SP1 allows remote attackers to read arbitrary files via an XML document containing an external entity declaration in conjunction with an entity reference, aka \"XML External Entities Resolution Vulnerability.\""}, {"lang": "es", "value": "Microsoft Visio 2003 SP3 2007 SP3, y 2010 SP1 permite a atacantes remotos leer ficheros de su elecci\u00f3n mediante un documento XML conteniendo una declaraci\u00f3n de entidad externa junto con una referencia de entidad, tambi\u00e9n conocido como \"Vulnerabilidad de resluci\u00f3n de entidad XML externa\""}], "lastModified": "2025-04-11T00:51:21.963", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:microsoft:visio:2003:sp3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "553ADEFC-11EC-4E29-8A95-4AF59DB6CEAE"}, {"criteria": "cpe:2.3:a:microsoft:visio:2007:sp3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "387D78BD-2368-4525-BFC2-52149585E1F0"}, {"criteria": "cpe:2.3:a:microsoft:visio:2010:sp1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "309E4A2E-60B9-4F68-BAC6-7BC997849B19"}], "operator": "OR"}]}], "sourceIdentifier": "secure@microsoft.com"}