CVE-2012-5078
Published Oct 16, 2012
Last updated 7 years ago
Overview
- Description
- Unspecified vulnerability in the JavaFX component in Oracle Java SE JavaFX 2.2 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors, a different vulnerability than CVE-2012-5080.
- Source
- secalert_us@oracle.com
- NVD status
- Modified
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 10
- Impact score
- 10
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- NVD-CWE-noinfo
Social media
- Hype score
- Not currently trending
Evaluator
- Comment
- -
- Impact
- Per: http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html "Applies to client deployment of Java only. This vulnerability can be exploited only through untrusted Java Web Start applications and untrusted Java applets. (Untrusted Java Web Start applications and untrusted applets run in the Java sandbox with limited privileges.)"
- Solution
- Per: http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html "Applies to client deployment of Java only. This vulnerability can be exploited only through untrusted Java Web Start applications and untrusted Java applets. (Untrusted Java Web Start applications and untrusted applets run in the Java sandbox with limited privileges.)"
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:javafx:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "66D9DE78-8488-4E1C-86CB-00C614B2A6FB", "versionEndIncluding": "2.2" }, { "criteria": "cpe:2.3:a:oracle:javafx:1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "855EE6EA-E83A-44ED-9B55-5443DC43C09C" }, { "criteria": "cpe:2.3:a:oracle:javafx:1.2.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9F2D2905-5599-4981-AA20-76D7BB94D321" }, { "criteria": "cpe:2.3:a:oracle:javafx:1.2.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "88A002E2-FE19-48E3-B899-1DA0B04A44D6" }, { "criteria": "cpe:2.3:a:oracle:javafx:1.3.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7FC888EE-3C31-403A-B91B-1F7502900AF1" }, { "criteria": "cpe:2.3:a:oracle:javafx:1.3.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CC21B373-8BE0-4D00-B2C0-9F600C718380" }, { "criteria": "cpe:2.3:a:oracle:javafx:2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "64BDB79F-96E0-43A4-81CD-BADF0B039006" }, { "criteria": "cpe:2.3:a:oracle:javafx:2.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EC0E861D-AEBC-46EF-8CA6-CF7DE2518DB6" }, { "criteria": "cpe:2.3:a:oracle:javafx:2.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EB4477BB-9B0A-4874-9A5B-1B6193DC94E4" }, { "criteria": "cpe:2.3:a:oracle:javafx:2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BBA3A1CE-1531-426A-A600-4DD6FB63D01A" } ], "operator": "OR" } ] } ]