Show plain JSON{"id": "CVE-2013-1482", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 10.0, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "authentication": "NONE", "integrityImpact": "COMPLETE", "accessComplexity": "LOW", "availabilityImpact": "COMPLETE", "confidentialityImpact": "COMPLETE"}, "acInsufInfo": false, "impactScore": 10.0, "baseSeverity": "HIGH", "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "published": "2013-02-02T00:55:03.020", "references": [{"url": "http://marc.info/?l=bugtraq&m=136733161405818&w=2", "source": "secalert_us@oracle.com"}, {"url": "http://marc.info/?l=bugtraq&m=136733161405818&w=2", "source": "secalert_us@oracle.com"}, {"url": "http://www.kb.cert.org/vuls/id/858729", "tags": ["US Government Resource"], "source": "secalert_us@oracle.com"}, {"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "tags": ["Vendor Advisory"], "source": "secalert_us@oracle.com"}, {"url": "http://www.us-cert.gov/cas/techalerts/TA13-032A.html", "tags": ["US Government Resource"], "source": "secalert_us@oracle.com"}, {"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16222", "source": "secalert_us@oracle.com"}, {"url": "http://marc.info/?l=bugtraq&m=136733161405818&w=2", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://marc.info/?l=bugtraq&m=136733161405818&w=2", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.kb.cert.org/vuls/id/858729", "tags": ["US Government Resource"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.us-cert.gov/cas/techalerts/TA13-032A.html", "tags": ["US Government Resource"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16222", "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Deferred", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "NVD-CWE-noinfo"}]}], "descriptions": [{"lang": "en", "value": "Unspecified vulnerability in the JavaFX component in Oracle Java SE JavaFX 2.2.4 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors, a different vulnerability than other CVEs listed in the February 2013 CPU."}, {"lang": "es", "value": "Vulnerabilidad no especificada en el componente JavaFX en Oracle Java SE JavaFX v2.2.4 y anteriores, permite a atacantes remotos para afectar la confidencialidad, integridad y disponibilidad a trav\u00e9s de vectores desconocidos, una vulnerabilidad diferente a CVE listados en el 02 2013 CPU."}], "lastModified": "2025-04-11T00:51:21.963", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:oracle:javafx:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "900995E9-D131-451F-AE5C-BEDA1E8E13A3", "versionEndIncluding": "2.2.4"}, {"criteria": "cpe:2.3:a:oracle:javafx:2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "64BDB79F-96E0-43A4-81CD-BADF0B039006"}, {"criteria": "cpe:2.3:a:oracle:javafx:2.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EC0E861D-AEBC-46EF-8CA6-CF7DE2518DB6"}, {"criteria": "cpe:2.3:a:oracle:javafx:2.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EB4477BB-9B0A-4874-9A5B-1B6193DC94E4"}, {"criteria": "cpe:2.3:a:oracle:javafx:2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BBA3A1CE-1531-426A-A600-4DD6FB63D01A"}, {"criteria": "cpe:2.3:a:oracle:javafx:2.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1E2179A9-513A-46AA-BC4D-ED988B38650F"}, {"criteria": "cpe:2.3:a:oracle:javafx:2.2.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F37311B5-5404-435B-BBB6-76DA3EA19730"}], "operator": "OR"}]}], "evaluatorComment": "Per: http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html\r\n\r\n\"Applies to client deployment of Java only. This vulnerability can be exploited only through untrusted Java Web Start applications and untrusted Java applets. (Untrusted Java Web Start applications and untrusted applets run in the Java sandbox with limited privileges.)\"", "sourceIdentifier": "secalert_us@oracle.com"}