mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
233 lines
7.9 KiB
JSON
233 lines
7.9 KiB
JSON
{
|
|
"CVE_data_meta" : {
|
|
"ASSIGNER" : "cve@mitre.org",
|
|
"ID" : "CVE-2012-1531",
|
|
"STATE" : "PUBLIC"
|
|
},
|
|
"affects" : {
|
|
"vendor" : {
|
|
"vendor_data" : [
|
|
{
|
|
"product" : {
|
|
"product_data" : [
|
|
{
|
|
"product_name" : "n/a",
|
|
"version" : {
|
|
"version_data" : [
|
|
{
|
|
"version_value" : "n/a"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name" : "n/a"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format" : "MITRE",
|
|
"data_type" : "CVE",
|
|
"data_version" : "4.0",
|
|
"description" : {
|
|
"description_data" : [
|
|
{
|
|
"lang" : "eng",
|
|
"value" : "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, 5.0 Update 36 and earlier, and 1.4.2_38 and earlier; and JavaFX 2.2 and earlier; allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D."
|
|
}
|
|
]
|
|
},
|
|
"problemtype" : {
|
|
"problemtype_data" : [
|
|
{
|
|
"description" : [
|
|
{
|
|
"lang" : "eng",
|
|
"value" : "n/a"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references" : {
|
|
"reference_data" : [
|
|
{
|
|
"name" : "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html",
|
|
"refsource" : "CONFIRM",
|
|
"url" : "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html"
|
|
},
|
|
{
|
|
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21616490",
|
|
"refsource" : "CONFIRM",
|
|
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21616490"
|
|
},
|
|
{
|
|
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21621154",
|
|
"refsource" : "CONFIRM",
|
|
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21621154"
|
|
},
|
|
{
|
|
"name" : "http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf",
|
|
"refsource" : "CONFIRM",
|
|
"url" : "http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf"
|
|
},
|
|
{
|
|
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21620037",
|
|
"refsource" : "CONFIRM",
|
|
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21620037"
|
|
},
|
|
{
|
|
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21625794",
|
|
"refsource" : "CONFIRM",
|
|
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21625794"
|
|
},
|
|
{
|
|
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21631786",
|
|
"refsource" : "CONFIRM",
|
|
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21631786"
|
|
},
|
|
{
|
|
"name" : "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS12-023/index.html",
|
|
"refsource" : "CONFIRM",
|
|
"url" : "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS12-023/index.html"
|
|
},
|
|
{
|
|
"name" : "http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html",
|
|
"refsource" : "CONFIRM",
|
|
"url" : "http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html"
|
|
},
|
|
{
|
|
"name" : "HPSBUX02832",
|
|
"refsource" : "HP",
|
|
"url" : "http://marc.info/?l=bugtraq&m=135542848327757&w=2"
|
|
},
|
|
{
|
|
"name" : "SSRT101042",
|
|
"refsource" : "HP",
|
|
"url" : "http://marc.info/?l=bugtraq&m=135542848327757&w=2"
|
|
},
|
|
{
|
|
"name" : "HPSBOV02833",
|
|
"refsource" : "HP",
|
|
"url" : "http://marc.info/?l=bugtraq&m=135758563611658&w=2"
|
|
},
|
|
{
|
|
"name" : "SSRT101043",
|
|
"refsource" : "HP",
|
|
"url" : "http://marc.info/?l=bugtraq&m=135758563611658&w=2"
|
|
},
|
|
{
|
|
"name" : "MDVSA-2013:150",
|
|
"refsource" : "MANDRIVA",
|
|
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150"
|
|
},
|
|
{
|
|
"name" : "RHSA-2012:1391",
|
|
"refsource" : "REDHAT",
|
|
"url" : "http://rhn.redhat.com/errata/RHSA-2012-1391.html"
|
|
},
|
|
{
|
|
"name" : "RHSA-2012:1392",
|
|
"refsource" : "REDHAT",
|
|
"url" : "http://rhn.redhat.com/errata/RHSA-2012-1392.html"
|
|
},
|
|
{
|
|
"name" : "RHSA-2012:1465",
|
|
"refsource" : "REDHAT",
|
|
"url" : "http://rhn.redhat.com/errata/RHSA-2012-1465.html"
|
|
},
|
|
{
|
|
"name" : "RHSA-2012:1466",
|
|
"refsource" : "REDHAT",
|
|
"url" : "http://rhn.redhat.com/errata/RHSA-2012-1466.html"
|
|
},
|
|
{
|
|
"name" : "RHSA-2012:1467",
|
|
"refsource" : "REDHAT",
|
|
"url" : "http://rhn.redhat.com/errata/RHSA-2012-1467.html"
|
|
},
|
|
{
|
|
"name" : "RHSA-2013:1455",
|
|
"refsource" : "REDHAT",
|
|
"url" : "http://rhn.redhat.com/errata/RHSA-2013-1455.html"
|
|
},
|
|
{
|
|
"name" : "RHSA-2013:1456",
|
|
"refsource" : "REDHAT",
|
|
"url" : "http://rhn.redhat.com/errata/RHSA-2013-1456.html"
|
|
},
|
|
{
|
|
"name" : "SUSE-SU-2012:1398",
|
|
"refsource" : "SUSE",
|
|
"url" : "http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00016.html"
|
|
},
|
|
{
|
|
"name" : "SUSE-SU-2012:1595",
|
|
"refsource" : "SUSE",
|
|
"url" : "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00022.html"
|
|
},
|
|
{
|
|
"name" : "SUSE-SU-2012:1489",
|
|
"refsource" : "SUSE",
|
|
"url" : "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00010.html"
|
|
},
|
|
{
|
|
"name" : "56033",
|
|
"refsource" : "BID",
|
|
"url" : "http://www.securityfocus.com/bid/56033"
|
|
},
|
|
{
|
|
"name" : "oval:org.mitre.oval:def:16546",
|
|
"refsource" : "OVAL",
|
|
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16546"
|
|
},
|
|
{
|
|
"name" : "51141",
|
|
"refsource" : "SECUNIA",
|
|
"url" : "http://secunia.com/advisories/51141"
|
|
},
|
|
{
|
|
"name" : "51313",
|
|
"refsource" : "SECUNIA",
|
|
"url" : "http://secunia.com/advisories/51313"
|
|
},
|
|
{
|
|
"name" : "51315",
|
|
"refsource" : "SECUNIA",
|
|
"url" : "http://secunia.com/advisories/51315"
|
|
},
|
|
{
|
|
"name" : "51326",
|
|
"refsource" : "SECUNIA",
|
|
"url" : "http://secunia.com/advisories/51326"
|
|
},
|
|
{
|
|
"name" : "51327",
|
|
"refsource" : "SECUNIA",
|
|
"url" : "http://secunia.com/advisories/51327"
|
|
},
|
|
{
|
|
"name" : "51328",
|
|
"refsource" : "SECUNIA",
|
|
"url" : "http://secunia.com/advisories/51328"
|
|
},
|
|
{
|
|
"name" : "51390",
|
|
"refsource" : "SECUNIA",
|
|
"url" : "http://secunia.com/advisories/51390"
|
|
},
|
|
{
|
|
"name" : "51393",
|
|
"refsource" : "SECUNIA",
|
|
"url" : "http://secunia.com/advisories/51393"
|
|
},
|
|
{
|
|
"name" : "51438",
|
|
"refsource" : "SECUNIA",
|
|
"url" : "http://secunia.com/advisories/51438"
|
|
}
|
|
]
|
|
}
|
|
}
|