{"id":"CVE-2017-13083","details":"Akeo Consulting Rufus prior to version 2.17.1187 does not adequately validate the integrity of updates downloaded over HTTP, allowing an attacker to easily convince a user to execute arbitrary code","modified":"2025-11-14T05:02:18.035297Z","published":"2017-10-18T13:29:00.193Z","references":[{"type":"ADVISORY","url":"http://www.kb.cert.org/vuls/id/403768"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/100516"},{"type":"ADVISORY","url":"https://github.com/pbatard/rufus/commit/c3c39f7f8a11f612c4ebf7affce25ec6928eb1cb"},{"type":"ADVISORY","url":"https://github.com/pbatard/rufus/issues/1009"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/pbatard/rufus","events":[{"introduced":"0"},{"fixed":"c3c39f7f8a11f612c4ebf7affce25ec6928eb1cb"}]}],"versions":["v1.0.3","v1.0.4","v1.0.5","v1.0.6","v1.0.7","v1.1.0","v1.1.1","v1.1.2","v1.1.3","v1.1.4","v1.1.5","v1.1.6","v1.1.7","v1.2.0","v1.3.0","v1.3.1","v1.3.2","v1.3.3","v1.3.4","v1.4.0","v1.4.1","v1.4.10","v1.4.11","v1.4.12","v1.4.2","v1.4.3","v1.4.4","v1.4.5","v1.4.6","v1.4.7","v1.4.8","v1.4.9","v2.0","v2.1","v2.10","v2.11","v2.12","v2.13","v2.14","v2.15","v2.16","v2.2","v2.3","v2.4","v2.5","v2.6","v2.7","v2.8","v2.9"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2017-13083.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}