mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-09 16:05:11 +00:00
174 lines
5.8 KiB
JSON
174 lines
5.8 KiB
JSON
{
|
|
"id": "CVE-2013-0447",
|
|
"sourceIdentifier": "secalert_us@oracle.com",
|
|
"published": "2013-02-02T00:55:02.443",
|
|
"lastModified": "2025-04-11T00:51:21.963",
|
|
"vulnStatus": "Deferred",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Unspecified vulnerability in the JavaFX component in Oracle Java SE JavaFX 2.2.4 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors, a different vulnerability than other CVEs listed in the February 2013 CPU."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Vulnerabilidad sin especificar de JavaFX de Oracle Java SE JavaFX v2.2.4 y anteriores que permite ataques remotos que afectan a la confidencialidad, integridad, y disponibilidad por vectores desconocidos. Esta vulnerabilidad es diferente a otras con otros CVEs listadas en febrero de 2013."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
|
"baseScore": 10.0,
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "COMPLETE",
|
|
"integrityImpact": "COMPLETE",
|
|
"availabilityImpact": "COMPLETE"
|
|
},
|
|
"baseSeverity": "HIGH",
|
|
"exploitabilityScore": 10.0,
|
|
"impactScore": 10.0,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "NVD-CWE-noinfo"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:javafx:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "2.2.4",
|
|
"matchCriteriaId": "900995E9-D131-451F-AE5C-BEDA1E8E13A3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:javafx:2.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "64BDB79F-96E0-43A4-81CD-BADF0B039006"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:javafx:2.0.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "EC0E861D-AEBC-46EF-8CA6-CF7DE2518DB6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:javafx:2.0.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "EB4477BB-9B0A-4874-9A5B-1B6193DC94E4"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:javafx:2.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "BBA3A1CE-1531-426A-A600-4DD6FB63D01A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:javafx:2.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1E2179A9-513A-46AA-BC4D-ED988B38650F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:javafx:2.2.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F37311B5-5404-435B-BBB6-76DA3EA19730"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://marc.info/?l=bugtraq&m=136733161405818&w=2",
|
|
"source": "secalert_us@oracle.com"
|
|
},
|
|
{
|
|
"url": "http://marc.info/?l=bugtraq&m=136733161405818&w=2",
|
|
"source": "secalert_us@oracle.com"
|
|
},
|
|
{
|
|
"url": "http://www.kb.cert.org/vuls/id/858729",
|
|
"source": "secalert_us@oracle.com",
|
|
"tags": [
|
|
"US Government Resource"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html",
|
|
"source": "secalert_us@oracle.com",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.us-cert.gov/cas/techalerts/TA13-032A.html",
|
|
"source": "secalert_us@oracle.com",
|
|
"tags": [
|
|
"US Government Resource"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16240",
|
|
"source": "secalert_us@oracle.com"
|
|
},
|
|
{
|
|
"url": "http://marc.info/?l=bugtraq&m=136733161405818&w=2",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "http://marc.info/?l=bugtraq&m=136733161405818&w=2",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "http://www.kb.cert.org/vuls/id/858729",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"US Government Resource"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.us-cert.gov/cas/techalerts/TA13-032A.html",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"US Government Resource"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16240",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
}
|
|
],
|
|
"evaluatorComment": "Per http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html \r\n\r\n\"Applies to client deployment of Java only. This vulnerability can be exploited only through untrusted Java Web Start applications and untrusted Java applets. (Untrusted Java Web Start applications and untrusted applets run in the Java sandbox with limited privileges.)\""
|
|
} |