Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2013-5842 (GCVE-0-2013-5842)
Vulnerability from cvelistv5 – Published: 2013-10-16 17:31 – Updated: 2024-08-06 17:22- n/a
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T17:22:31.242Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "RHSA-2014:0414",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2014:0414"
},
{
"name": "GLSA-201406-32",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO",
"x_transferred"
],
"url": "http://security.gentoo.org/glsa/glsa-201406-32.xml"
},
{
"name": "RHSA-2013:1447",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://rhn.redhat.com/errata/RHSA-2013-1447.html"
},
{
"name": "RHSA-2013:1440",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://rhn.redhat.com/errata/RHSA-2013-1440.html"
},
{
"name": "USN-2033-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "http://www.ubuntu.com/usn/USN-2033-1"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://www.zerodayinitiative.com/advisories/ZDI-13-246/"
},
{
"name": "USN-2089-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "http://www.ubuntu.com/usn/USN-2089-1"
},
{
"name": "RHSA-2013:1508",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://rhn.redhat.com/errata/RHSA-2013-1508.html"
},
{
"name": "SUSE-SU-2013:1677",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00013.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019123"
},
{
"name": "HPSBUX02944",
"tags": [
"vendor-advisory",
"x_refsource_HP",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=138674073720143\u0026w=2"
},
{
"name": "RHSA-2013:1505",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://rhn.redhat.com/errata/RHSA-2013-1505.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21655201"
},
{
"name": "HPSBUX02943",
"tags": [
"vendor-advisory",
"x_refsource_HP",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=138674031212883\u0026w=2"
},
{
"name": "openSUSE-SU-2013:1663",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-updates/2013-11/msg00023.html"
},
{
"name": "SUSE-SU-2013:1666",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00010.html"
},
{
"name": "RHSA-2013:1793",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://rhn.redhat.com/errata/RHSA-2013-1793.html"
},
{
"name": "RHSA-2013:1509",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://rhn.redhat.com/errata/RHSA-2013-1509.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html"
},
{
"name": "APPLE-SA-2013-10-15-1",
"tags": [
"vendor-advisory",
"x_refsource_APPLE",
"x_transferred"
],
"url": "http://lists.apple.com/archives/security-announce/2013/Oct/msg00001.html"
},
{
"name": "RHSA-2013:1507",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://rhn.redhat.com/errata/RHSA-2013-1507.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://support.apple.com/kb/HT5982"
},
{
"name": "oval:org.mitre.oval:def:18436",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL",
"x_transferred"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18436"
},
{
"name": "63150",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/63150"
},
{
"name": "56338",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/56338"
},
{
"name": "RHSA-2013:1451",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://rhn.redhat.com/errata/RHSA-2013-1451.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS13-025/index.html"
},
{
"name": "98532",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://osvdb.org/98532"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2013-10-15T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2013-5850."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-01-04T19:57:01.000Z",
"orgId": "43595867-4340-4103-b7a2-9a5208d29a85",
"shortName": "oracle"
},
"references": [
{
"name": "RHSA-2014:0414",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2014:0414"
},
{
"name": "GLSA-201406-32",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO"
],
"url": "http://security.gentoo.org/glsa/glsa-201406-32.xml"
},
{
"name": "RHSA-2013:1447",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://rhn.redhat.com/errata/RHSA-2013-1447.html"
},
{
"name": "RHSA-2013:1440",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://rhn.redhat.com/errata/RHSA-2013-1440.html"
},
{
"name": "USN-2033-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "http://www.ubuntu.com/usn/USN-2033-1"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://www.zerodayinitiative.com/advisories/ZDI-13-246/"
},
{
"name": "USN-2089-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "http://www.ubuntu.com/usn/USN-2089-1"
},
{
"name": "RHSA-2013:1508",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://rhn.redhat.com/errata/RHSA-2013-1508.html"
},
{
"name": "SUSE-SU-2013:1677",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00013.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019123"
},
{
"name": "HPSBUX02944",
"tags": [
"vendor-advisory",
"x_refsource_HP"
],
"url": "http://marc.info/?l=bugtraq\u0026m=138674073720143\u0026w=2"
},
{
"name": "RHSA-2013:1505",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://rhn.redhat.com/errata/RHSA-2013-1505.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21655201"
},
{
"name": "HPSBUX02943",
"tags": [
"vendor-advisory",
"x_refsource_HP"
],
"url": "http://marc.info/?l=bugtraq\u0026m=138674031212883\u0026w=2"
},
{
"name": "openSUSE-SU-2013:1663",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-updates/2013-11/msg00023.html"
},
{
"name": "SUSE-SU-2013:1666",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00010.html"
},
{
"name": "RHSA-2013:1793",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://rhn.redhat.com/errata/RHSA-2013-1793.html"
},
{
"name": "RHSA-2013:1509",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://rhn.redhat.com/errata/RHSA-2013-1509.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html"
},
{
"name": "APPLE-SA-2013-10-15-1",
"tags": [
"vendor-advisory",
"x_refsource_APPLE"
],
"url": "http://lists.apple.com/archives/security-announce/2013/Oct/msg00001.html"
},
{
"name": "RHSA-2013:1507",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://rhn.redhat.com/errata/RHSA-2013-1507.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://support.apple.com/kb/HT5982"
},
{
"name": "oval:org.mitre.oval:def:18436",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18436"
},
{
"name": "63150",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/63150"
},
{
"name": "56338",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/56338"
},
{
"name": "RHSA-2013:1451",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://rhn.redhat.com/errata/RHSA-2013-1451.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS13-025/index.html"
},
{
"name": "98532",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://osvdb.org/98532"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2013-5842",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2013-5850."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "RHSA-2014:0414",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2014:0414"
},
{
"name": "GLSA-201406-32",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-201406-32.xml"
},
{
"name": "RHSA-2013:1447",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1447.html"
},
{
"name": "RHSA-2013:1440",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1440.html"
},
{
"name": "USN-2033-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2033-1"
},
{
"name": "http://www.zerodayinitiative.com/advisories/ZDI-13-246/",
"refsource": "MISC",
"url": "http://www.zerodayinitiative.com/advisories/ZDI-13-246/"
},
{
"name": "USN-2089-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2089-1"
},
{
"name": "RHSA-2013:1508",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1508.html"
},
{
"name": "SUSE-SU-2013:1677",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00013.html"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1019123",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019123"
},
{
"name": "HPSBUX02944",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=138674073720143\u0026w=2"
},
{
"name": "RHSA-2013:1505",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1505.html"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21655201",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21655201"
},
{
"name": "HPSBUX02943",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=138674031212883\u0026w=2"
},
{
"name": "openSUSE-SU-2013:1663",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2013-11/msg00023.html"
},
{
"name": "SUSE-SU-2013:1666",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00010.html"
},
{
"name": "RHSA-2013:1793",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1793.html"
},
{
"name": "RHSA-2013:1509",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1509.html"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html"
},
{
"name": "APPLE-SA-2013-10-15-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2013/Oct/msg00001.html"
},
{
"name": "RHSA-2013:1507",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1507.html"
},
{
"name": "http://support.apple.com/kb/HT5982",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT5982"
},
{
"name": "oval:org.mitre.oval:def:18436",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18436"
},
{
"name": "63150",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/63150"
},
{
"name": "56338",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/56338"
},
{
"name": "RHSA-2013:1451",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1451.html"
},
{
"name": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS13-025/index.html",
"refsource": "CONFIRM",
"url": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS13-025/index.html"
},
{
"name": "98532",
"refsource": "OSVDB",
"url": "http://osvdb.org/98532"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "43595867-4340-4103-b7a2-9a5208d29a85",
"assignerShortName": "oracle",
"cveId": "CVE-2013-5842",
"datePublished": "2013-10-16T17:31:00.000Z",
"dateReserved": "2013-09-18T00:00:00.000Z",
"dateUpdated": "2024-08-06T17:22:31.242Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CERTA-2013-AVI-595
Vulnerability from certfr_avis - Published: 2013-10-21 - Updated: 2013-10-21
De multiples vulnérabilités ont été corrigées dans Apple OS X et Mac OS X. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "verisons ant\u00e9rieures \u00e0 Mac OS X v10.6 Update 17",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Verisons ant\u00e9rieures \u00e0 OS X 2013-005",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2013-5818",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5818"
},
{
"name": "CVE-2013-5819",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5819"
},
{
"name": "CVE-2013-4002",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4002"
},
{
"name": "CVE-2013-5823",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5823"
},
{
"name": "CVE-2013-5848",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5848"
},
{
"name": "CVE-2013-5803",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5803"
},
{
"name": "CVE-2013-5843",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5843"
},
{
"name": "CVE-2013-5814",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5814"
},
{
"name": "CVE-2013-5778",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5778"
},
{
"name": "CVE-2013-5776",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5776"
},
{
"name": "CVE-2013-5801",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5801"
},
{
"name": "CVE-2013-5832",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5832"
},
{
"name": "CVE-2013-5784",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5784"
},
{
"name": "CVE-2013-5782",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5782"
},
{
"name": "CVE-2013-5790",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5790"
},
{
"name": "CVE-2013-5802",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5802"
},
{
"name": "CVE-2013-5820",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5820"
},
{
"name": "CVE-2013-5849",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5849"
},
{
"name": "CVE-2013-5842",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5842"
},
{
"name": "CVE-2013-5772",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5772"
},
{
"name": "CVE-2013-3829",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-3829"
},
{
"name": "CVE-2013-5850",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5850"
},
{
"name": "CVE-2013-5804",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5804"
},
{
"name": "CVE-2013-5787",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5787"
},
{
"name": "CVE-2013-5780",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5780"
},
{
"name": "CVE-2013-5797",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5797"
},
{
"name": "CVE-2013-5840",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5840"
},
{
"name": "CVE-2013-5824",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5824"
},
{
"name": "CVE-2013-5829",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5829"
},
{
"name": "CVE-2013-5817",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5817"
},
{
"name": "CVE-2013-5774",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5774"
},
{
"name": "CVE-2013-5789",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5789"
},
{
"name": "CVE-2013-5812",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5812"
},
{
"name": "CVE-2013-5831",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5831"
},
{
"name": "CVE-2013-5809",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5809"
},
{
"name": "CVE-2013-5825",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5825"
},
{
"name": "CVE-2013-5783",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5783"
},
{
"name": "CVE-2013-5830",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5830"
}
],
"initial_release_date": "2013-10-21T00:00:00",
"last_revision_date": "2013-10-21T00:00:00",
"links": [],
"reference": "CERTA-2013-AVI-595",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2013-10-21T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eApple OS X\u003c/span\u003e et \u003cspan class=\"textit\"\u003eMac OS\nX\u003c/span\u003e. Elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de\ncode arbitraire \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Apple OS X et Mac OS X",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT5982 du 15 octobre 2013",
"url": "http://support.apple.com/kb/HT5982"
}
]
}
CERTFR-2014-AVI-199
Vulnerability from certfr_avis - Published: 2014-04-22 - Updated: 2014-04-22
De multiples vulnérabilités ont été corrigées dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, une exécution de code arbitraire à distance et un déni de service.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | N/A | IBM HMC V7 Release 7.7.0 | ||
| IBM | N/A | IBM Rational Software Architect Design Manager version 4.0.4 | ||
| IBM | N/A | IBM Rational Software Architect Design Manager version 4.0.1 | ||
| IBM | N/A | IBM Rational Software Architect Design Manager version 3.0.1 | ||
| IBM | N/A | IBM Rhapsody Design Manager version 4.0.5 | ||
| IBM | N/A | IBM TS3000 (TSSC) version 7.2.x | ||
| IBM | N/A | IBM Rhapsody Design Manager version 3.0.0.1 | ||
| IBM | N/A | IBM SmartCloud Provisioning 2.3.0 | ||
| IBM | N/A | IBM Rhapsody Design Manager version 4.0.2 | ||
| IBM | N/A | IBM Rational Software Architect Design Manager version 4.0.3 | ||
| IBM | N/A | IBM Rational Software Architect Design Manager version 4.0 | ||
| IBM | N/A | IBM Rhapsody Design Manager version 4.0 | ||
| IBM | N/A | IBM Initiate Master Data Service version 10.1 | ||
| IBM | N/A | IBM Initiate Master Data Service version 10.0 | ||
| IBM | N/A | IBM Initiate Master Data Service version 9.5 | ||
| IBM | N/A | IBM Rhapsody Design Manager version 4.0.4 | ||
| IBM | N/A | IBM SDN VE, Unified Controller, KVM Edition: 1.0.0 | ||
| IBM | N/A | IBM Initiate Master Data Service version 9.7 | ||
| IBM | N/A | IBM Rhapsody Design Manager version 4.0.3 | ||
| IBM | N/A | IBM Initiate Master Data Service Patient Hub version 9.7 | ||
| IBM | N/A | IBM InfoSphere Master Data Management Patient Hub version 10.0 | ||
| IBM | N/A | IBM Initiate Master Data Service Provider Hub version 9.5 | ||
| IBM | N/A | IBM Worklight Consumer Edition version 6.1.0 Fix Pack 1 | ||
| IBM | N/A | IBM Worklight Enterprise Edition version 6.1.0 Fix Pack 1 | ||
| IBM | N/A | IBM i version V5R3 | ||
| IBM | N/A | IBM Rational Software Architect Design Manager version 4.0.2 | ||
| IBM | N/A | IBM i version 7.1 | ||
| IBM | N/A | IBM Connections 4.0 | ||
| IBM | N/A | IBM InfoSphere Master Data Management Standard/Advanced Edition version 11.0 | ||
| IBM | N/A | IBM Rhapsody Design Manager version 3.0 | ||
| IBM | Tivoli | IBM Tivoli Storage Productivity Center versions 5.1.1.3 et antérieures | ||
| IBM | N/A | IBM i version 6.1 | ||
| IBM | Tivoli | IBM Tivoli Storage Productivity Center versions 4.2.2.177 et antérieures | ||
| IBM | N/A | IBM Initiate Master Data Service Patient Hub version 9.5 | ||
| IBM | N/A | IBM Rational Software Architect Design Manager version 4.0.5 | ||
| IBM | N/A | IBM i version V5R4 | ||
| IBM | N/A | IBM SDN VE, Unified Controller, VMware Edition: 1.0.0 | ||
| IBM | N/A | IBM Connections 4.5 | ||
| IBM | Tivoli | IBM Tivoli Provisioning Manager for Software 5.1 | ||
| IBM | N/A | IBM HMC V7 Release 7.8.0 | ||
| IBM | N/A | IBM Initiate Master Data Service Provider Hub version 9.7 | ||
| IBM | N/A | IBM InfoSphere Master Data Management Provider Hub version 10.0 | ||
| IBM | N/A | IBM Rational Software Architect Design Manager version 3.0.0.1 | ||
| IBM | N/A | IBM Rational Software Architect Design Manager version 3.0 | ||
| IBM | N/A | IBM Rhapsody Design Manager version 4.0.1 | ||
| IBM | N/A | IBM SDN VE, Unified Controller, OpenFlow Edition: 1.0.0 | ||
| IBM | N/A | IBM SDN VE, Dove Management Console, VMware Edition: 1.0.0 | ||
| IBM | Tivoli | IBM Tivoli Storage Productivity Center versions 5.2.1.0 et antérieures | ||
| IBM | N/A | IBM Rhapsody Design Manager version 3.0.1 | ||
| IBM | N/A | IBM Worklight Enterprise Edition Versions 6.1.0.0 | ||
| IBM | N/A | IBM Worklight Consumer Edition version 6.1.0.0 | ||
| IBM | N/A | IBM Connections 3.0.1.1 et versions antérieures |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "IBM HMC V7 Release 7.7.0",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Rational Software Architect Design Manager version 4.0.4",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Rational Software Architect Design Manager version 4.0.1",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Rational Software Architect Design Manager version 3.0.1",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Rhapsody Design Manager version 4.0.5",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM TS3000 (TSSC) version 7.2.x",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Rhapsody Design Manager version 3.0.0.1",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM SmartCloud Provisioning 2.3.0",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Rhapsody Design Manager version 4.0.2",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Rational Software Architect Design Manager version 4.0.3",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Rational Software Architect Design Manager version 4.0",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Rhapsody Design Manager version 4.0",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Initiate Master Data Service version 10.1",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Initiate Master Data Service version 10.0",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Initiate Master Data Service version 9.5",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Rhapsody Design Manager version 4.0.4",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM SDN VE, Unified Controller, KVM Edition: 1.0.0",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Initiate Master Data Service version 9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Rhapsody Design Manager version 4.0.3",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Initiate Master Data Service Patient Hub version 9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM InfoSphere Master Data Management Patient Hub version 10.0",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Initiate Master Data Service Provider Hub version 9.5",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Worklight Consumer Edition version 6.1.0 Fix Pack 1",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Worklight Enterprise Edition version 6.1.0 Fix Pack 1",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM i version V5R3",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Rational Software Architect Design Manager version 4.0.2",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM i version 7.1",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Connections 4.0",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM InfoSphere Master Data Management Standard/Advanced Edition version 11.0",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Rhapsody Design Manager version 3.0",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Tivoli Storage Productivity Center versions 5.1.1.3 et ant\u00e9rieures",
"product": {
"name": "Tivoli",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM i version 6.1",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Tivoli Storage Productivity Center versions 4.2.2.177 et ant\u00e9rieures",
"product": {
"name": "Tivoli",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Initiate Master Data Service Patient Hub version 9.5",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Rational Software Architect Design Manager version 4.0.5",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM i version V5R4",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM SDN VE, Unified Controller, VMware Edition: 1.0.0",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Connections 4.5",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Tivoli Provisioning Manager for Software 5.1",
"product": {
"name": "Tivoli",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM HMC V7 Release 7.8.0",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Initiate Master Data Service Provider Hub version 9.7",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM InfoSphere Master Data Management Provider Hub version 10.0",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Rational Software Architect Design Manager version 3.0.0.1",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Rational Software Architect Design Manager version 3.0",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Rhapsody Design Manager version 4.0.1",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM SDN VE, Unified Controller, OpenFlow Edition: 1.0.0",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM SDN VE, Dove Management Console, VMware Edition: 1.0.0",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Tivoli Storage Productivity Center versions 5.2.1.0 et ant\u00e9rieures",
"product": {
"name": "Tivoli",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Rhapsody Design Manager version 3.0.1",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Worklight Enterprise Edition Versions 6.1.0.0",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Worklight Consumer Edition version 6.1.0.0",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Connections 3.0.1.1 et versions ant\u00e9rieures",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2014-0417",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0417"
},
{
"name": "CVE-2013-5803",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5803"
},
{
"name": "CVE-2013-5459",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5459"
},
{
"name": "CVE-2013-5843",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5843"
},
{
"name": "CVE-2013-5814",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5814"
},
{
"name": "CVE-2013-5778",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5778"
},
{
"name": "CVE-2014-0411",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0411"
},
{
"name": "CVE-2014-0160",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0160"
},
{
"name": "CVE-2013-5801",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5801"
},
{
"name": "CVE-2014-0422",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0422"
},
{
"name": "CVE-2013-5907",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5907"
},
{
"name": "CVE-2013-4353",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4353"
},
{
"name": "CVE-2013-5782",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5782"
},
{
"name": "CVE-2013-6449",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-6449"
},
{
"name": "CVE-2013-5790",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5790"
},
{
"name": "CVE-2013-5802",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5802"
},
{
"name": "CVE-2013-5849",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5849"
},
{
"name": "CVE-2013-5842",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5842"
},
{
"name": "CVE-2014-0423",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0423"
},
{
"name": "CVE-2014-0376",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0376"
},
{
"name": "CVE-2014-0416",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0416"
},
{
"name": "CVE-2013-3829",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-3829"
},
{
"name": "CVE-2013-5850",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5850"
},
{
"name": "CVE-2013-5804",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5804"
},
{
"name": "CVE-2013-5780",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5780"
},
{
"name": "CVE-2013-5797",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5797"
},
{
"name": "CVE-2013-5840",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5840"
},
{
"name": "CVE-2013-5829",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5829"
},
{
"name": "CVE-2013-5879",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5879"
},
{
"name": "CVE-2013-5817",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5817"
},
{
"name": "CVE-2013-5774",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5774"
},
{
"name": "CVE-2014-0373",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0373"
},
{
"name": "CVE-2013-4041",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4041"
},
{
"name": "CVE-2014-0428",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0428"
},
{
"name": "CVE-2013-5791",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5791"
},
{
"name": "CVE-2013-5809",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5809"
},
{
"name": "CVE-2014-0076",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0076"
},
{
"name": "CVE-2013-5763",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5763"
},
{
"name": "CVE-2014-0368",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0368"
},
{
"name": "CVE-2013-5375",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5375"
},
{
"name": "CVE-2013-5825",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5825"
},
{
"name": "CVE-2013-5783",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5783"
},
{
"name": "CVE-2013-5372",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5372"
},
{
"name": "CVE-2013-5830",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5830"
}
],
"initial_release_date": "2014-04-22T00:00:00",
"last_revision_date": "2014-04-22T00:00:00",
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 N1020038 IBM du 18 avril 2014",
"url": "http://www-01.ibm.com/support/docview.wss?uid=nas8N1020038"
}
],
"reference": "CERTFR-2014-AVI-199",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2014-04-22T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans les produits \u003cspan\nclass=\"textit\"\u003eIBM\u003c/span\u003e. Certaines d\u0027entre elles permettent \u00e0 un\nattaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par\nl\u0027\u00e9diteur, une ex\u00e9cution de code arbitraire \u00e0 distance et un d\u00e9ni de\nservice.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 1668578 du 18 avril 2014",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21668578"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 1670738 du 18 avril 2014",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21670738"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 1670858 du 22 avril 2014",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21670858"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM S1004599 du 16 avril 2014",
"url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004599"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 1664531 du 18 avril 2014",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21664531"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM T1020715 du 18 avril 2014",
"url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1020715"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 1669459 du 18 avril 2014",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21669459"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM N1020021 du 18 avril 2014",
"url": "http://www-01.ibm.com/support/docview.wss?uid=nas8N1020021"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 1670750 du 17 avril 2014",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21670750"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM N1020038 du 18 avril 2014",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 1670864 du 18 avril 2014",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21670864"
}
]
}
CERTA-2013-AVI-586
Vulnerability from certfr_avis - Published: 2013-10-16 - Updated: 2013-10-16
De multiples vulnérabilités ont été corrigées dans Oracle Java SE. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à l'intégrité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Oracle | Java SE | Oracle JRockit versions R27.7.6 et antérieures | ||
| Oracle | Java SE | Oracle Java SE versions 5.0u51 et antérieures | ||
| Oracle | Java SE | Oracle JRockit versions R28.2.8 et antérieures | ||
| Oracle | Java SE | Oracle Java SE Embedded versions 7u40 et antérieures | ||
| Oracle | Java SE | Oracle Java SE versions 6u60 et antérieures | ||
| Oracle | Java SE | Oracle JavaFX versions 2.2.40 et antérieures | ||
| Oracle | Java SE | Oracle Java SE versions 7u40 et antérieures |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Oracle JRockit versions R27.7.6 et ant\u00e9rieures",
"product": {
"name": "Java SE",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Java SE versions 5.0u51 et ant\u00e9rieures",
"product": {
"name": "Java SE",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle JRockit versions R28.2.8 et ant\u00e9rieures",
"product": {
"name": "Java SE",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Java SE Embedded versions 7u40 et ant\u00e9rieures",
"product": {
"name": "Java SE",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Java SE versions 6u60 et ant\u00e9rieures",
"product": {
"name": "Java SE",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle JavaFX versions 2.2.40 et ant\u00e9rieures",
"product": {
"name": "Java SE",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Java SE versions 7u40 et ant\u00e9rieures",
"product": {
"name": "Java SE",
"vendor": {
"name": "Oracle",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2013-5788",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5788"
},
{
"name": "CVE-2013-5818",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5818"
},
{
"name": "CVE-2013-5777",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5777"
},
{
"name": "CVE-2013-5819",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5819"
},
{
"name": "CVE-2013-4002",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4002"
},
{
"name": "CVE-2013-5823",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5823"
},
{
"name": "CVE-2013-5848",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5848"
},
{
"name": "CVE-2013-5803",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5803"
},
{
"name": "CVE-2013-5843",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5843"
},
{
"name": "CVE-2013-5814",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5814"
},
{
"name": "CVE-2013-5778",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5778"
},
{
"name": "CVE-2013-5776",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5776"
},
{
"name": "CVE-2013-5801",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5801"
},
{
"name": "CVE-2013-5805",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5805"
},
{
"name": "CVE-2013-5832",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5832"
},
{
"name": "CVE-2013-5784",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5784"
},
{
"name": "CVE-2013-5775",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5775"
},
{
"name": "CVE-2013-5782",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5782"
},
{
"name": "CVE-2013-5790",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5790"
},
{
"name": "CVE-2013-5854",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5854"
},
{
"name": "CVE-2013-5846",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5846"
},
{
"name": "CVE-2013-5838",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5838"
},
{
"name": "CVE-2013-5802",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5802"
},
{
"name": "CVE-2013-5820",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5820"
},
{
"name": "CVE-2013-5849",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5849"
},
{
"name": "CVE-2013-5842",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5842"
},
{
"name": "CVE-2013-5772",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5772"
},
{
"name": "CVE-2013-5800",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5800"
},
{
"name": "CVE-2013-5844",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5844"
},
{
"name": "CVE-2013-3829",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-3829"
},
{
"name": "CVE-2013-5850",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5850"
},
{
"name": "CVE-2013-5804",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5804"
},
{
"name": "CVE-2013-5787",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5787"
},
{
"name": "CVE-2013-5780",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5780"
},
{
"name": "CVE-2013-5797",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5797"
},
{
"name": "CVE-2013-5840",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5840"
},
{
"name": "CVE-2013-5852",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5852"
},
{
"name": "CVE-2013-5824",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5824"
},
{
"name": "CVE-2013-5829",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5829"
},
{
"name": "CVE-2013-5817",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5817"
},
{
"name": "CVE-2013-5774",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5774"
},
{
"name": "CVE-2013-5789",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5789"
},
{
"name": "CVE-2013-5851",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5851"
},
{
"name": "CVE-2013-5812",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5812"
},
{
"name": "CVE-2013-5831",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5831"
},
{
"name": "CVE-2013-5809",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5809"
},
{
"name": "CVE-2013-5806",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5806"
},
{
"name": "CVE-2013-5825",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5825"
},
{
"name": "CVE-2013-5783",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5783"
},
{
"name": "CVE-2013-5810",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5810"
},
{
"name": "CVE-2013-5830",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5830"
}
],
"initial_release_date": "2013-10-16T00:00:00",
"last_revision_date": "2013-10-16T00:00:00",
"links": [],
"reference": "CERTA-2013-AVI-586",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2013-10-16T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eOracle Java SE\u003c/span\u003e. Certaines d\u0027entre elles permettent\n\u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance,\nun d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Oracle Java SE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Oracle CPUOct2013 du 16 octobre 2013",
"url": "http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html"
}
]
}
CERTFR-2017-AVI-228
Vulnerability from certfr_avis - Published: 2017-07-19 - Updated: 2017-07-19
De multiples vulnérabilités ont été corrigées dans SCADA Schneider Electric Trio TView. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, une exécution de code arbitraire à distance et un déni de service.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Trio TView Software, TBUMPROG-TVIEW versions 3.27.0 et antérieures
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | |
|---|---|---|---|
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cP\u003eTrio TView Software, TBUMPROG-TVIEW versions 3.27.0 et ant\u00e9rieures\u003c/P\u003e",
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2016-0494",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0494"
},
{
"name": "CVE-2014-6492",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6492"
},
{
"name": "CVE-2013-2472",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2472"
},
{
"name": "CVE-2016-0448",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0448"
},
{
"name": "CVE-2013-1563",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1563"
},
{
"name": "CVE-2014-0458",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0458"
},
{
"name": "CVE-2014-4219",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4219"
},
{
"name": "CVE-2016-0687",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0687"
},
{
"name": "CVE-2013-5818",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5818"
},
{
"name": "CVE-2014-6512",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6512"
},
{
"name": "CVE-2014-0460",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0460"
},
{
"name": "CVE-2014-0417",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0417"
},
{
"name": "CVE-2014-6531",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6531"
},
{
"name": "CVE-2012-1722",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1722"
},
{
"name": "CVE-2011-3558",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3558"
},
{
"name": "CVE-2013-1481",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1481"
},
{
"name": "CVE-2014-2427",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-2427"
},
{
"name": "CVE-2014-2398",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-2398"
},
{
"name": "CVE-2013-2420",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2420"
},
{
"name": "CVE-2013-1518",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1518"
},
{
"name": "CVE-2015-0383",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0383"
},
{
"name": "CVE-2012-1719",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1719"
},
{
"name": "CVE-2013-5819",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5819"
},
{
"name": "CVE-2012-0500",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0500"
},
{
"name": "CVE-2013-5910",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5910"
},
{
"name": "CVE-2014-6593",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6593"
},
{
"name": "CVE-2014-4216",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4216"
},
{
"name": "CVE-2012-0502",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0502"
},
{
"name": "CVE-2012-3159",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3159"
},
{
"name": "CVE-2013-2466",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2466"
},
{
"name": "CVE-2011-3556",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3556"
},
{
"name": "CVE-2012-1533",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1533"
},
{
"name": "CVE-2012-1531",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1531"
},
{
"name": "CVE-2013-2473",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2473"
},
{
"name": "CVE-2012-3216",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3216"
},
{
"name": "CVE-2014-6458",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6458"
},
{
"name": "CVE-2015-2628",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2628"
},
{
"name": "CVE-2011-3545",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3545"
},
{
"name": "CVE-2011-3548",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3548"
},
{
"name": "CVE-2013-5823",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5823"
},
{
"name": "CVE-2013-2445",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2445"
},
{
"name": "CVE-2014-0446",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0446"
},
{
"name": "CVE-2014-6457",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6457"
},
{
"name": "CVE-2013-1557",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1557"
},
{
"name": "CVE-2014-2421",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-2421"
},
{
"name": "CVE-2015-0469",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0469"
},
{
"name": "CVE-2013-1500",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1500"
},
{
"name": "CVE-2013-2464",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2464"
},
{
"name": "CVE-2013-0426",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0426"
},
{
"name": "CVE-2012-5081",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5081"
},
{
"name": "CVE-2013-2443",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2443"
},
{
"name": "CVE-2012-0507",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0507"
},
{
"name": "CVE-2014-2423",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-2423"
},
{
"name": "CVE-2013-2459",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2459"
},
{
"name": "CVE-2013-2442",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2442"
},
{
"name": "CVE-2015-0408",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0408"
},
{
"name": "CVE-2013-2457",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2457"
},
{
"name": "CVE-2014-4265",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4265"
},
{
"name": "CVE-2013-2468",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2468"
},
{
"name": "CVE-2013-5803",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5803"
},
{
"name": "CVE-2016-5554",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5554"
},
{
"name": "CVE-2013-1571",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1571"
},
{
"name": "CVE-2014-2401",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-2401"
},
{
"name": "CVE-2012-3213",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3213"
},
{
"name": "CVE-2012-5083",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5083"
},
{
"name": "CVE-2013-0446",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0446"
},
{
"name": "CVE-2015-4749",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4749"
},
{
"name": "CVE-2012-0505",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0505"
},
{
"name": "CVE-2013-1473",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1473"
},
{
"name": "CVE-2016-0483",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0483"
},
{
"name": "CVE-2015-4903",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4903"
},
{
"name": "CVE-2015-0410",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0410"
},
{
"name": "CVE-2015-2632",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2632"
},
{
"name": "CVE-2014-0403",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0403"
},
{
"name": "CVE-2015-0400",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0400"
},
{
"name": "CVE-2012-1721",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1721"
},
{
"name": "CVE-2013-2419",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2419"
},
{
"name": "CVE-2015-2637",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2637"
},
{
"name": "CVE-2014-4218",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4218"
},
{
"name": "CVE-2011-3554",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3554"
},
{
"name": "CVE-2016-3550",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3550"
},
{
"name": "CVE-2013-5843",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5843"
},
{
"name": "CVE-2013-2463",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2463"
},
{
"name": "CVE-2012-1720",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1720"
},
{
"name": "CVE-2014-4288",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4288"
},
{
"name": "CVE-2014-6511",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6511"
},
{
"name": "CVE-2015-4872",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4872"
},
{
"name": "CVE-2015-0459",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0459"
},
{
"name": "CVE-2013-2444",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2444"
},
{
"name": "CVE-2013-2446",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2446"
},
{
"name": "CVE-2012-1724",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1724"
},
{
"name": "CVE-2012-5077",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5077"
},
{
"name": "CVE-2015-4860",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4860"
},
{
"name": "CVE-2014-6532",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6532"
},
{
"name": "CVE-2013-5814",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5814"
},
{
"name": "CVE-2012-1718",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1718"
},
{
"name": "CVE-2014-2428",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-2428"
},
{
"name": "CVE-2012-5072",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5072"
},
{
"name": "CVE-2016-0695",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0695"
},
{
"name": "CVE-2016-3485",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3485"
},
{
"name": "CVE-2013-2454",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2454"
},
{
"name": "CVE-2013-1475",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1475"
},
{
"name": "CVE-2012-5079",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5079"
},
{
"name": "CVE-2014-6513",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6513"
},
{
"name": "CVE-2013-5778",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5778"
},
{
"name": "CVE-2014-0411",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0411"
},
{
"name": "CVE-2012-1723",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1723"
},
{
"name": "CVE-2016-3427",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3427"
},
{
"name": "CVE-2015-0458",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0458"
},
{
"name": "CVE-2013-2461",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2461"
},
{
"name": "CVE-2015-4902",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4902"
},
{
"name": "CVE-2012-5075",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5075"
},
{
"name": "CVE-2013-1493",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1493"
},
{
"name": "CVE-2013-5776",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5776"
},
{
"name": "CVE-2012-5071",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5071"
},
{
"name": "CVE-2014-6493",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6493"
},
{
"name": "CVE-2015-4806",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4806"
},
{
"name": "CVE-2011-3552",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3552"
},
{
"name": "CVE-2015-2590",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2590"
},
{
"name": "CVE-2013-2435",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2435"
},
{
"name": "CVE-2014-6517",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6517"
},
{
"name": "CVE-2012-5086",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5086"
},
{
"name": "CVE-2012-5920",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5920"
},
{
"name": "CVE-2016-3458",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3458"
},
{
"name": "CVE-2012-0499",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0499"
},
{
"name": "CVE-2013-4204",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4204"
},
{
"name": "CVE-2015-0492",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0492"
},
{
"name": "CVE-2014-0429",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0429"
},
{
"name": "CVE-2013-0443",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0443"
},
{
"name": "CVE-2014-0424",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0424"
},
{
"name": "CVE-2013-5801",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5801"
},
{
"name": "CVE-2014-0422",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0422"
},
{
"name": "CVE-2013-2440",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2440"
},
{
"name": "CVE-2015-4844",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4844"
},
{
"name": "CVE-2013-5884",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5884"
},
{
"name": "CVE-2015-4760",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4760"
},
{
"name": "CVE-2015-4893",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4893"
},
{
"name": "CVE-2013-0409",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0409"
},
{
"name": "CVE-2016-0686",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0686"
},
{
"name": "CVE-2011-3560",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3560"
},
{
"name": "CVE-2014-6601",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6601"
},
{
"name": "CVE-2014-2420",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-2420"
},
{
"name": "CVE-2015-4000",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4000"
},
{
"name": "CVE-2015-0406",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0406"
},
{
"name": "CVE-2015-4882",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4882"
},
{
"name": "CVE-2013-2455",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2455"
},
{
"name": "CVE-2013-5832",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5832"
},
{
"name": "CVE-2015-2627",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2627"
},
{
"name": "CVE-2013-2429",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2429"
},
{
"name": "CVE-2011-3544",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3544"
},
{
"name": "CVE-2013-5907",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5907"
},
{
"name": "CVE-2015-4911",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4911"
},
{
"name": "CVE-2014-6503",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6503"
},
{
"name": "CVE-2015-0407",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0407"
},
{
"name": "CVE-2012-0506",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0506"
},
{
"name": "CVE-2013-5784",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5784"
},
{
"name": "CVE-2013-5898",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5898"
},
{
"name": "CVE-2014-2403",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-2403"
},
{
"name": "CVE-2015-4731",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4731"
},
{
"name": "CVE-2015-2621",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2621"
},
{
"name": "CVE-2014-0387",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0387"
},
{
"name": "CVE-2013-0442",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0442"
},
{
"name": "CVE-2015-0460",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0460"
},
{
"name": "CVE-2012-3342",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3342"
},
{
"name": "CVE-2013-5782",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5782"
},
{
"name": "CVE-2016-5542",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5542"
},
{
"name": "CVE-2015-4732",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4732"
},
{
"name": "CVE-2015-0395",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0395"
},
{
"name": "CVE-2013-2453",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2453"
},
{
"name": "CVE-2012-0503",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0503"
},
{
"name": "CVE-2013-2418",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2418"
},
{
"name": "CVE-2013-1476",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1476"
},
{
"name": "CVE-2013-1479",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1479"
},
{
"name": "CVE-2013-5790",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5790"
},
{
"name": "CVE-2013-0434",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0434"
},
{
"name": "CVE-2014-6466",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6466"
},
{
"name": "CVE-2014-4262",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4262"
},
{
"name": "CVE-2014-0453",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0453"
},
{
"name": "CVE-2014-2414",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-2414"
},
{
"name": "CVE-2012-1716",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1716"
},
{
"name": "CVE-2011-3561",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3561"
},
{
"name": "CVE-2013-0429",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0429"
},
{
"name": "CVE-2016-3449",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3449"
},
{
"name": "CVE-2013-5802",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5802"
},
{
"name": "CVE-2015-4881",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4881"
},
{
"name": "CVE-2011-3551",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3551"
},
{
"name": "CVE-2013-5820",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5820"
},
{
"name": "CVE-2013-5849",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5849"
},
{
"name": "CVE-2013-5842",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5842"
},
{
"name": "CVE-2013-0445",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0445"
},
{
"name": "CVE-2012-5073",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5073"
},
{
"name": "CVE-2014-0423",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0423"
},
{
"name": "CVE-2013-0438",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0438"
},
{
"name": "CVE-2014-0410",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0410"
},
{
"name": "CVE-2011-3521",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3521"
},
{
"name": "CVE-2012-1711",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1711"
},
{
"name": "CVE-2016-3425",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3425"
},
{
"name": "CVE-2013-5888",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5888"
},
{
"name": "CVE-2013-0427",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0427"
},
{
"name": "CVE-2015-4883",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4883"
},
{
"name": "CVE-2013-5772",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5772"
},
{
"name": "CVE-2013-2470",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2470"
},
{
"name": "CVE-2015-0403",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0403"
},
{
"name": "CVE-2014-2409",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-2409"
},
{
"name": "CVE-2012-5084",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5084"
},
{
"name": "CVE-2014-0376",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0376"
},
{
"name": "CVE-2013-5889",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5889"
},
{
"name": "CVE-2014-4252",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4252"
},
{
"name": "CVE-2016-3443",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3443"
},
{
"name": "CVE-2014-6591",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6591"
},
{
"name": "CVE-2014-0416",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0416"
},
{
"name": "CVE-2014-4209",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4209"
},
{
"name": "CVE-2011-3563",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3563"
},
{
"name": "CVE-2011-3553",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3553"
},
{
"name": "CVE-2016-3508",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3508"
},
{
"name": "CVE-2015-4843",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4843"
},
{
"name": "CVE-2013-0440",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0440"
},
{
"name": "CVE-2013-3829",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-3829"
},
{
"name": "CVE-2015-2638",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2638"
},
{
"name": "CVE-2012-1725",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1725"
},
{
"name": "CVE-2013-2430",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2430"
},
{
"name": "CVE-2016-0402",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0402"
},
{
"name": "CVE-2013-2450",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2450"
},
{
"name": "CVE-2013-5850",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5850"
},
{
"name": "CVE-2014-4263",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4263"
},
{
"name": "CVE-2013-5804",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5804"
},
{
"name": "CVE-2013-1486",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1486"
},
{
"name": "CVE-2013-5787",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5787"
},
{
"name": "CVE-2013-5780",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5780"
},
{
"name": "CVE-2013-0450",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0450"
},
{
"name": "CVE-2012-5089",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5089"
},
{
"name": "CVE-2013-0428",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0428"
},
{
"name": "CVE-2012-0547",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0547"
},
{
"name": "CVE-2013-2448",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2448"
},
{
"name": "CVE-2012-3143",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3143"
},
{
"name": "CVE-2013-2432",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2432"
},
{
"name": "CVE-2013-2439",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2439"
},
{
"name": "CVE-2013-2422",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2422"
},
{
"name": "CVE-2013-5797",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5797"
},
{
"name": "CVE-2015-2664",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2664"
},
{
"name": "CVE-2015-2625",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2625"
},
{
"name": "CVE-2016-5582",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5582"
},
{
"name": "CVE-2013-5840",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5840"
},
{
"name": "CVE-2012-4681",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-4681"
},
{
"name": "CVE-2013-5899",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5899"
},
{
"name": "CVE-2013-2451",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2451"
},
{
"name": "CVE-2013-2469",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2469"
},
{
"name": "CVE-2013-2437",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2437"
},
{
"name": "CVE-2015-4835",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4835"
},
{
"name": "CVE-2015-0478",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0478"
},
{
"name": "CVE-2014-6558",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6558"
},
{
"name": "CVE-2013-5852",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5852"
},
{
"name": "CVE-2012-1717",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1717"
},
{
"name": "CVE-2014-4227",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4227"
},
{
"name": "CVE-2015-4733",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4733"
},
{
"name": "CVE-2014-6506",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6506"
},
{
"name": "CVE-2014-0107",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0107"
},
{
"name": "CVE-2014-6504",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6504"
},
{
"name": "CVE-2013-5824",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5824"
},
{
"name": "CVE-2014-6515",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6515"
},
{
"name": "CVE-2013-2384",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2384"
},
{
"name": "CVE-2013-5829",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5829"
},
{
"name": "CVE-2012-0497",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0497"
},
{
"name": "CVE-2013-2407",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2407"
},
{
"name": "CVE-2013-2383",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2383"
},
{
"name": "CVE-2013-0430",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0430"
},
{
"name": "CVE-2013-1487",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1487"
},
{
"name": "CVE-2012-1541",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1541"
},
{
"name": "CVE-2011-3516",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3516"
},
{
"name": "CVE-2014-6585",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6585"
},
{
"name": "CVE-2013-5878",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5878"
},
{
"name": "CVE-2013-5817",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5817"
},
{
"name": "CVE-2015-0491",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0491"
},
{
"name": "CVE-2016-3422",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3422"
},
{
"name": "CVE-2013-2424",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2424"
},
{
"name": "CVE-2012-0501",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0501"
},
{
"name": "CVE-2013-1478",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1478"
},
{
"name": "CVE-2013-5774",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5774"
},
{
"name": "CVE-2013-2452",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2452"
},
{
"name": "CVE-2016-5573",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5573"
},
{
"name": "CVE-2013-5789",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5789"
},
{
"name": "CVE-2012-0504",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0504"
},
{
"name": "CVE-2013-1558",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1558"
},
{
"name": "CVE-2013-0809",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0809"
},
{
"name": "CVE-2014-0457",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0457"
},
{
"name": "CVE-2013-5906",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5906"
},
{
"name": "CVE-2013-2417",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2417"
},
{
"name": "CVE-2015-0412",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0412"
},
{
"name": "CVE-2013-0423",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0423"
},
{
"name": "CVE-2014-4244",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4244"
},
{
"name": "CVE-2011-3557",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3557"
},
{
"name": "CVE-2014-0373",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0373"
},
{
"name": "CVE-2013-2471",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2471"
},
{
"name": "CVE-2013-5812",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5812"
},
{
"name": "CVE-2013-5905",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5905"
},
{
"name": "CVE-2014-0451",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0451"
},
{
"name": "CVE-2011-3549",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3549"
},
{
"name": "CVE-2014-0418",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0418"
},
{
"name": "CVE-2012-5069",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5069"
},
{
"name": "CVE-2013-0419",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0419"
},
{
"name": "CVE-2013-0425",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0425"
},
{
"name": "CVE-2012-5068",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5068"
},
{
"name": "CVE-2014-0415",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0415"
},
{
"name": "CVE-2014-0428",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0428"
},
{
"name": "CVE-2013-0351",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0351"
},
{
"name": "CVE-2015-4803",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4803"
},
{
"name": "CVE-2013-1569",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1569"
},
{
"name": "CVE-2012-4416",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-4416"
},
{
"name": "CVE-2014-0375",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0375"
},
{
"name": "CVE-2013-5831",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5831"
},
{
"name": "CVE-2014-0449",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0449"
},
{
"name": "CVE-2016-5597",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5597"
},
{
"name": "CVE-2013-5809",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5809"
},
{
"name": "CVE-2014-4268",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4268"
},
{
"name": "CVE-2013-0441",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0441"
},
{
"name": "CVE-2016-5568",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5568"
},
{
"name": "CVE-2015-0480",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0480"
},
{
"name": "CVE-2012-5085",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5085"
},
{
"name": "CVE-2013-0432",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0432"
},
{
"name": "CVE-2013-0424",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0424"
},
{
"name": "CVE-2013-0435",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0435"
},
{
"name": "CVE-2013-1540",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1540"
},
{
"name": "CVE-2014-8152",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8152"
},
{
"name": "CVE-2013-2465",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2465"
},
{
"name": "CVE-2014-6587",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6587"
},
{
"name": "CVE-2013-2456",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2456"
},
{
"name": "CVE-2013-0433",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0433"
},
{
"name": "CVE-2013-2433",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2433"
},
{
"name": "CVE-2014-2412",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-2412"
},
{
"name": "CVE-2015-4842",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4842"
},
{
"name": "CVE-2014-0368",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0368"
},
{
"name": "CVE-2014-0461",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0461"
},
{
"name": "CVE-2011-3547",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3547"
},
{
"name": "CVE-2012-1532",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1532"
},
{
"name": "CVE-2013-2394",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2394"
},
{
"name": "CVE-2012-0551",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0551"
},
{
"name": "CVE-2012-1713",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1713"
},
{
"name": "CVE-2015-2601",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2601"
},
{
"name": "CVE-2013-5887",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5887"
},
{
"name": "CVE-2013-5825",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5825"
},
{
"name": "CVE-2015-0477",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0477"
},
{
"name": "CVE-2011-3550",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3550"
},
{
"name": "CVE-2013-1537",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1537"
},
{
"name": "CVE-2015-4748",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4748"
},
{
"name": "CVE-2016-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0466"
},
{
"name": "CVE-2016-5556",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5556"
},
{
"name": "CVE-2016-0603",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0603"
},
{
"name": "CVE-2013-5783",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5783"
},
{
"name": "CVE-2013-5902",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5902"
},
{
"name": "CVE-2016-3503",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3503"
},
{
"name": "CVE-2013-5896",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5896"
},
{
"name": "CVE-2012-0498",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0498"
},
{
"name": "CVE-2011-3546",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3546"
},
{
"name": "CVE-2013-2447",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2447"
},
{
"name": "CVE-2013-5830",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5830"
},
{
"name": "CVE-2014-0452",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0452"
},
{
"name": "CVE-2015-4734",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4734"
},
{
"name": "CVE-2013-3743",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-3743"
},
{
"name": "CVE-2016-3500",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3500"
},
{
"name": "CVE-2013-1480",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1480"
},
{
"name": "CVE-2015-0488",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0488"
},
{
"name": "CVE-2013-2412",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2412"
},
{
"name": "CVE-2015-4805",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4805"
}
],
"initial_release_date": "2017-07-19T00:00:00",
"last_revision_date": "2017-07-19T00:00:00",
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 Schneider Electric SEVD-2017-199-01 du 18 juillet 2017",
"url": "http://www.schneider-electric.com/en/download/document/SEVD-2017-199-01/"
}
],
"reference": "CERTFR-2017-AVI-228",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2017-07-19T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eSCADA Schneider Electric Trio TView\u003c/span\u003e. Certaines\nd\u0027entre elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de\ns\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, une ex\u00e9cution de code arbitraire \u00e0\ndistance et un d\u00e9ni de service.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans SCADA Schneider Electric Trio TView",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Schneider Electric SEVD-2017-199-01 du 18 juillet 2017",
"url": null
}
]
}
GHSA-VMV2-MJ2Q-XC6J
Vulnerability from github – Published: 2022-05-14 00:02 – Updated: 2025-04-11 04:15Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2013-5850.
{
"affected": [],
"aliases": [
"CVE-2013-5842"
],
"database_specific": {
"cwe_ids": [],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2013-10-16T17:55:00Z",
"severity": "HIGH"
},
"details": "Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2013-5850.",
"id": "GHSA-vmv2-mj2q-xc6j",
"modified": "2025-04-11T04:15:11Z",
"published": "2022-05-14T00:02:24Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-5842"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2014:0414"
},
{
"type": "WEB",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019123"
},
{
"type": "WEB",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18436"
},
{
"type": "WEB",
"url": "http://lists.apple.com/archives/security-announce/2013/Oct/msg00001.html"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00010.html"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00013.html"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-updates/2013-11/msg00023.html"
},
{
"type": "WEB",
"url": "http://marc.info/?l=bugtraq\u0026m=138674031212883\u0026w=2"
},
{
"type": "WEB",
"url": "http://marc.info/?l=bugtraq\u0026m=138674073720143\u0026w=2"
},
{
"type": "WEB",
"url": "http://osvdb.org/98532"
},
{
"type": "WEB",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1440.html"
},
{
"type": "WEB",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1447.html"
},
{
"type": "WEB",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1451.html"
},
{
"type": "WEB",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1505.html"
},
{
"type": "WEB",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1507.html"
},
{
"type": "WEB",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1508.html"
},
{
"type": "WEB",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1509.html"
},
{
"type": "WEB",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1793.html"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/56338"
},
{
"type": "WEB",
"url": "http://security.gentoo.org/glsa/glsa-201406-32.xml"
},
{
"type": "WEB",
"url": "http://support.apple.com/kb/HT5982"
},
{
"type": "WEB",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21655201"
},
{
"type": "WEB",
"url": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS13-025/index.html"
},
{
"type": "WEB",
"url": "http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/bid/63150"
},
{
"type": "WEB",
"url": "http://www.ubuntu.com/usn/USN-2033-1"
},
{
"type": "WEB",
"url": "http://www.ubuntu.com/usn/USN-2089-1"
},
{
"type": "WEB",
"url": "http://www.zerodayinitiative.com/advisories/ZDI-13-246"
}
],
"schema_version": "1.4.0",
"severity": []
}
FKIE_CVE-2013-5842
Vulnerability from fkie_nvd - Published: 2013-10-16 17:55 - Updated: 2025-04-11 00:51| URL | Tags | ||
|---|---|---|---|
| secalert_us@oracle.com | http://lists.apple.com/archives/security-announce/2013/Oct/msg00001.html | Mailing List | |
| secalert_us@oracle.com | http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00010.html | Broken Link | |
| secalert_us@oracle.com | http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00013.html | Broken Link | |
| secalert_us@oracle.com | http://lists.opensuse.org/opensuse-updates/2013-11/msg00023.html | Broken Link | |
| secalert_us@oracle.com | http://marc.info/?l=bugtraq&m=138674031212883&w=2 | Issue Tracking, Mailing List, Third Party Advisory | |
| secalert_us@oracle.com | http://marc.info/?l=bugtraq&m=138674073720143&w=2 | Issue Tracking, Mailing List, Third Party Advisory | |
| secalert_us@oracle.com | http://osvdb.org/98532 | Broken Link | |
| secalert_us@oracle.com | http://rhn.redhat.com/errata/RHSA-2013-1440.html | Third Party Advisory | |
| secalert_us@oracle.com | http://rhn.redhat.com/errata/RHSA-2013-1447.html | Third Party Advisory | |
| secalert_us@oracle.com | http://rhn.redhat.com/errata/RHSA-2013-1451.html | Third Party Advisory | |
| secalert_us@oracle.com | http://rhn.redhat.com/errata/RHSA-2013-1505.html | Third Party Advisory | |
| secalert_us@oracle.com | http://rhn.redhat.com/errata/RHSA-2013-1507.html | Third Party Advisory | |
| secalert_us@oracle.com | http://rhn.redhat.com/errata/RHSA-2013-1508.html | Third Party Advisory | |
| secalert_us@oracle.com | http://rhn.redhat.com/errata/RHSA-2013-1509.html | Third Party Advisory | |
| secalert_us@oracle.com | http://rhn.redhat.com/errata/RHSA-2013-1793.html | Third Party Advisory | |
| secalert_us@oracle.com | http://secunia.com/advisories/56338 | Not Applicable | |
| secalert_us@oracle.com | http://security.gentoo.org/glsa/glsa-201406-32.xml | Third Party Advisory | |
| secalert_us@oracle.com | http://support.apple.com/kb/HT5982 | Third Party Advisory | |
| secalert_us@oracle.com | http://www-01.ibm.com/support/docview.wss?uid=swg21655201 | Third Party Advisory | |
| secalert_us@oracle.com | http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS13-025/index.html | Third Party Advisory | |
| secalert_us@oracle.com | http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html | Vendor Advisory | |
| secalert_us@oracle.com | http://www.securityfocus.com/bid/63150 | Third Party Advisory, VDB Entry | |
| secalert_us@oracle.com | http://www.ubuntu.com/usn/USN-2033-1 | Third Party Advisory | |
| secalert_us@oracle.com | http://www.ubuntu.com/usn/USN-2089-1 | Third Party Advisory | |
| secalert_us@oracle.com | http://www.zerodayinitiative.com/advisories/ZDI-13-246/ | Third Party Advisory, VDB Entry | |
| secalert_us@oracle.com | https://access.redhat.com/errata/RHSA-2014:0414 | Third Party Advisory | |
| secalert_us@oracle.com | https://bugzilla.redhat.com/show_bug.cgi?id=1019123 | Issue Tracking, Third Party Advisory | |
| secalert_us@oracle.com | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18436 | Broken Link | |
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.apple.com/archives/security-announce/2013/Oct/msg00001.html | Mailing List | |
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00010.html | Broken Link | |
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00013.html | Broken Link | |
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-updates/2013-11/msg00023.html | Broken Link | |
| af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=bugtraq&m=138674031212883&w=2 | Issue Tracking, Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=bugtraq&m=138674073720143&w=2 | Issue Tracking, Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://osvdb.org/98532 | Broken Link | |
| af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2013-1440.html | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2013-1447.html | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2013-1451.html | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2013-1505.html | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2013-1507.html | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2013-1508.html | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2013-1509.html | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2013-1793.html | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/56338 | Not Applicable | |
| af854a3a-2127-422b-91ae-364da2661108 | http://security.gentoo.org/glsa/glsa-201406-32.xml | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://support.apple.com/kb/HT5982 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www-01.ibm.com/support/docview.wss?uid=swg21655201 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS13-025/index.html | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/63150 | Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/USN-2033-1 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/USN-2089-1 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.zerodayinitiative.com/advisories/ZDI-13-246/ | Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2014:0414 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=1019123 | Issue Tracking, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18436 | Broken Link |
| Vendor | Product | Version | |
|---|---|---|---|
| oracle | jdk | 1.5.0 | |
| oracle | jdk | 1.5.0 | |
| oracle | jdk | 1.5.0 | |
| oracle | jdk | 1.5.0 | |
| oracle | jdk | 1.5.0 | |
| oracle | jdk | 1.5.0 | |
| oracle | jdk | 1.5.0 | |
| oracle | jdk | 1.5.0 | |
| oracle | jdk | 1.5.0 | |
| oracle | jdk | 1.5.0 | |
| oracle | jdk | 1.5.0 | |
| oracle | jdk | 1.5.0 | |
| oracle | jdk | 1.5.0 | |
| oracle | jdk | 1.5.0 | |
| oracle | jdk | 1.5.0 | |
| oracle | jdk | 1.5.0 | |
| oracle | jdk | 1.5.0 | |
| oracle | jdk | 1.5.0 | |
| oracle | jdk | 1.5.0 | |
| oracle | jdk | 1.5.0 | |
| oracle | jdk | 1.5.0 | |
| oracle | jdk | 1.5.0 | |
| oracle | jdk | 1.5.0 | |
| oracle | jdk | 1.5.0 | |
| oracle | jdk | 1.5.0 | |
| oracle | jdk | 1.5.0 | |
| oracle | jdk | 1.5.0 | |
| oracle | jdk | 1.5.0 | |
| oracle | jdk | 1.5.0 | |
| oracle | jdk | 1.5.0 | |
| oracle | jdk | 1.5.0 | |
| oracle | jdk | 1.5.0 | |
| oracle | jdk | 1.5.0 | |
| oracle | jdk | 1.5.0 | |
| oracle | jdk | 1.5.0 | |
| oracle | jdk | 1.5.0 | |
| oracle | jdk | 1.5.0 | |
| oracle | jdk | 1.5.0 | |
| oracle | jdk | 1.5.0 | |
| oracle | jdk | 1.5.0 | |
| oracle | jdk | 1.5.0 | |
| oracle | jdk | 1.5.0 | |
| oracle | jdk | 1.5.0 | |
| oracle | jdk | 1.6.0 | |
| oracle | jdk | 1.6.0 | |
| oracle | jdk | 1.6.0 | |
| oracle | jdk | 1.6.0 | |
| oracle | jdk | 1.6.0 | |
| oracle | jdk | 1.6.0 | |
| oracle | jdk | 1.6.0 | |
| oracle | jdk | 1.6.0 | |
| oracle | jdk | 1.6.0 | |
| oracle | jdk | 1.6.0 | |
| oracle | jdk | 1.6.0 | |
| oracle | jdk | 1.6.0 | |
| oracle | jdk | 1.6.0 | |
| oracle | jdk | 1.6.0 | |
| oracle | jdk | 1.6.0 | |
| oracle | jdk | 1.6.0 | |
| oracle | jdk | 1.6.0 | |
| oracle | jdk | 1.6.0 | |
| oracle | jdk | 1.6.0 | |
| oracle | jdk | 1.6.0 | |
| oracle | jdk | 1.6.0 | |
| oracle | jdk | 1.6.0 | |
| oracle | jdk | 1.6.0 | |
| oracle | jdk | 1.6.0 | |
| oracle | jdk | 1.6.0 | |
| oracle | jdk | 1.6.0 | |
| oracle | jdk | 1.6.0 | |
| oracle | jdk | 1.6.0 | |
| oracle | jdk | 1.6.0 | |
| oracle | jdk | 1.6.0 | |
| oracle | jdk | 1.6.0 | |
| oracle | jdk | 1.6.0 | |
| oracle | jdk | 1.6.0 | |
| oracle | jdk | 1.6.0 | |
| oracle | jdk | 1.6.0 | |
| oracle | jdk | 1.6.0 | |
| oracle | jdk | 1.6.0 | |
| oracle | jdk | 1.6.0 | |
| oracle | jdk | 1.6.0 | |
| oracle | jdk | 1.6.0 | |
| oracle | jdk | 1.6.0 | |
| oracle | jdk | 1.6.0 | |
| oracle | jdk | 1.6.0 | |
| oracle | jdk | 1.6.0 | |
| oracle | jdk | 1.6.0 | |
| oracle | jdk | 1.6.0 | |
| oracle | jdk | 1.6.0 | |
| oracle | jdk | 1.6.0 | |
| oracle | jdk | 1.6.0 | |
| oracle | jdk | 1.6.0 | |
| oracle | jdk | 1.6.0 | |
| oracle | jdk | 1.6.0 | |
| oracle | jdk | 1.6.0 | |
| oracle | jdk | 1.6.0 | |
| oracle | jdk | 1.6.0 | |
| oracle | jdk | 1.6.0 | |
| oracle | jdk | 1.6.0 | |
| oracle | jdk | 1.6.0 | |
| oracle | jdk | 1.7.0 | |
| oracle | jdk | 1.7.0 | |
| oracle | jdk | 1.7.0 | |
| oracle | jdk | 1.7.0 | |
| oracle | jdk | 1.7.0 | |
| oracle | jdk | 1.7.0 | |
| oracle | jdk | 1.7.0 | |
| oracle | jdk | 1.7.0 | |
| oracle | jdk | 1.7.0 | |
| oracle | jdk | 1.7.0 | |
| oracle | jdk | 1.7.0 | |
| oracle | jdk | 1.7.0 | |
| oracle | jdk | 1.7.0 | |
| oracle | jdk | 1.7.0 | |
| oracle | jdk | 1.7.0 | |
| oracle | jdk | 1.7.0 | |
| oracle | jdk | 1.7.0 | |
| oracle | jdk | 1.7.0 | |
| oracle | jdk | 1.7.0 | |
| oracle | jdk | 1.7.0 | |
| oracle | jdk | 1.7.0 | |
| oracle | jdk | 1.7.0 | |
| oracle | jdk | 1.7.0 | |
| oracle | jdk | 1.7.0 | |
| oracle | jdk | 1.7.0 | |
| oracle | jre | 1.5.0 | |
| oracle | jre | 1.5.0 | |
| oracle | jre | 1.5.0 | |
| oracle | jre | 1.5.0 | |
| oracle | jre | 1.5.0 | |
| oracle | jre | 1.5.0 | |
| oracle | jre | 1.5.0 | |
| oracle | jre | 1.5.0 | |
| oracle | jre | 1.5.0 | |
| oracle | jre | 1.5.0 | |
| oracle | jre | 1.5.0 | |
| oracle | jre | 1.5.0 | |
| oracle | jre | 1.5.0 | |
| oracle | jre | 1.5.0 | |
| oracle | jre | 1.5.0 | |
| oracle | jre | 1.5.0 | |
| oracle | jre | 1.5.0 | |
| oracle | jre | 1.5.0 | |
| oracle | jre | 1.5.0 | |
| oracle | jre | 1.5.0 | |
| oracle | jre | 1.5.0 | |
| oracle | jre | 1.5.0 | |
| oracle | jre | 1.5.0 | |
| oracle | jre | 1.5.0 | |
| oracle | jre | 1.5.0 | |
| oracle | jre | 1.5.0 | |
| oracle | jre | 1.5.0 | |
| oracle | jre | 1.5.0 | |
| oracle | jre | 1.5.0 | |
| oracle | jre | 1.5.0 | |
| oracle | jre | 1.5.0 | |
| oracle | jre | 1.5.0 | |
| oracle | jre | 1.5.0 | |
| oracle | jre | 1.5.0 | |
| oracle | jre | 1.5.0 | |
| oracle | jre | 1.5.0 | |
| oracle | jre | 1.5.0 | |
| oracle | jre | 1.5.0 | |
| oracle | jre | 1.5.0 | |
| oracle | jre | 1.5.0 | |
| oracle | jre | 1.5.0 | |
| oracle | jre | 1.5.0 | |
| oracle | jre | 1.5.0 | |
| oracle | jre | 1.6.0 | |
| oracle | jre | 1.6.0 | |
| oracle | jre | 1.6.0 | |
| oracle | jre | 1.6.0 | |
| oracle | jre | 1.6.0 | |
| oracle | jre | 1.6.0 | |
| oracle | jre | 1.6.0 | |
| oracle | jre | 1.6.0 | |
| oracle | jre | 1.6.0 | |
| oracle | jre | 1.6.0 | |
| oracle | jre | 1.6.0 | |
| oracle | jre | 1.6.0 | |
| oracle | jre | 1.6.0 | |
| oracle | jre | 1.6.0 | |
| oracle | jre | 1.6.0 | |
| oracle | jre | 1.6.0 | |
| oracle | jre | 1.6.0 | |
| oracle | jre | 1.6.0 | |
| oracle | jre | 1.6.0 | |
| oracle | jre | 1.6.0 | |
| oracle | jre | 1.6.0 | |
| oracle | jre | 1.6.0 | |
| oracle | jre | 1.6.0 | |
| oracle | jre | 1.6.0 | |
| oracle | jre | 1.6.0 | |
| oracle | jre | 1.6.0 | |
| oracle | jre | 1.6.0 | |
| oracle | jre | 1.6.0 | |
| oracle | jre | 1.6.0 | |
| oracle | jre | 1.6.0 | |
| oracle | jre | 1.6.0 | |
| oracle | jre | 1.6.0 | |
| oracle | jre | 1.6.0 | |
| oracle | jre | 1.6.0 | |
| oracle | jre | 1.6.0 | |
| oracle | jre | 1.6.0 | |
| oracle | jre | 1.6.0 | |
| oracle | jre | 1.6.0 | |
| oracle | jre | 1.6.0 | |
| oracle | jre | 1.6.0 | |
| oracle | jre | 1.6.0 | |
| oracle | jre | 1.6.0 | |
| oracle | jre | 1.6.0 | |
| oracle | jre | 1.7.0 | |
| oracle | jre | 1.7.0 | |
| oracle | jre | 1.7.0 | |
| oracle | jre | 1.7.0 | |
| oracle | jre | 1.7.0 | |
| oracle | jre | 1.7.0 | |
| oracle | jre | 1.7.0 | |
| oracle | jre | 1.7.0 | |
| oracle | jre | 1.7.0 | |
| oracle | jre | 1.7.0 | |
| oracle | jre | 1.7.0 | |
| oracle | jre | 1.7.0 | |
| oracle | jre | 1.7.0 | |
| oracle | jre | 1.7.0 | |
| oracle | jre | 1.7.0 | |
| oracle | jre | 1.7.0 | |
| oracle | jre | 1.7.0 | |
| oracle | jre | 1.7.0 | |
| oracle | jre | 1.7.0 | |
| oracle | jre | 1.7.0 | |
| oracle | jre | 1.7.0 | |
| oracle | jre | 1.7.0 | |
| oracle | jre | 1.7.0 | |
| oracle | jre | 1.7.0 | |
| oracle | jre | 1.7.0 | |
| oracle | jre | 1.7.0 | |
| oracle | jre | 1.7.0 | |
| oracle | jre | 1.7.0 | |
| redhat | enterprise_linux_desktop | 5.0 | |
| redhat | enterprise_linux_desktop | 6.0 | |
| redhat | enterprise_linux_eus | 6.4 | |
| redhat | enterprise_linux_server | 5.0 | |
| redhat | enterprise_linux_server | 6.0 | |
| redhat | enterprise_linux_server_aus | 6.4 | |
| redhat | enterprise_linux_workstation | 5.0 | |
| redhat | enterprise_linux_workstation | 6.0 | |
| canonical | ubuntu_linux | 10.04 | |
| canonical | ubuntu_linux | 12.04 | |
| canonical | ubuntu_linux | 12.10 | |
| canonical | ubuntu_linux | 13.04 | |
| canonical | ubuntu_linux | 13.10 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:oracle:jdk:1.5.0:-:*:*:*:*:*:*",
"matchCriteriaId": "711BCDB5-83BC-4DBA-8097-2CD33617FD19",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jdk:1.5.0:update1:*:*:*:*:*:*",
"matchCriteriaId": "B5F20B3E-781F-4DC1-B939-B0EAFC515F71",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jdk:1.5.0:update10:*:*:*:*:*:*",
"matchCriteriaId": "BEB37E93-38EB-4AEE-A3DD-D2097C0D6852",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jdk:1.5.0:update11:*:*:*:*:*:*",
"matchCriteriaId": "59DED85A-153E-40B1-9ABA-D405204E464E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jdk:1.5.0:update12:*:*:*:*:*:*",
"matchCriteriaId": "168E67FC-32BC-4DAE-B49C-840FD721D7AA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jdk:1.5.0:update13:*:*:*:*:*:*",
"matchCriteriaId": "83A2B4A2-ED27-4C12-871B-C0F78C3478FF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jdk:1.5.0:update14:*:*:*:*:*:*",
"matchCriteriaId": "9E8A5D2D-B620-449B-B599-51F5C9FC658C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jdk:1.5.0:update15:*:*:*:*:*:*",
"matchCriteriaId": "9A39B469-5041-4715-B6AC-36D8777677EE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jdk:1.5.0:update16:*:*:*:*:*:*",
"matchCriteriaId": "F49DBD1F-D3F5-400B-AE2E-BC87B05A5051",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jdk:1.5.0:update17:*:*:*:*:*:*",
"matchCriteriaId": "8E605982-97A2-4E5E-847E-2BB8AD77910C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jdk:1.5.0:update18:*:*:*:*:*:*",
"matchCriteriaId": "848299EC-DE52-4511-BF53-C83022935964",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jdk:1.5.0:update19:*:*:*:*:*:*",
"matchCriteriaId": "CD5BD598-ADBC-42EE-BF81-049D89CCA426",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jdk:1.5.0:update2:*:*:*:*:*:*",
"matchCriteriaId": "64AC19E5-A20C-4D51-B465-ABCDBADF550A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jdk:1.5.0:update20:*:*:*:*:*:*",
"matchCriteriaId": "4855E669-C465-4167-89CE-EA693C70A051",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jdk:1.5.0:update21:*:*:*:*:*:*",
"matchCriteriaId": "9D970942-F8B4-445B-8167-955C489DA85B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jdk:1.5.0:update22:*:*:*:*:*:*",
"matchCriteriaId": "9EE4A1F0-FDAD-4BC7-8541-0CA928E51731",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jdk:1.5.0:update23:*:*:*:*:*:*",
"matchCriteriaId": "542B79DC-8BC8-4E93-ADC0-50BAF5FFB3D0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jdk:1.5.0:update24:*:*:*:*:*:*",
"matchCriteriaId": "5E537391-BC5D-4923-9122-27624371BF22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jdk:1.5.0:update25:*:*:*:*:*:*",
"matchCriteriaId": "2D8E305C-BB6A-4705-ADED-73B3159A338C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jdk:1.5.0:update26:*:*:*:*:*:*",
"matchCriteriaId": "CC65A3CD-F682-4788-B42C-77BBBDBAEB34",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jdk:1.5.0:update27:*:*:*:*:*:*",
"matchCriteriaId": "E67D9262-1F65-44D0-B6E6-68D405CEA5C9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jdk:1.5.0:update28:*:*:*:*:*:*",
"matchCriteriaId": "774509D5-9C66-446B-9050-F8CE6C6EDB70",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jdk:1.5.0:update29:*:*:*:*:*:*",
"matchCriteriaId": "1A85BCBA-61AF-455A-A5E0-312E4D1308C8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jdk:1.5.0:update3:*:*:*:*:*:*",
"matchCriteriaId": "A2CCCA1A-F0A1-4511-AF84-326DF406C0DA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jdk:1.5.0:update30:*:*:*:*:*:*",
"matchCriteriaId": "DD21F014-7CFF-490E-9D39-048703915552",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jdk:1.5.0:update31:*:*:*:*:*:*",
"matchCriteriaId": "C00F4FBC-E6A3-40DC-AEA9-26F34F90A86D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jdk:1.5.0:update32:*:*:*:*:*:*",
"matchCriteriaId": "EBF147E8-5BB0-4472-8213-18D8BFE1E2CC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jdk:1.5.0:update33:*:*:*:*:*:*",
"matchCriteriaId": "7FAF6EAE-8974-488F-87A3-86AF9D4455B6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jdk:1.5.0:update34:*:*:*:*:*:*",
"matchCriteriaId": "B19E5AB2-FB4A-4D42-9A43-6A1C4829B4E9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jdk:1.5.0:update35:*:*:*:*:*:*",
"matchCriteriaId": "40119D8A-8D51-4AD7-AC83-A735CF86F9D2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jdk:1.5.0:update36:*:*:*:*:*:*",
"matchCriteriaId": "47E3CD14-7C90-4ECF-BEB8-BCAD9EB5883B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jdk:1.5.0:update38:*:*:*:*:*:*",
"matchCriteriaId": "56A0449D-E87C-4BAC-AEB3-3C3DBEC1BFDF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jdk:1.5.0:update39:*:*:*:*:*:*",
"matchCriteriaId": "F0CE054A-4F45-459F-BC62-161EA147EA1A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jdk:1.5.0:update4:*:*:*:*:*:*",
"matchCriteriaId": "81B0BEF9-25FD-48F7-83BC-BEA31BC3A1BA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jdk:1.5.0:update40:*:*:*:*:*:*",
"matchCriteriaId": "6559C549-49B6-4784-A30E-605A5632B7C9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jdk:1.5.0:update41:*:*:*:*:*:*",
"matchCriteriaId": "B5802968-A12E-4938-B322-D1002F55D7B7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jdk:1.5.0:update45:*:*:*:*:*:*",
"matchCriteriaId": "91D354BB-6849-44B9-9E2A-0EEA66E4D9E5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jdk:1.5.0:update5:*:*:*:*:*:*",
"matchCriteriaId": "4E6D8590-0A99-43E0-9256-9572112F9C8F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jdk:1.5.0:update51:*:*:*:*:*:*",
"matchCriteriaId": "04C71221-E477-4DF8-B10A-3AC64511E4EE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jdk:1.5.0:update6:*:*:*:*:*:*",
"matchCriteriaId": "5F2A0870-A4D3-481B-8A37-A4DC282B0DE1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jdk:1.5.0:update7:*:*:*:*:*:*",
"matchCriteriaId": "20171515-B5A5-44D2-B7F7-21EDDE39989E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jdk:1.5.0:update8:*:*:*:*:*:*",
"matchCriteriaId": "F734AF76-4CEE-4F9D-AD6A-6BECF1F977CD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jdk:1.5.0:update9:*:*:*:*:*:*",
"matchCriteriaId": "985B45F6-C285-4061-A656-A4C1A1FE59D9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jdk:1.6.0:-:*:*:*:*:*:*",
"matchCriteriaId": "4A420DA5-1346-446B-8D23-E1E6DDBE527E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jdk:1.6.0:update1:*:*:*:*:*:*",
"matchCriteriaId": "B8CA8719-7ABE-4279-B49E-C414794A4FE1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jdk:1.6.0:update10:*:*:*:*:*:*",
"matchCriteriaId": "DC92B7EC-849F-4255-9D55-43681B8DADC4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jdk:1.6.0:update11:*:*:*:*:*:*",
"matchCriteriaId": "2ABC1045-7D3D-4A14-B994-7E60A4BB4C9C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jdk:1.6.0:update12:*:*:*:*:*:*",
"matchCriteriaId": "1F3C1E65-929A-4468-8584-F086E6E59839",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jdk:1.6.0:update13:*:*:*:*:*:*",
"matchCriteriaId": "42C95C1D-0C2E-4733-AB1B-65650D88995D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jdk:1.6.0:update14:*:*:*:*:*:*",
"matchCriteriaId": "47A9F499-D1E3-41BD-AC18-E8D3D3231C12",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jdk:1.6.0:update15:*:*:*:*:*:*",
"matchCriteriaId": "D45B0D7E-BA0F-4AAA-A7BA-2ADA4CC90D94",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jdk:1.6.0:update16:*:*:*:*:*:*",
"matchCriteriaId": "D58A3E4F-2409-440A-891E-0B84D79AB480",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jdk:1.6.0:update17:*:*:*:*:*:*",
"matchCriteriaId": "3FC2226B-CFEF-48A4-83EA-1F59F4AF7528",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jdk:1.6.0:update18:*:*:*:*:*:*",
"matchCriteriaId": "F29DC78F-4D02-47B4-A955-32080B22356C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jdk:1.6.0:update19:*:*:*:*:*:*",
"matchCriteriaId": "81A4204E-6F50-45FB-A343-7A30C0CD6D3D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jdk:1.6.0:update2:*:*:*:*:*:*",
"matchCriteriaId": "D6E07069-D6EE-4D44-94A6-CDCA4A50E6F9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jdk:1.6.0:update20:*:*:*:*:*:*",
"matchCriteriaId": "4B151882-47C0-400E-BBAB-A949E6140C86",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jdk:1.6.0:update21:*:*:*:*:*:*",
"matchCriteriaId": "6DB4F19E-DFC4-42F4-87B9-32FB1C496649",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jdk:1.6.0:update22:*:*:*:*:*:*",
"matchCriteriaId": "301E96A3-AD2F-48F3-9166-571BD6F9FAE3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jdk:1.6.0:update23:*:*:*:*:*:*",
"matchCriteriaId": "6C9215D9-DB64-4CEE-85E6-E247035EFB09",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jdk:1.6.0:update24:*:*:*:*:*:*",
"matchCriteriaId": "352509FE-54D9-4A59-98B7-96E5E98BC2CF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jdk:1.6.0:update25:*:*:*:*:*:*",
"matchCriteriaId": "C3EC13D3-4CE7-459C-A7D7-7D38C1284720",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jdk:1.6.0:update26:*:*:*:*:*:*",
"matchCriteriaId": "8CDCD1B4-C5F3-4188-B05F-23922F7DE517",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jdk:1.6.0:update27:*:*:*:*:*:*",
"matchCriteriaId": "1824DA2D-26D5-4595-8376-8E41AB8C5E52",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jdk:1.6.0:update29:*:*:*:*:*:*",
"matchCriteriaId": "B72F78B7-10D1-49CF-AC4D-3B10921CB633",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jdk:1.6.0:update3:*:*:*:*:*:*",
"matchCriteriaId": "344FA3EA-9E25-493C-976A-211D1404B251",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jdk:1.6.0:update30:*:*:*:*:*:*",
"matchCriteriaId": "60D05860-9424-4727-B583-74A35BC9BDFD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jdk:1.6.0:update31:*:*:*:*:*:*",
"matchCriteriaId": "F85DB431-FEA4-42E7-AC29-6B66174DCD9E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jdk:1.6.0:update32:*:*:*:*:*:*",
"matchCriteriaId": "FB7E911C-C780-440A-ABFF-CCE09061BB4F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jdk:1.6.0:update32_b31:*:*:*:*:*:*",
"matchCriteriaId": "F52AABC3-2ED1-4E42-947A-C932ABB72230",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jdk:1.6.0:update32_b32:*:*:*:*:*:*",
"matchCriteriaId": "E483FA1D-0C16-4522-90C9-E519AA492D7B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jdk:1.6.0:update33:*:*:*:*:*:*",
"matchCriteriaId": "0381EE39-2F60-49FD-A63A-B9E81C9033CB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jdk:1.6.0:update33_b31:*:*:*:*:*:*",
"matchCriteriaId": "8D4A356A-5B98-4343-9D7A-2FC3C4F8A393",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jdk:1.6.0:update33_b32:*:*:*:*:*:*",
"matchCriteriaId": "791AF351-BD13-4833-8C1D-46D0A4E24F5C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jdk:1.6.0:update33_b33:*:*:*:*:*:*",
"matchCriteriaId": "921FDBA8-D14A-46CB-8650-70C60A9FD807",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jdk:1.6.0:update34:*:*:*:*:*:*",
"matchCriteriaId": "9AD75455-B7F0-4F42-98E7-CAA43787D606",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jdk:1.6.0:update34_b31:*:*:*:*:*:*",
"matchCriteriaId": "8D9514FE-4CE3-4388-9F99-974AE008BE06",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jdk:1.6.0:update34_b32:*:*:*:*:*:*",
"matchCriteriaId": "DE1D896F-DFC7-49B9-84EF-EA10ADD81528",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jdk:1.6.0:update35:*:*:*:*:*:*",
"matchCriteriaId": "3BF0FD06-3953-49AB-A9AA-ACB6883E2D2E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jdk:1.6.0:update35_b31:*:*:*:*:*:*",
"matchCriteriaId": "6C96B122-A69E-4AFF-B39F-8DE4FCB23085",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jdk:1.6.0:update35_b32:*:*:*:*:*:*",
"matchCriteriaId": "6A70494A-AAB4-4112-9B3B-52C2DCD9291D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jdk:1.6.0:update37:*:*:*:*:*:*",
"matchCriteriaId": "62823E8E-99CF-40DB-B43E-CBA4E9A2F916",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jdk:1.6.0:update37_b31:*:*:*:*:*:*",
"matchCriteriaId": "2D55B585-E8BF-4FE4-86E9-FCD189F082B3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jdk:1.6.0:update37_b32:*:*:*:*:*:*",
"matchCriteriaId": "84A76389-79FE-4994-9F18-F77367C5229A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jdk:1.6.0:update38:*:*:*:*:*:*",
"matchCriteriaId": "FEA04B0D-D4E3-497D-9564-046B1CDA2342",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jdk:1.6.0:update38_b31:*:*:*:*:*:*",
"matchCriteriaId": "AFD97F29-D459-4178-A7FB-FD5310A8E0F0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jdk:1.6.0:update39:*:*:*:*:*:*",
"matchCriteriaId": "AD3522AD-6CE5-43A3-A108-FBEEE4C226B7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jdk:1.6.0:update4:*:*:*:*:*:*",
"matchCriteriaId": "D081A380-5AA4-4451-94A9-7B65810106E3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jdk:1.6.0:update41:*:*:*:*:*:*",
"matchCriteriaId": "B2F3B6EB-694F-44E9-9502-8487DCEC84BB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jdk:1.6.0:update43:*:*:*:*:*:*",
"matchCriteriaId": "1ED02C60-AD2E-4DAD-89DA-E978B6D6422A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jdk:1.6.0:update43_b31:*:*:*:*:*:*",
"matchCriteriaId": "FCA855EE-E8B2-4931-9E25-44288B7B9370",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jdk:1.6.0:update45:*:*:*:*:*:*",
"matchCriteriaId": "CAF4D47A-1D98-43B3-B26E-B4AF7F08BA84",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jdk:1.6.0:update5:*:*:*:*:*:*",
"matchCriteriaId": "112E7575-A3A0-4A94-AD39-7B2325B150B8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jdk:1.6.0:update51:*:*:*:*:*:*",
"matchCriteriaId": "1F3ECD7D-E0BF-45AB-80FA-9E6EAECF890F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jdk:1.6.0:update51_b31:*:*:*:*:*:*",
"matchCriteriaId": "640E12D5-681D-41F7-A3CC-33546A06ED4D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jdk:1.6.0:update51_b32:*:*:*:*:*:*",
"matchCriteriaId": "9327533B-9997-480D-ADC1-60756CD8BB13",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jdk:1.6.0:update6:*:*:*:*:*:*",
"matchCriteriaId": "708E8CEF-82EE-4D4B-ABF9-87AA4878F517",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jdk:1.6.0:update60:*:*:*:*:*:*",
"matchCriteriaId": "FF7DE0E6-F329-417B-8035-B4EBF9C97483",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jdk:1.6.0:update7:*:*:*:*:*:*",
"matchCriteriaId": "D5D9D9A7-8819-44A4-80AC-52D6B63A0C9B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jdk:1.6.0:update8:*:*:*:*:*:*",
"matchCriteriaId": "FEB2C8A3-E0DC-46A3-BD82-8E45DA55ED0E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jdk:1.6.0:update9:*:*:*:*:*:*",
"matchCriteriaId": "64B5B16D-061A-438D-A8CF-9E63D6C748D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jdk:1.7.0:-:*:*:*:*:*:*",
"matchCriteriaId": "ACABC935-5DD6-4F85-992E-70AD517EF41D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jdk:1.7.0:update1:*:*:*:*:*:*",
"matchCriteriaId": "6152036D-6421-4AE4-9223-766FE07B5A44",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jdk:1.7.0:update10:*:*:*:*:*:*",
"matchCriteriaId": "FE8B0935-6637-413D-B896-28E0ED7F2CEC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jdk:1.7.0:update10_b31:*:*:*:*:*:*",
"matchCriteriaId": "961EA7A1-1D15-4593-8045-4488225A35B4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jdk:1.7.0:update11:*:*:*:*:*:*",
"matchCriteriaId": "30B480BC-0886-4B19-B0A5-57B531077F40",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jdk:1.7.0:update11_b32:*:*:*:*:*:*",
"matchCriteriaId": "E03D6E3B-7BC1-4968-8190-3EE383B581A1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jdk:1.7.0:update13:*:*:*:*:*:*",
"matchCriteriaId": "7FA1990D-BBC2-429C-872C-6150459516B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jdk:1.7.0:update15:*:*:*:*:*:*",
"matchCriteriaId": "8DC2887E-610B-42FE-9A96-1E2F01BF17A3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jdk:1.7.0:update17:*:*:*:*:*:*",
"matchCriteriaId": "130849CD-A581-4FE6-B2AA-99134F16FE65",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jdk:1.7.0:update17_b31:*:*:*:*:*:*",
"matchCriteriaId": "D9ED7306-CB1F-4E50-9C5C-E1746F1E5D12",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jdk:1.7.0:update17_b32:*:*:*:*:*:*",
"matchCriteriaId": "F2D5B1D3-0D27-41A7-B4F9-3788272E1DEE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jdk:1.7.0:update2:*:*:*:*:*:*",
"matchCriteriaId": "D375CECB-405C-4E18-A7E8-9C5A2F97BD69",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jdk:1.7.0:update21:*:*:*:*:*:*",
"matchCriteriaId": "50AF5AE9-5314-4CE7-95A7-CE6D1B036D23",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jdk:1.7.0:update21_b31:*:*:*:*:*:*",
"matchCriteriaId": "29E8513E-09C8-4679-A84D-7DD50093E5B0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jdk:1.7.0:update25:*:*:*:*:*:*",
"matchCriteriaId": "1B10B19C-FA60-4CD5-AA61-A9791F6CECA8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jdk:1.7.0:update25_b33:*:*:*:*:*:*",
"matchCriteriaId": "4AE3DEB6-A368-4BFA-AA8B-2D5AEF812199",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jdk:1.7.0:update25_b34:*:*:*:*:*:*",
"matchCriteriaId": "2A291196-FA04-4897-B2B0-E078C51E8C14",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jdk:1.7.0:update25_b35:*:*:*:*:*:*",
"matchCriteriaId": "FD014E94-E45B-4DCD-B345-12DDD59F358C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jdk:1.7.0:update3:*:*:*:*:*:*",
"matchCriteriaId": "52EEEA5A-E77C-43CF-A063-9D5C64EA1870",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jdk:1.7.0:update4:*:*:*:*:*:*",
"matchCriteriaId": "003746F6-DEF0-4D0F-AD97-9E335868E301",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jdk:1.7.0:update40:*:*:*:*:*:*",
"matchCriteriaId": "220536FA-695D-4DE8-9813-494E3D061B78",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jdk:1.7.0:update5:*:*:*:*:*:*",
"matchCriteriaId": "CF830E0E-0169-4B6A-81FF-2E9FCD7D913B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jdk:1.7.0:update6:*:*:*:*:*:*",
"matchCriteriaId": "6BAE3670-0938-480A-8472-DFF0B3A0D0BF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jdk:1.7.0:update7:*:*:*:*:*:*",
"matchCriteriaId": "0EC967FF-26A6-4498-BC09-EC23B2B75CBA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jdk:1.7.0:update9:*:*:*:*:*:*",
"matchCriteriaId": "02781457-4E40-46A9-A5F7-945232A8C2B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jre:1.5.0:-:*:*:*:*:*:*",
"matchCriteriaId": "D8730889-A618-4CF9-888C-BF95802DD00F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jre:1.5.0:update1:*:*:*:*:*:*",
"matchCriteriaId": "94F2C368-5881-40AB-8B08-BF959E724950",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jre:1.5.0:update10:*:*:*:*:*:*",
"matchCriteriaId": "2D33EDF0-548B-457F-908B-C3795945FC37",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jre:1.5.0:update11:*:*:*:*:*:*",
"matchCriteriaId": "7B1BA97C-51C0-4EA2-B514-84503E1B42CD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jre:1.5.0:update12:*:*:*:*:*:*",
"matchCriteriaId": "30F69268-F35B-411F-90C6-11A5EFF00DE7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jre:1.5.0:update13:*:*:*:*:*:*",
"matchCriteriaId": "E137594B-9FFE-4081-933F-F825E3A3F362",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jre:1.5.0:update14:*:*:*:*:*:*",
"matchCriteriaId": "5DCC0622-5D7E-4D2D-84ED-FD985B2B0C58",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jre:1.5.0:update15:*:*:*:*:*:*",
"matchCriteriaId": "26AF05CC-DF6C-40EE-88A6-71C85EE7C4F4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jre:1.5.0:update16:*:*:*:*:*:*",
"matchCriteriaId": "79674E2C-B6E8-40DE-821D-291FD312C3A0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jre:1.5.0:update17:*:*:*:*:*:*",
"matchCriteriaId": "83E72AE8-C2EB-4C4A-80D0-7C5AA0BD2C48",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jre:1.5.0:update18:*:*:*:*:*:*",
"matchCriteriaId": "FC107766-8EF4-4A63-AC1F-DBFAD33E349D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jre:1.5.0:update19:*:*:*:*:*:*",
"matchCriteriaId": "BAA97E64-FFAA-4C4E-B3B1-72D9B968161E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jre:1.5.0:update2:*:*:*:*:*:*",
"matchCriteriaId": "5CEBD756-DAA9-4613-9ECA-943EB162BAF8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jre:1.5.0:update20:*:*:*:*:*:*",
"matchCriteriaId": "508CB5E0-5A93-4890-B822-10F29631B280",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jre:1.5.0:update21:*:*:*:*:*:*",
"matchCriteriaId": "A7C6D544-04A1-4B09-8AC9-DEBEAAB1E903",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jre:1.5.0:update22:*:*:*:*:*:*",
"matchCriteriaId": "08F6C2F3-2DB1-4B71-82D7-11233ADD1376",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jre:1.5.0:update23:*:*:*:*:*:*",
"matchCriteriaId": "708418EA-CFB6-4AFC-9327-E974F99E7323",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jre:1.5.0:update24:*:*:*:*:*:*",
"matchCriteriaId": "159846BB-6BC2-4A6F-B9B7-5D95D70B966F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jre:1.5.0:update25:*:*:*:*:*:*",
"matchCriteriaId": "ABD71288-227D-4FA6-9E07-FFA9EBAF3452",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jre:1.5.0:update26:*:*:*:*:*:*",
"matchCriteriaId": "5B02C330-01CB-41FB-A503-A6A9BB24FDA2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jre:1.5.0:update27:*:*:*:*:*:*",
"matchCriteriaId": "CF46C0A1-67A1-421A-961A-5C19E20D075F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jre:1.5.0:update28:*:*:*:*:*:*",
"matchCriteriaId": "CF3B6C14-A29B-4B55-82A9-51A2CC108063",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jre:1.5.0:update29:*:*:*:*:*:*",
"matchCriteriaId": "3E77C2EE-EB7D-40D8-BF74-F6CEB8DCE610",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jre:1.5.0:update3:*:*:*:*:*:*",
"matchCriteriaId": "5798AD7E-81A9-456B-8109-46F5CF910C63",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jre:1.5.0:update30:*:*:*:*:*:*",
"matchCriteriaId": "3FE9142C-E34A-4390-B9DF-4689A45E67BE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jre:1.5.0:update31:*:*:*:*:*:*",
"matchCriteriaId": "54D82C69-8F1E-4666-B0F3-25540F840170",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jre:1.5.0:update32:*:*:*:*:*:*",
"matchCriteriaId": "27EE5902-38E6-4977-A66A-FE2CCE27EAAD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jre:1.5.0:update33:*:*:*:*:*:*",
"matchCriteriaId": "97905F32-901A-4AE0-8E16-7CA44BC5988C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jre:1.5.0:update34:*:*:*:*:*:*",
"matchCriteriaId": "7109AD44-F277-41A6-B765-EE053B4F32C4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jre:1.5.0:update35:*:*:*:*:*:*",
"matchCriteriaId": "1AC184EB-A85D-47A0-8C21-FD05B0C46079",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jre:1.5.0:update36:*:*:*:*:*:*",
"matchCriteriaId": "CC062AE6-515B-4D40-9B86-46F7A1D7FF1C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jre:1.5.0:update38:*:*:*:*:*:*",
"matchCriteriaId": "B4A2D725-A7DC-4802-A377-5C3963AD9941",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jre:1.5.0:update39:*:*:*:*:*:*",
"matchCriteriaId": "A47E0A76-D6A3-445E-84C8-038497655BBC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jre:1.5.0:update4:*:*:*:*:*:*",
"matchCriteriaId": "88114C4E-0267-47C2-A7FC-D38BEFC3AF5C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jre:1.5.0:update40:*:*:*:*:*:*",
"matchCriteriaId": "A3C6E1D8-B96E-40FB-9E66-9B3A5325E78B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jre:1.5.0:update41:*:*:*:*:*:*",
"matchCriteriaId": "F08A5AAD-84CA-491F-83D3-CEFFD16212E0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jre:1.5.0:update45:*:*:*:*:*:*",
"matchCriteriaId": "A13547EA-EF77-493A-A863-F09E2AEE8BD4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jre:1.5.0:update5:*:*:*:*:*:*",
"matchCriteriaId": "055CA491-F4F1-4110-824F-23ED1494543F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jre:1.5.0:update51:*:*:*:*:*:*",
"matchCriteriaId": "ACB55CC5-0EC7-44B2-B5A9-A5B1EE584791",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jre:1.5.0:update6:*:*:*:*:*:*",
"matchCriteriaId": "5687B90D-55D3-4115-8266-4B935108C237",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jre:1.5.0:update7:*:*:*:*:*:*",
"matchCriteriaId": "6CA9E211-120C-4CAE-8A25-709D015124F1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jre:1.5.0:update8:*:*:*:*:*:*",
"matchCriteriaId": "FEE709FD-88F8-484D-9D13-216D79F5DDC4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jre:1.5.0:update9:*:*:*:*:*:*",
"matchCriteriaId": "15D32F92-E8CF-4EA8-AA31-5F406AAB455B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jre:1.6.0:-:*:*:*:*:*:*",
"matchCriteriaId": "EB864346-1429-46B5-A91E-A1126C486421",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jre:1.6.0:update1:*:*:*:*:*:*",
"matchCriteriaId": "F199B346-B95E-4DCA-B750-148A36D559BA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jre:1.6.0:update10:*:*:*:*:*:*",
"matchCriteriaId": "D16229B8-1642-4C10-8650-A9CEA9D4C98C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jre:1.6.0:update11:*:*:*:*:*:*",
"matchCriteriaId": "1714BDEF-6B0E-42BB-9510-3F9B52E170BC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jre:1.6.0:update12:*:*:*:*:*:*",
"matchCriteriaId": "830A3A51-F17A-4C61-8F5C-6A4582A64DA6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jre:1.6.0:update13:*:*:*:*:*:*",
"matchCriteriaId": "9DE0E496-719D-4CEF-837F-B060A898099F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jre:1.6.0:update14:*:*:*:*:*:*",
"matchCriteriaId": "3B02F361-0C64-4CB8-8DAD-A63F1A9CC025",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jre:1.6.0:update15:*:*:*:*:*:*",
"matchCriteriaId": "FD4CC3E2-7BEA-4D8C-811C-C5012327A9AA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jre:1.6.0:update16:*:*:*:*:*:*",
"matchCriteriaId": "9F63A8AC-893D-4D75-B467-85E70B62541D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jre:1.6.0:update17:*:*:*:*:*:*",
"matchCriteriaId": "D7823AE6-CB18-47DE-8A4F-1F98394B7237",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jre:1.6.0:update18:*:*:*:*:*:*",
"matchCriteriaId": "381EFA43-DB73-48EA-A4B1-F451EF60D845",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jre:1.6.0:update19:*:*:*:*:*:*",
"matchCriteriaId": "77C54E00-0197-4C87-9BFF-01A099AC3006",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jre:1.6.0:update2:*:*:*:*:*:*",
"matchCriteriaId": "64AD6007-EB92-4D0E-A0CB-8FFDDB61AA6D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jre:1.6.0:update20:*:*:*:*:*:*",
"matchCriteriaId": "7415177F-A2FE-47AB-8D92-194A4F6D75C8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jre:1.6.0:update21:*:*:*:*:*:*",
"matchCriteriaId": "52FA600C-08B6-4143-9C72-DB31E489DE3E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jre:1.6.0:update22:*:*:*:*:*:*",
"matchCriteriaId": "EF13B96D-1F80-4672-8DA3-F86F6D3BF070",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jre:1.6.0:update23:*:*:*:*:*:*",
"matchCriteriaId": "D1A2D440-D966-41A6-955D-38B28DDE0FDB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jre:1.6.0:update24:*:*:*:*:*:*",
"matchCriteriaId": "B1C57774-AD93-4162-8E45-92B09139C808",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jre:1.6.0:update25:*:*:*:*:*:*",
"matchCriteriaId": "CD7C4194-D34A-418F-9B00-5C6012844AAE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jre:1.6.0:update26:*:*:*:*:*:*",
"matchCriteriaId": "DAF7D86B-1B4D-4E1F-9EF0-DA7E419D7E99",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jre:1.6.0:update27:*:*:*:*:*:*",
"matchCriteriaId": "F0B82FB1-0F0E-44F9-87AE-628517279E4D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jre:1.6.0:update29:*:*:*:*:*:*",
"matchCriteriaId": "A0A67640-2F4A-488A-9D8F-3FE1F4DA8DEF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jre:1.6.0:update3:*:*:*:*:*:*",
"matchCriteriaId": "2752B83A-6DD2-4829-9E4F-42CDDCBC38C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jre:1.6.0:update30:*:*:*:*:*:*",
"matchCriteriaId": "0D60D98D-4363-44A0-AAB4-B61BA623EE21",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jre:1.6.0:update31:*:*:*:*:*:*",
"matchCriteriaId": "23CDA4F0-C32B-4B08-A377-7D4426C2F569",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jre:1.6.0:update32:*:*:*:*:*:*",
"matchCriteriaId": "8E76476E-4120-46A9-90A8-A95FE89636CD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jre:1.6.0:update33:*:*:*:*:*:*",
"matchCriteriaId": "97A84689-0CED-404F-8DC3-708BEB37D2CE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jre:1.6.0:update34:*:*:*:*:*:*",
"matchCriteriaId": "738EC3E5-A4EB-47FE-9C9A-7C8E8C669765",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jre:1.6.0:update35:*:*:*:*:*:*",
"matchCriteriaId": "FF56E0D9-612D-4215-9C76-560AE0661A05",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jre:1.6.0:update37:*:*:*:*:*:*",
"matchCriteriaId": "BA717604-4BB0-4968-B258-7C9F884016FF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jre:1.6.0:update38:*:*:*:*:*:*",
"matchCriteriaId": "AA71FCF4-580F-432D-AADC-65A2A92CEBC8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jre:1.6.0:update39:*:*:*:*:*:*",
"matchCriteriaId": "F1E1A8F3-5A63-401E-9BDA-ACCA30FF6AC8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jre:1.6.0:update4:*:*:*:*:*:*",
"matchCriteriaId": "964CCFD6-316A-48C6-9A6B-7CFD1A1FB027",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jre:1.6.0:update41:*:*:*:*:*:*",
"matchCriteriaId": "5C91517E-4C81-4D09-9FCB-B7AC769C7107",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jre:1.6.0:update43:*:*:*:*:*:*",
"matchCriteriaId": "8B276B96-66BE-4C09-BE9F-11FA7461CBDF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jre:1.6.0:update45:*:*:*:*:*:*",
"matchCriteriaId": "626E11CA-20EE-4AB0-84D7-8DAE7A9D8960",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jre:1.6.0:update5:*:*:*:*:*:*",
"matchCriteriaId": "DC8771D7-9531-4A1D-B2DE-FAA7A7549801",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jre:1.6.0:update51:*:*:*:*:*:*",
"matchCriteriaId": "FB006563-023B-4AC6-8A27-E41DE59758A0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jre:1.6.0:update6:*:*:*:*:*:*",
"matchCriteriaId": "6C59C275-5964-4E5D-BE80-BA4EA34BEA62",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jre:1.6.0:update60:*:*:*:*:*:*",
"matchCriteriaId": "4F6B5E73-6751-475A-B9BF-3414D3476208",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jre:1.6.0:update7:*:*:*:*:*:*",
"matchCriteriaId": "47C1922B-37E8-4009-97C7-B243F6F96704",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jre:1.6.0:update8:*:*:*:*:*:*",
"matchCriteriaId": "68957C57-EC74-4896-B97D-E936DC6AD31C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jre:1.6.0:update9:*:*:*:*:*:*",
"matchCriteriaId": "6B3A8681-3EAC-4D02-811A-5FCCCC7B5635",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jre:1.7.0:-:*:*:*:*:*:*",
"matchCriteriaId": "DFAA351A-93CD-46A8-A480-CE2783CCD620",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jre:1.7.0:update1:*:*:*:*:*:*",
"matchCriteriaId": "F4B153FD-E20B-4909-8B10-884E48F5B590",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jre:1.7.0:update10:*:*:*:*:*:*",
"matchCriteriaId": "F21933FB-A27C-4AF3-9811-2DE28484A5A6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jre:1.7.0:update10_b31:*:*:*:*:*:*",
"matchCriteriaId": "61B7A9E2-14BE-40E3-AF51-1BA6FC612170",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jre:1.7.0:update11:*:*:*:*:*:*",
"matchCriteriaId": "B2B20041-EB5D-4FA4-AC7D-C35E7878BCFD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jre:1.7.0:update11_b32:*:*:*:*:*:*",
"matchCriteriaId": "2438C775-5722-4AE6-98A8-354ABB6E0744",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jre:1.7.0:update13:*:*:*:*:*:*",
"matchCriteriaId": "F3C3C9C7-73AE-4B1D-AA85-C7F5330A4DE6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jre:1.7.0:update15:*:*:*:*:*:*",
"matchCriteriaId": "1D8BB8D7-D5EC-42D6-BEAA-CB03D1D6513E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jre:1.7.0:update17:*:*:*:*:*:*",
"matchCriteriaId": "37B5B98B-0E41-4397-8AB0-C18C6F10AED1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jre:1.7.0:update17_b31:*:*:*:*:*:*",
"matchCriteriaId": "B0228195-41B4-4145-B8A4-7B974456ABA1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jre:1.7.0:update17_b32:*:*:*:*:*:*",
"matchCriteriaId": "44F8FB6D-3602-4263-9814-CCB64B8D1926",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jre:1.7.0:update2:*:*:*:*:*:*",
"matchCriteriaId": "CB106FA9-26CE-48C5-AEA5-FD1A5454AEE2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jre:1.7.0:update21:*:*:*:*:*:*",
"matchCriteriaId": "4FF6C211-AD55-40FE-9130-77164E586F62",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jre:1.7.0:update21_b31:*:*:*:*:*:*",
"matchCriteriaId": "2D3257E5-17DB-4E02-9A8E-DD0E4D4339DB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jre:1.7.0:update25:*:*:*:*:*:*",
"matchCriteriaId": "F40DB141-E5B3-4EC2-9E2F-2E27414FCCB1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jre:1.7.0:update25_b33:*:*:*:*:*:*",
"matchCriteriaId": "3391456D-86B0-457B-83BB-4C74DA0ED634",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jre:1.7.0:update25_b34:*:*:*:*:*:*",
"matchCriteriaId": "AA88EAC0-FD2D-4B38-8944-D4B6C3BD6FE7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jre:1.7.0:update25_b35:*:*:*:*:*:*",
"matchCriteriaId": "C12DF03E-6E61-41DF-A283-D16AB356B6A1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jre:1.7.0:update3:*:*:*:*:*:*",
"matchCriteriaId": "5831D70B-3854-4CB8-B88D-40F1743DAEE0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jre:1.7.0:update4:*:*:*:*:*:*",
"matchCriteriaId": "EEB101C9-CA38-4421-BC0C-C1AD47AA2CC9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jre:1.7.0:update40:*:*:*:*:*:*",
"matchCriteriaId": "7CB654DC-1D3D-4475-8815-335AC573F54C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jre:1.7.0:update5:*:*:*:*:*:*",
"matchCriteriaId": "BA302DF3-ABBB-4262-B206-4C0F7B5B1E91",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jre:1.7.0:update6:*:*:*:*:*:*",
"matchCriteriaId": "F9A8EBCB-5E6A-42F0-8D07-F3A3D1C850F0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jre:1.7.0:update7:*:*:*:*:*:*",
"matchCriteriaId": "0CD8A54E-185B-4D34-82EF-C0C05739EC12",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jre:1.7.0:update7_b32:*:*:*:*:*:*",
"matchCriteriaId": "CD27AF64-5AA9-40F0-9308-2B4196FE7653",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jre:1.7.0:update9:*:*:*:*:*:*",
"matchCriteriaId": "4FFC7F0D-1F32-4235-8359-277CE41382DF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jre:1.7.0:update9_b31:*:*:*:*:*:*",
"matchCriteriaId": "85AAF389-656C-4460-AE39-70703CE74ABF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jre:1.7.0:update9_b32:*:*:*:*:*:*",
"matchCriteriaId": "5CEBEC4F-12CB-4790-B909-C2E796CEA60A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "133AAFA7-AF42-4D7B-8822-AA2E85611BF5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "EE249E1B-A1FD-4E08-AA71-A0E1F10FFE97",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "8A8E07B7-3739-4BEB-88F8-C7F62431E889",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "54D669D4-6D7E-449D-80C1-28FA44F06FFE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9BBCD86A-E6C7-4444-9D74-F861084090F0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "AF83BB87-B203-48F9-9D06-48A5FE399050",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D0AC5CD5-6E58-433C-9EB3-6DFE5656463E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E5ED5807-55B7-47C5-97A6-03233F4FBC3A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*",
"matchCriteriaId": "01EDA41C-6B2E-49AF-B503-EB3882265C11",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*",
"matchCriteriaId": "CB66DB75-2B16-4EBF-9B93-CE49D8086E41",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*",
"matchCriteriaId": "E2076871-2E80-4605-A470-A41C1A8EC7EE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:13.04:*:*:*:*:*:*:*",
"matchCriteriaId": "EFAA48D9-BEB4-4E49-AD50-325C262D46D9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:13.10:*:*:*:*:*:*:*",
"matchCriteriaId": "7F61F047-129C-41A6-8A27-FFCBB8563E91",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2013-5850."
},
{
"lang": "es",
"value": "Vulnerabilidad no especificada en Oracle Java SE 7u40 y versiones anteriores, Java SE 6u60 y versiones anteriores, Java SE 5.0u51 y versiones anteriores y Java SE Embedded 7u40 y versiones anteriores permite a atacantes remotos afectar la confidencialidad, la integridad y la disponibilidad a trav\u00e9s de vectores desconocidos relacionados con Libraries, una vulnerabilidad diferente a CVE-2013-5850."
}
],
"id": "CVE-2013-5842",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2013-10-16T17:55:06.053",
"references": [
{
"source": "secalert_us@oracle.com",
"tags": [
"Mailing List"
],
"url": "http://lists.apple.com/archives/security-announce/2013/Oct/msg00001.html"
},
{
"source": "secalert_us@oracle.com",
"tags": [
"Broken Link"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00010.html"
},
{
"source": "secalert_us@oracle.com",
"tags": [
"Broken Link"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00013.html"
},
{
"source": "secalert_us@oracle.com",
"tags": [
"Broken Link"
],
"url": "http://lists.opensuse.org/opensuse-updates/2013-11/msg00023.html"
},
{
"source": "secalert_us@oracle.com",
"tags": [
"Issue Tracking",
"Mailing List",
"Third Party Advisory"
],
"url": "http://marc.info/?l=bugtraq\u0026m=138674031212883\u0026w=2"
},
{
"source": "secalert_us@oracle.com",
"tags": [
"Issue Tracking",
"Mailing List",
"Third Party Advisory"
],
"url": "http://marc.info/?l=bugtraq\u0026m=138674073720143\u0026w=2"
},
{
"source": "secalert_us@oracle.com",
"tags": [
"Broken Link"
],
"url": "http://osvdb.org/98532"
},
{
"source": "secalert_us@oracle.com",
"tags": [
"Third Party Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2013-1440.html"
},
{
"source": "secalert_us@oracle.com",
"tags": [
"Third Party Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2013-1447.html"
},
{
"source": "secalert_us@oracle.com",
"tags": [
"Third Party Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2013-1451.html"
},
{
"source": "secalert_us@oracle.com",
"tags": [
"Third Party Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2013-1505.html"
},
{
"source": "secalert_us@oracle.com",
"tags": [
"Third Party Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2013-1507.html"
},
{
"source": "secalert_us@oracle.com",
"tags": [
"Third Party Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2013-1508.html"
},
{
"source": "secalert_us@oracle.com",
"tags": [
"Third Party Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2013-1509.html"
},
{
"source": "secalert_us@oracle.com",
"tags": [
"Third Party Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2013-1793.html"
},
{
"source": "secalert_us@oracle.com",
"tags": [
"Not Applicable"
],
"url": "http://secunia.com/advisories/56338"
},
{
"source": "secalert_us@oracle.com",
"tags": [
"Third Party Advisory"
],
"url": "http://security.gentoo.org/glsa/glsa-201406-32.xml"
},
{
"source": "secalert_us@oracle.com",
"tags": [
"Third Party Advisory"
],
"url": "http://support.apple.com/kb/HT5982"
},
{
"source": "secalert_us@oracle.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21655201"
},
{
"source": "secalert_us@oracle.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS13-025/index.html"
},
{
"source": "secalert_us@oracle.com",
"tags": [
"Vendor Advisory"
],
"url": "http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html"
},
{
"source": "secalert_us@oracle.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/63150"
},
{
"source": "secalert_us@oracle.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www.ubuntu.com/usn/USN-2033-1"
},
{
"source": "secalert_us@oracle.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www.ubuntu.com/usn/USN-2089-1"
},
{
"source": "secalert_us@oracle.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.zerodayinitiative.com/advisories/ZDI-13-246/"
},
{
"source": "secalert_us@oracle.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2014:0414"
},
{
"source": "secalert_us@oracle.com",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019123"
},
{
"source": "secalert_us@oracle.com",
"tags": [
"Broken Link"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18436"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
],
"url": "http://lists.apple.com/archives/security-announce/2013/Oct/msg00001.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00010.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00013.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
],
"url": "http://lists.opensuse.org/opensuse-updates/2013-11/msg00023.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Mailing List",
"Third Party Advisory"
],
"url": "http://marc.info/?l=bugtraq\u0026m=138674031212883\u0026w=2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Mailing List",
"Third Party Advisory"
],
"url": "http://marc.info/?l=bugtraq\u0026m=138674073720143\u0026w=2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
],
"url": "http://osvdb.org/98532"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2013-1440.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2013-1447.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2013-1451.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2013-1505.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2013-1507.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2013-1508.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2013-1509.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2013-1793.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Not Applicable"
],
"url": "http://secunia.com/advisories/56338"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://security.gentoo.org/glsa/glsa-201406-32.xml"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://support.apple.com/kb/HT5982"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21655201"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS13-025/index.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/63150"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.ubuntu.com/usn/USN-2033-1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.ubuntu.com/usn/USN-2089-1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.zerodayinitiative.com/advisories/ZDI-13-246/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2014:0414"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019123"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18436"
}
],
"sourceIdentifier": "secalert_us@oracle.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GSD-2013-5842
Vulnerability from gsd - Updated: 2023-12-13 01:22{
"GSD": {
"alias": "CVE-2013-5842",
"description": "Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2013-5850.",
"id": "GSD-2013-5842",
"references": [
"https://www.suse.com/security/cve/CVE-2013-5842.html",
"https://access.redhat.com/errata/RHSA-2014:0414",
"https://access.redhat.com/errata/RHSA-2013:1793",
"https://access.redhat.com/errata/RHSA-2013:1509",
"https://access.redhat.com/errata/RHSA-2013:1508",
"https://access.redhat.com/errata/RHSA-2013:1507",
"https://access.redhat.com/errata/RHSA-2013:1505",
"https://access.redhat.com/errata/RHSA-2013:1451",
"https://access.redhat.com/errata/RHSA-2013:1447",
"https://access.redhat.com/errata/RHSA-2013:1440",
"https://advisories.mageia.org/CVE-2013-5842.html",
"https://alas.aws.amazon.com/cve/html/CVE-2013-5842.html",
"https://linux.oracle.com/cve/CVE-2013-5842.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2013-5842"
],
"details": "Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2013-5850.",
"id": "GSD-2013-5842",
"modified": "2023-12-13T01:22:22.180987Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2013-5842",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2013-5850."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "RHSA-2014:0414",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2014:0414"
},
{
"name": "GLSA-201406-32",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-201406-32.xml"
},
{
"name": "RHSA-2013:1447",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1447.html"
},
{
"name": "RHSA-2013:1440",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1440.html"
},
{
"name": "USN-2033-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2033-1"
},
{
"name": "http://www.zerodayinitiative.com/advisories/ZDI-13-246/",
"refsource": "MISC",
"url": "http://www.zerodayinitiative.com/advisories/ZDI-13-246/"
},
{
"name": "USN-2089-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2089-1"
},
{
"name": "RHSA-2013:1508",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1508.html"
},
{
"name": "SUSE-SU-2013:1677",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00013.html"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1019123",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019123"
},
{
"name": "HPSBUX02944",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=138674073720143\u0026w=2"
},
{
"name": "RHSA-2013:1505",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1505.html"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21655201",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21655201"
},
{
"name": "HPSBUX02943",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=138674031212883\u0026w=2"
},
{
"name": "openSUSE-SU-2013:1663",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2013-11/msg00023.html"
},
{
"name": "SUSE-SU-2013:1666",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00010.html"
},
{
"name": "RHSA-2013:1793",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1793.html"
},
{
"name": "RHSA-2013:1509",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1509.html"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html"
},
{
"name": "APPLE-SA-2013-10-15-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2013/Oct/msg00001.html"
},
{
"name": "RHSA-2013:1507",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1507.html"
},
{
"name": "http://support.apple.com/kb/HT5982",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT5982"
},
{
"name": "oval:org.mitre.oval:def:18436",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18436"
},
{
"name": "63150",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/63150"
},
{
"name": "56338",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/56338"
},
{
"name": "RHSA-2013:1451",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1451.html"
},
{
"name": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS13-025/index.html",
"refsource": "CONFIRM",
"url": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS13-025/index.html"
},
{
"name": "98532",
"refsource": "OSVDB",
"url": "http://osvdb.org/98532"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:oracle:jre:1.7.0:update25:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jre:1.7.0:update9:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jre:1.7.0:update15:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jdk:1.7.0:update6:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jre:1.7.0:update6:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jdk:1.7.0:update5:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jre:1.7.0:update3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jdk:1.7.0:update7:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jdk:1.7.0:update2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jre:1.7.0:update13:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jdk:1.7.0:update13:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jdk:1.7.0:update11:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jre:1.7.0:update21:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jdk:1.7.0:update9:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jre:1.7.0:update10:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jre:1.7.0:update11:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jdk:1.7.0:update15:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jre:1.7.0:update2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jdk:1.7.0:update25:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jdk:1.7.0:update21:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jdk:1.7.0:update3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jre:1.7.0:update5:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jdk:1.7.0:update17:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jre:1.7.0:update4:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jdk:1.7.0:update1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jre:1.7.0:update17:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jre:1.7.0:update7:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jdk:1.7.0:update10:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jdk:1.7.0:update4:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jre:1.7.0:update1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jre:1.7.0:update40:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jre:1.7.0:update25_b35:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jre:1.7.0:update25_b34:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jre:1.7.0:update25_b33:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jre:1.7.0:update21_b31:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jre:1.7.0:update17_b32:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jre:1.7.0:update17_b31:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jre:1.7.0:update11_b32:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jre:1.7.0:update10_b31:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jre:1.7.0:update9_b32:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jre:1.7.0:update9_b31:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jre:1.7.0:update7_b32:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jdk:1.7.0:update40:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jdk:1.7.0:update25_b35:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jdk:1.7.0:update25_b34:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jdk:1.7.0:update25_b33:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jdk:1.7.0:update21_b31:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jdk:1.7.0:update17_b32:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jdk:1.7.0:update17_b31:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jdk:1.7.0:update11_b32:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jdk:1.7.0:update10_b31:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jdk:1.5.0:update11:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jdk:1.5.0:update1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jdk:1.5.0:update2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jdk:1.5.0:update3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jdk:1.5.0:update5:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jdk:1.5.0:update6:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jdk:1.5.0:update7:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jdk:1.5.0:update8:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jdk:1.5.0:update9:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jdk:1.5.0:update10:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jdk:1.5.0:update12:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jdk:1.5.0:update13:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jdk:1.5.0:update14:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jdk:1.5.0:update15:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jdk:1.5.0:update16:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jdk:1.5.0:update17:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jdk:1.5.0:update18:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jdk:1.5.0:update19:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jdk:1.5.0:-:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jdk:1.5.0:update4:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jdk:1.6.0:-:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jdk:1.5.0:update36:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jdk:1.5.0:update40:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jdk:1.5.0:update41:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jdk:1.5.0:update38:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jdk:1.5.0:update39:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jdk:1.5.0:update45:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jdk:1.5.0:update51:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jdk:1.6.0:update10:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jdk:1.6.0:update33:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jdk:1.6.0:update25:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jdk:1.6.0:update29:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jdk:1.6.0:update31:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jdk:1.6.0:update27:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jdk:1.6.0:update12:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jdk:1.6.0:update13:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jdk:1.6.0:update14:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jdk:1.6.0:update24:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jdk:1.6.0:update23:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jdk:1.6.0:update22:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jdk:1.6.0:update32:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jdk:1.6.0:update26:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jdk:1.6.0:update34:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jdk:1.6.0:update30:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jdk:1.6.0:update11:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jdk:1.6.0:update43:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jdk:1.6.0:update51:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jdk:1.6.0:update38:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jdk:1.6.0:update60:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jdk:1.6.0:update39:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jdk:1.6.0:update37:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jdk:1.6.0:update41:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jdk:1.6.0:update35:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jdk:1.6.0:update45:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jdk:1.6.0:update1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jdk:1.6.0:update2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jdk:1.6.0:update3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jdk:1.6.0:update4:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jdk:1.6.0:update5:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jdk:1.6.0:update7:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jdk:1.6.0:update6:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jre:1.5.0:update51:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jre:1.5.0:update36:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jre:1.5.0:update40:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jre:1.5.0:update39:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jre:1.5.0:update45:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jre:1.5.0:update38:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jre:1.5.0:update41:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jre:1.6.0:update30:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jre:1.6.0:update39:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jre:1.6.0:update32:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jre:1.6.0:update45:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jre:1.6.0:update35:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jre:1.6.0:update25:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jre:1.6.0:update33:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jre:1.6.0:update24:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jre:1.6.0:update26:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jre:1.6.0:update27:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jre:1.6.0:update22:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jre:1.6.0:update51:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jre:1.6.0:update31:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jre:1.6.0:update60:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jre:1.6.0:update41:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jre:1.6.0:update23:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jre:1.6.0:update38:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jre:1.6.0:update37:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jre:1.6.0:update34:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jre:1.6.0:update29:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jre:1.6.0:update43:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jre:1.7.0:-:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jre:1.6.0:-:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jre:1.6.0:update1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jre:1.6.0:update10:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jre:1.6.0:update11:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jre:1.6.0:update12:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jre:1.6.0:update13:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jre:1.6.0:update14:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jre:1.6.0:update15:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jre:1.6.0:update16:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jre:1.6.0:update17:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jre:1.6.0:update18:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jre:1.6.0:update19:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jre:1.6.0:update2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jre:1.6.0:update20:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jre:1.6.0:update21:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jre:1.6.0:update3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jre:1.6.0:update5:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jre:1.6.0:update4:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jre:1.6.0:update6:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jre:1.6.0:update7:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jre:1.6.0:update8:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jre:1.6.0:update9:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jre:1.5.0:update2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jre:1.5.0:update3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jre:1.5.0:update4:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jre:1.5.0:update5:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jre:1.5.0:update6:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jre:1.5.0:update7:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jre:1.5.0:update8:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jre:1.5.0:update9:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jre:1.5.0:update10:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jre:1.5.0:update11:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jre:1.5.0:update12:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jre:1.5.0:update13:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jre:1.5.0:update14:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jre:1.5.0:update15:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jre:1.5.0:update16:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jre:1.5.0:update17:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jre:1.5.0:update18:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jre:1.5.0:update19:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jre:1.5.0:update20:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jre:1.5.0:update21:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jre:1.5.0:update22:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jre:1.5.0:update23:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jre:1.5.0:update24:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jre:1.5.0:update25:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jre:1.5.0:update26:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jre:1.5.0:update27:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jre:1.5.0:update28:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jre:1.5.0:update29:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jre:1.5.0:update30:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jre:1.5.0:update31:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jre:1.5.0:update32:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jre:1.5.0:update33:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jre:1.5.0:update34:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jre:1.5.0:update35:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jre:1.5.0:-:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jre:1.5.0:update1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jdk:1.5.0:update20:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jdk:1.5.0:update21:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jdk:1.5.0:update22:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jdk:1.5.0:update23:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jdk:1.5.0:update24:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jdk:1.5.0:update25:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jdk:1.5.0:update26:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jdk:1.5.0:update27:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jdk:1.5.0:update28:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jdk:1.5.0:update29:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jdk:1.5.0:update30:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jdk:1.5.0:update31:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jdk:1.5.0:update32:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jdk:1.5.0:update33:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jdk:1.5.0:update34:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jdk:1.5.0:update35:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jdk:1.6.0:update15:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jdk:1.6.0:update16:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jdk:1.6.0:update17:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jdk:1.6.0:update18:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jdk:1.6.0:update19:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jdk:1.6.0:update20:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jdk:1.6.0:update21:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jdk:1.6.0:update8:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jdk:1.6.0:update9:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jdk:1.7.0:-:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jdk:1.6.0:update32_b31:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jdk:1.6.0:update32_b32:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jdk:1.6.0:update33_b31:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jdk:1.6.0:update33_b32:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jdk:1.6.0:update33_b33:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jdk:1.6.0:update34_b31:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jdk:1.6.0:update34_b32:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jdk:1.6.0:update35_b31:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jdk:1.6.0:update35_b32:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jdk:1.6.0:update37_b31:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jdk:1.6.0:update37_b32:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jdk:1.6.0:update38_b31:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jdk:1.6.0:update43_b31:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jdk:1.6.0:update51_b31:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:jdk:1.6.0:update51_b32:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_aus:6.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_eus:6.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:13.04:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:13.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2013-5842"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2013-5850."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html",
"refsource": "CONFIRM",
"tags": [
"Vendor Advisory"
],
"url": "http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html"
},
{
"name": "RHSA-2013:1440",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2013-1440.html"
},
{
"name": "RHSA-2013:1451",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2013-1451.html"
},
{
"name": "RHSA-2013:1447",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2013-1447.html"
},
{
"name": "http://www.zerodayinitiative.com/advisories/ZDI-13-246/",
"refsource": "MISC",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.zerodayinitiative.com/advisories/ZDI-13-246/"
},
{
"name": "98532",
"refsource": "OSVDB",
"tags": [
"Broken Link"
],
"url": "http://osvdb.org/98532"
},
{
"name": "63150",
"refsource": "BID",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/63150"
},
{
"name": "http://support.apple.com/kb/HT5982",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "http://support.apple.com/kb/HT5982"
},
{
"name": "APPLE-SA-2013-10-15-1",
"refsource": "APPLE",
"tags": [
"Mailing List"
],
"url": "http://lists.apple.com/archives/security-announce/2013/Oct/msg00001.html"
},
{
"name": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS13-025/index.html",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS13-025/index.html"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21655201",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21655201"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1019123",
"refsource": "CONFIRM",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019123"
},
{
"name": "openSUSE-SU-2013:1663",
"refsource": "SUSE",
"tags": [
"Broken Link"
],
"url": "http://lists.opensuse.org/opensuse-updates/2013-11/msg00023.html"
},
{
"name": "SUSE-SU-2013:1666",
"refsource": "SUSE",
"tags": [
"Broken Link"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00010.html"
},
{
"name": "RHSA-2013:1507",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2013-1507.html"
},
{
"name": "RHSA-2013:1505",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2013-1505.html"
},
{
"name": "SUSE-SU-2013:1677",
"refsource": "SUSE",
"tags": [
"Broken Link"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00013.html"
},
{
"name": "RHSA-2013:1508",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2013-1508.html"
},
{
"name": "USN-2033-1",
"refsource": "UBUNTU",
"tags": [
"Third Party Advisory"
],
"url": "http://www.ubuntu.com/usn/USN-2033-1"
},
{
"name": "RHSA-2013:1793",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2013-1793.html"
},
{
"name": "RHSA-2013:1509",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2013-1509.html"
},
{
"name": "HPSBUX02944",
"refsource": "HP",
"tags": [
"Issue Tracking",
"Mailing List",
"Third Party Advisory"
],
"url": "http://marc.info/?l=bugtraq\u0026m=138674073720143\u0026w=2"
},
{
"name": "HPSBUX02943",
"refsource": "HP",
"tags": [
"Issue Tracking",
"Mailing List",
"Third Party Advisory"
],
"url": "http://marc.info/?l=bugtraq\u0026m=138674031212883\u0026w=2"
},
{
"name": "56338",
"refsource": "SECUNIA",
"tags": [
"Not Applicable"
],
"url": "http://secunia.com/advisories/56338"
},
{
"name": "USN-2089-1",
"refsource": "UBUNTU",
"tags": [
"Third Party Advisory"
],
"url": "http://www.ubuntu.com/usn/USN-2089-1"
},
{
"name": "GLSA-201406-32",
"refsource": "GENTOO",
"tags": [
"Third Party Advisory"
],
"url": "http://security.gentoo.org/glsa/glsa-201406-32.xml"
},
{
"name": "oval:org.mitre.oval:def:18436",
"refsource": "OVAL",
"tags": [
"Broken Link"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18436"
},
{
"name": "RHSA-2014:0414",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2014:0414"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": false
}
},
"lastModifiedDate": "2022-12-21T15:32Z",
"publishedDate": "2013-10-16T17:55Z"
}
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.