Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:oracle:fusion_middleware:7.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "2A9B040F-4062-45C1-A659-B5E9242B54CD", "vulnerable": true}, {"criteria": "cpe:2.3:a:oracle:fusion_middleware:11.1.1.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "6DF57046-4537-475E-B25E-2375492850DD", "vulnerable": true}, {"criteria": "cpe:2.3:a:oracle:fusion_middleware:11.1.1.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "4227A17D-C070-406A-BEB7-6D43F3A0E98A", "vulnerable": true}], "negate": false, "operator": "OR"}]}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:springsource:spring_framework:2.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "5ECA0EF4-6BEA-4464-B098-37C0342AEDDF", "vulnerable": true}, {"criteria": "cpe:2.3:a:springsource:spring_framework:2.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "B4DDA5A7-62A4-471A-9B01-D54CF560BF56", "vulnerable": true}, {"criteria": "cpe:2.3:a:springsource:spring_framework:2.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "B977B334-EC1A-45BD-976D-3DF3332ADA90", "vulnerable": true}, {"criteria": "cpe:2.3:a:springsource:spring_framework:2.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "6DC37B55-E7DF-4426-B1E2-2644078EDD19", "vulnerable": true}, {"criteria": "cpe:2.3:a:springsource:spring_framework:2.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "A939B963-7C6C-4617-A695-A9CC4FC774EE", "vulnerable": true}, {"criteria": "cpe:2.3:a:springsource:spring_framework:2.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "BB2D44CB-BBBF-45DE-B3C9-2BD2625BC8E7", "vulnerable": true}, {"criteria": "cpe:2.3:a:springsource:spring_framework:2.5.6:*:*:*:*:*:*:*", "matchCriteriaId": "F709DAAC-AA32-4D37-9E0C-A014FB519697", "vulnerable": true}, {"criteria": "cpe:2.3:a:springsource:spring_framework:2.5.7:*:*:*:*:*:*:*", "matchCriteriaId": "BC2B4BF5-FFAE-475F-AF1B-835497BF86D9", "vulnerable": true}, {"criteria": "cpe:2.3:a:springsource:spring_framework:3.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "62111DAE-3E05-4D95-8B34-E2EFB6142DCA", "vulnerable": true}, {"criteria": "cpe:2.3:a:springsource:spring_framework:3.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "9A9F796E-340B-4FF5-9322-94E57D7BCEE6", "vulnerable": true}, {"criteria": "cpe:2.3:a:springsource:spring_framework:3.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "D8BA17FD-BC52-4D84-9753-5D41D3BC35B4", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "cveTags": [], "descriptions": [{"lang": "en", "value": "SpringSource Spring Framework 2.5.x before 2.5.6.SEC02, 2.5.7 before 2.5.7.SR01, and 3.0.x before 3.0.3 allows remote attackers to execute arbitrary code via an HTTP request containing class.classLoader.URLs[0]=jar: followed by a URL of a crafted .jar file."}, {"lang": "es", "value": "SpringSource Spring Framework v2.5.x anteriores a v2.5.6.SEC02, v2.5.7 anteriores a v2.5.7.SR01, y v3.0.x anteriores a v3.0.3 permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s de una petici\u00f3n HTTP que contenga class.classLoader.URLs[0]=jar: seguida por una URL de un fichero .jar modificado."}], "evaluatorComment": "The previous CVSS assessment 5.1 (AV:N/AC:M/Au:N/C:P/I:P/A:P) was provided at the time of initial analysis based on the best available published information at that time. The score has be updated to reflect the impact to Oracle products per <a href=http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html> Oracle Critical Patch Update Advisory - October 2015 </a>. Other products listed as vulnerable may or may not be similarly impacted.", "id": "CVE-2010-1622", "lastModified": "2025-04-11T00:51:21.963", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P", "version": "2.0"}, "exploitabilityScore": 6.8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}]}, "published": "2010-06-21T16:30:01.180", "references": [{"source": "secalert@redhat.com", "tags": ["Vendor Advisory"], "url": "http://geronimo.apache.org/2010/07/21/apache-geronimo-v216-released.html"}, {"source": "secalert@redhat.com", "tags": ["Vendor Advisory"], "url": "http://geronimo.apache.org/21x-security-report.html"}, {"source": "secalert@redhat.com", "tags": ["Vendor Advisory"], "url": "http://geronimo.apache.org/22x-security-report.html"}, {"source": "secalert@redhat.com", "url": "http://secunia.com/advisories/41016"}, {"source": "secalert@redhat.com", "url": "http://secunia.com/advisories/41025"}, {"source": "secalert@redhat.com", "url": "http://secunia.com/advisories/43087"}, {"source": "secalert@redhat.com", "tags": ["Exploit"], "url": "http://www.exploit-db.com/exploits/13918"}, {"source": "secalert@redhat.com", "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html"}, {"source": "secalert@redhat.com", "url": "http://www.redhat.com/support/errata/RHSA-2011-0175.html"}, {"source": "secalert@redhat.com", "tags": ["Exploit"], "url": "http://www.securityfocus.com/archive/1/511877"}, {"source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/40954"}, {"source": "secalert@redhat.com", "url": "http://www.securitytracker.com/id/1033898"}, {"source": "secalert@redhat.com", "tags": ["Exploit", "Vendor Advisory"], "url": "http://www.springsource.com/security/cve-2010-1622"}, {"source": "secalert@redhat.com", "url": "http://www.vupen.com/english/advisories/2011/0237"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "http://geronimo.apache.org/2010/07/21/apache-geronimo-v216-released.html"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "http://geronimo.apache.org/21x-security-report.html"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "http://geronimo.apache.org/22x-security-report.html"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/41016"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/41025"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/43087"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit"], "url": "http://www.exploit-db.com/exploits/13918"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2011-0175.html"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit"], "url": "http://www.securityfocus.com/archive/1/511877"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/40954"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1033898"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit", "Vendor Advisory"], "url": "http://www.springsource.com/security/cve-2010-1622"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2011/0237"}], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-94"}], "source": "nvd@nist.gov", "type": "Primary"}]}