Show plain JSON{"id": "CVE-2012-4305", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 9.3, "accessVector": "NETWORK", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "authentication": "NONE", "integrityImpact": "COMPLETE", "accessComplexity": "MEDIUM", "availabilityImpact": "COMPLETE", "confidentialityImpact": "COMPLETE"}, "acInsufInfo": false, "impactScore": 10.0, "baseSeverity": "HIGH", "obtainAllPrivilege": false, "exploitabilityScore": 8.6, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "published": "2013-02-02T00:55:01.333", "references": [{"url": "http://marc.info/?l=bugtraq&m=136733161405818&w=2", "source": "cve@mitre.org"}, {"url": "http://marc.info/?l=bugtraq&m=136733161405818&w=2", "source": "cve@mitre.org"}, {"url": "http://www.kb.cert.org/vuls/id/858729", "tags": ["US Government Resource"], "source": "cve@mitre.org"}, {"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "tags": ["Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "http://www.us-cert.gov/cas/techalerts/TA13-032A.html", "tags": ["US Government Resource"], "source": "cve@mitre.org"}, {"url": "http://www.verisigninc.com/en_US/products-and-services/network-intelligence-availability/idefense/public-vulnerability-reports/articles/index.xhtml?id=1030", "source": "cve@mitre.org"}, {"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16392", "source": "cve@mitre.org"}, {"url": "http://marc.info/?l=bugtraq&m=136733161405818&w=2", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://marc.info/?l=bugtraq&m=136733161405818&w=2", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.kb.cert.org/vuls/id/858729", "tags": ["US Government Resource"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.us-cert.gov/cas/techalerts/TA13-032A.html", "tags": ["US Government Resource"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.verisigninc.com/en_US/products-and-services/network-intelligence-availability/idefense/public-vulnerability-reports/articles/index.xhtml?id=1030", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16392", "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Deferred", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "NVD-CWE-noinfo"}]}], "descriptions": [{"lang": "en", "value": "Unspecified vulnerability in the JavaFX component in Oracle Java SE JavaFX 2.2.4 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors, a different vulnerability than other CVEs listed in the February 2013 CPU. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from a third party that the issue allows remote attackers to execute arbitrary code via vectors related to an \"invalid type cast\" and exposed native methods in the T2KGlyph class."}, {"lang": "es", "value": "Vulnerabilidad no especificada en el componente JavaFX en Oracle Java SE JavaFX v2.2.4 y anteriores permite a atacantes remotos afectar la confidencialidad, integridad y disponibilidad mediante vectores desconocidos, una vulnerabilidad diferente a otros CVEs listandos en el February 2013 CPU."}], "lastModified": "2025-04-11T00:51:21.963", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:oracle:javafx:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "900995E9-D131-451F-AE5C-BEDA1E8E13A3", "versionEndIncluding": "2.2.4"}, {"criteria": "cpe:2.3:a:oracle:javafx:2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "64BDB79F-96E0-43A4-81CD-BADF0B039006"}, {"criteria": "cpe:2.3:a:oracle:javafx:2.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EC0E861D-AEBC-46EF-8CA6-CF7DE2518DB6"}, {"criteria": "cpe:2.3:a:oracle:javafx:2.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EB4477BB-9B0A-4874-9A5B-1B6193DC94E4"}, {"criteria": "cpe:2.3:a:oracle:javafx:2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BBA3A1CE-1531-426A-A600-4DD6FB63D01A"}, {"criteria": "cpe:2.3:a:oracle:javafx:2.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1E2179A9-513A-46AA-BC4D-ED988B38650F"}, {"criteria": "cpe:2.3:a:oracle:javafx:2.2.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F37311B5-5404-435B-BBB6-76DA3EA19730"}], "operator": "OR"}]}], "evaluatorComment": "Per: http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html\r\n\r\n\"Applies to client deployment of Java only. This vulnerability can be exploited only through untrusted Java Web Start applications and untrusted Java applets. (Untrusted Java Web Start applications and untrusted applets run in the Java sandbox with limited privileges.)\"", "sourceIdentifier": "cve@mitre.org"}