{"vulnerability": "cve-2013-3129", "sightings": [{"uuid": "464c32d0-589e-49df-b8cb-5757081151d0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2013-3129", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/2043", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2013-3129\n\ud83d\udd39 Description: Microsoft .NET Framework 3.0 SP2, 3.5, 3.5.1, 4, and 4.5; Silverlight 5 before 5.1.20513.0; win32k.sys in the kernel-mode drivers, and GDI+, DirectWrite, and Journal, in Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT; GDI+ in Office 2003 SP3, 2007 SP3, and 2010 SP1; GDI+ in Visual Studio .NET 2003 SP1; and GDI+ in Lync 2010, 2010 Attendee, 2013, and Basic 2013 allow remote attackers to execute arbitrary code via a crafted TrueType Font (TTF) file, aka \"TrueType Font Parsing Vulnerability.\"\n\ud83d\udccf Published: 2013-07-10T01:00:00\n\ud83d\udccf Modified: 2025-01-16T20:26:50.042Z\n\ud83d\udd17 References:\n1. https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-052\n2. https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17341\n3. https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-054\n4. http://www.us-cert.gov/ncas/alerts/TA13-190A\n5. https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-053\n6. https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17323", "creation_timestamp": "2025-01-16T20:56:00.000000Z"}]}