ID CVE-2013-0435
Summary Per http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html "Applies to client deployment of Java only. This vulnerability can be exploited only through untrusted Java Web Start applications and untrusted Java applets. (Untrusted Java Web Start applications and untrusted applets run in the Java sandbox with limited privileges.)"
References
Vulnerable Configurations
  • cpe:2.3:a:oracle:jre:1.7.0:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:jre:1.7.0:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jre:1.7.0:update1:*:*:*:*:*:*
    cpe:2.3:a:oracle:jre:1.7.0:update1:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jre:1.7.0:update10:*:*:*:*:*:*
    cpe:2.3:a:oracle:jre:1.7.0:update10:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jre:1.7.0:update11:*:*:*:*:*:*
    cpe:2.3:a:oracle:jre:1.7.0:update11:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jre:1.7.0:update2:*:*:*:*:*:*
    cpe:2.3:a:oracle:jre:1.7.0:update2:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jre:1.7.0:update3:*:*:*:*:*:*
    cpe:2.3:a:oracle:jre:1.7.0:update3:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jre:1.7.0:update4:*:*:*:*:*:*
    cpe:2.3:a:oracle:jre:1.7.0:update4:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jre:1.7.0:update5:*:*:*:*:*:*
    cpe:2.3:a:oracle:jre:1.7.0:update5:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jre:1.7.0:update6:*:*:*:*:*:*
    cpe:2.3:a:oracle:jre:1.7.0:update6:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jre:1.7.0:update7:*:*:*:*:*:*
    cpe:2.3:a:oracle:jre:1.7.0:update7:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jre:1.7.0:update9:*:*:*:*:*:*
    cpe:2.3:a:oracle:jre:1.7.0:update9:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jdk:1.7.0:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:jdk:1.7.0:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jdk:1.7.0:update1:*:*:*:*:*:*
    cpe:2.3:a:oracle:jdk:1.7.0:update1:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jdk:1.7.0:update10:*:*:*:*:*:*
    cpe:2.3:a:oracle:jdk:1.7.0:update10:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jdk:1.7.0:update11:*:*:*:*:*:*
    cpe:2.3:a:oracle:jdk:1.7.0:update11:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jdk:1.7.0:update2:*:*:*:*:*:*
    cpe:2.3:a:oracle:jdk:1.7.0:update2:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jdk:1.7.0:update3:*:*:*:*:*:*
    cpe:2.3:a:oracle:jdk:1.7.0:update3:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jdk:1.7.0:update4:*:*:*:*:*:*
    cpe:2.3:a:oracle:jdk:1.7.0:update4:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jdk:1.7.0:update5:*:*:*:*:*:*
    cpe:2.3:a:oracle:jdk:1.7.0:update5:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jdk:1.7.0:update6:*:*:*:*:*:*
    cpe:2.3:a:oracle:jdk:1.7.0:update6:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jdk:1.7.0:update7:*:*:*:*:*:*
    cpe:2.3:a:oracle:jdk:1.7.0:update7:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jdk:1.7.0:update9:*:*:*:*:*:*
    cpe:2.3:a:oracle:jdk:1.7.0:update9:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jre:1.6.0:update_22:*:*:*:*:*:*
    cpe:2.3:a:oracle:jre:1.6.0:update_22:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jre:1.6.0:update_23:*:*:*:*:*:*
    cpe:2.3:a:oracle:jre:1.6.0:update_23:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jre:1.6.0:update_24:*:*:*:*:*:*
    cpe:2.3:a:oracle:jre:1.6.0:update_24:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jre:1.6.0:update_25:*:*:*:*:*:*
    cpe:2.3:a:oracle:jre:1.6.0:update_25:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jre:1.6.0:update_26:*:*:*:*:*:*
    cpe:2.3:a:oracle:jre:1.6.0:update_26:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jre:1.6.0:update_27:*:*:*:*:*:*
    cpe:2.3:a:oracle:jre:1.6.0:update_27:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jre:1.6.0:update_29:*:*:*:*:*:*
    cpe:2.3:a:oracle:jre:1.6.0:update_29:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jre:1.6.0:update_30:*:*:*:*:*:*
    cpe:2.3:a:oracle:jre:1.6.0:update_30:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jre:1.6.0:update_31:*:*:*:*:*:*
    cpe:2.3:a:oracle:jre:1.6.0:update_31:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jre:1.6.0:update_32:*:*:*:*:*:*
    cpe:2.3:a:oracle:jre:1.6.0:update_32:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jre:1.6.0:update_33:*:*:*:*:*:*
    cpe:2.3:a:oracle:jre:1.6.0:update_33:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jre:1.6.0:update_34:*:*:*:*:*:*
    cpe:2.3:a:oracle:jre:1.6.0:update_34:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jre:1.6.0:update_35:*:*:*:*:*:*
    cpe:2.3:a:oracle:jre:1.6.0:update_35:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jre:1.6.0:update_37:*:*:*:*:*:*
    cpe:2.3:a:oracle:jre:1.6.0:update_37:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jre:1.6.0:update_38:*:*:*:*:*:*
    cpe:2.3:a:oracle:jre:1.6.0:update_38:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.6.0:*:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.6.0:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.6.0:update_10:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.6.0:update_10:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.6.0:update_11:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.6.0:update_11:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.6.0:update_12:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.6.0:update_12:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.6.0:update_13:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.6.0:update_13:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.6.0:update_14:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.6.0:update_14:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.6.0:update_15:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.6.0:update_15:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.6.0:update_16:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.6.0:update_16:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.6.0:update_17:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.6.0:update_17:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.6.0:update_18:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.6.0:update_18:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.6.0:update_19:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.6.0:update_19:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.6.0:update_2:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.6.0:update_2:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.6.0:update_20:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.6.0:update_20:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.6.0:update_21:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.6.0:update_21:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.6.0:update_3:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.6.0:update_3:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.6.0:update_4:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.6.0:update_4:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.6.0:update_5:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.6.0:update_5:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.6.0:update_6:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.6.0:update_6:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.6.0:update_7:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.6.0:update_7:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.6.0:update_9:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.6.0:update_9:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jdk:1.6.0:update_22:*:*:*:*:*:*
    cpe:2.3:a:oracle:jdk:1.6.0:update_22:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jdk:1.6.0:update_23:*:*:*:*:*:*
    cpe:2.3:a:oracle:jdk:1.6.0:update_23:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jdk:1.6.0:update_24:*:*:*:*:*:*
    cpe:2.3:a:oracle:jdk:1.6.0:update_24:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jdk:1.6.0:update_25:*:*:*:*:*:*
    cpe:2.3:a:oracle:jdk:1.6.0:update_25:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jdk:1.6.0:update_26:*:*:*:*:*:*
    cpe:2.3:a:oracle:jdk:1.6.0:update_26:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jdk:1.6.0:update_27:*:*:*:*:*:*
    cpe:2.3:a:oracle:jdk:1.6.0:update_27:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jdk:1.6.0:update_29:*:*:*:*:*:*
    cpe:2.3:a:oracle:jdk:1.6.0:update_29:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jdk:1.6.0:update_30:*:*:*:*:*:*
    cpe:2.3:a:oracle:jdk:1.6.0:update_30:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jdk:1.6.0:update_31:*:*:*:*:*:*
    cpe:2.3:a:oracle:jdk:1.6.0:update_31:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jdk:1.6.0:update_32:*:*:*:*:*:*
    cpe:2.3:a:oracle:jdk:1.6.0:update_32:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jdk:1.6.0:update_33:*:*:*:*:*:*
    cpe:2.3:a:oracle:jdk:1.6.0:update_33:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jdk:1.6.0:update_34:*:*:*:*:*:*
    cpe:2.3:a:oracle:jdk:1.6.0:update_34:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jdk:1.6.0:update_35:*:*:*:*:*:*
    cpe:2.3:a:oracle:jdk:1.6.0:update_35:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jdk:1.6.0:update_37:*:*:*:*:*:*
    cpe:2.3:a:oracle:jdk:1.6.0:update_37:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jdk:1.6.0:update_38:*:*:*:*:*:*
    cpe:2.3:a:oracle:jdk:1.6.0:update_38:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:1.6.0:*:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:1.6.0:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:1.6.0:update1:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:1.6.0:update1:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:1.6.0:update1_b06:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:1.6.0:update1_b06:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:1.6.0:update2:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:1.6.0:update2:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:1.6.0:update_10:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:1.6.0:update_10:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:1.6.0:update_11:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:1.6.0:update_11:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:1.6.0:update_12:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:1.6.0:update_12:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:1.6.0:update_13:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:1.6.0:update_13:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:1.6.0:update_14:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:1.6.0:update_14:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:1.6.0:update_15:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:1.6.0:update_15:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:1.6.0:update_16:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:1.6.0:update_16:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:1.6.0:update_17:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:1.6.0:update_17:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:1.6.0:update_18:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:1.6.0:update_18:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:1.6.0:update_19:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:1.6.0:update_19:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:1.6.0:update_20:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:1.6.0:update_20:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:1.6.0:update_21:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:1.6.0:update_21:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:1.6.0:update_3:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:1.6.0:update_3:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:1.6.0:update_4:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:1.6.0:update_4:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:1.6.0:update_5:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:1.6.0:update_5:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:1.6.0:update_6:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:1.6.0:update_6:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:1.6.0:update_7:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:1.6.0:update_7:*:*:*:*:*:*
CVSS
Base: 5.0 (as of 19-09-2017 - 01:35)
Impact:
Exploitability:
CWE NVD-CWE-noinfo
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL NONE NONE
assigner via4 cve@mitre.org
cvss-vector via4 AV:N/AC:L/Au:N/C:P/I:N/A:N
non_vulnerable_configuration via4
    oval via4
    • accepted 2013-06-10T04:01:02.357-04:00
      class vulnerability
      contributors
      name Sergey Artykhov
      organization ALTX-SOFT
      definition_extensions
      • comment Java SE Runtime Environment 6 is installed
        oval oval:org.mitre.oval:def:16362
      • comment Java SE Runtime Environment 7 is installed
        oval oval:org.mitre.oval:def:16050
      description Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality via vectors related to JAX-WS. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to improper restriction of com.sun.xml.internal packages and "Better handling of UI elements."
      family windows
      id oval:org.mitre.oval:def:16489
      status accepted
      submitted 2013-04-22T10:26:26.748+04:00
      title Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE (subcomponent: JAX-WS) 7 through Update 11 and 6 through Update 38, allows remote attackers to affect confidentiality via vectors related to JAX-WS. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to improper restriction of com.sun.xml.internal packages and "Better handling of UI elements."
      version 5
    • accepted 2015-04-20T04:00:53.109-04:00
      class vulnerability
      contributors
      • name Ganesh Manal
        organization Hewlett-Packard
      • name Sushant Kumar Singh
        organization Hewlett-Packard
      • name Prashant Kumar
        organization Hewlett-Packard
      • name Mike Cokus
        organization The MITRE Corporation
      description Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality via vectors related to JAX-WS. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to improper restriction of com.sun.xml.internal packages and "Better handling of UI elements."
      family unix
      id oval:org.mitre.oval:def:19078
      status accepted
      submitted 2013-11-22T11:43:28.000-05:00
      title HP-UX Running Java, Remote Unauthorized Access, Disclosure of Information, and Other Vulnerabilities
      version 44
    • accepted 2015-04-20T04:01:25.920-04:00
      class vulnerability
      contributors
      • name Ganesh Manal
        organization Hewlett-Packard
      • name Sushant Kumar Singh
        organization Hewlett-Packard
      • name Sushant Kumar Singh
        organization Hewlett-Packard
      • name Prashant Kumar
        organization Hewlett-Packard
      • name Mike Cokus
        organization The MITRE Corporation
      description Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality via vectors related to JAX-WS. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to improper restriction of com.sun.xml.internal packages and "Better handling of UI elements."
      family unix
      id oval:org.mitre.oval:def:19520
      status accepted
      submitted 2013-11-22T11:43:28.000-05:00
      title HP-UX Running Java, Remote Unauthorized Access, Disclosure of Information, and Other Vulnerabilities
      version 47
    redhat via4
    advisories
    • rhsa
      id RHSA-2013:0236
    • rhsa
      id RHSA-2013:0237
    • rhsa
      id RHSA-2013:0245
    • rhsa
      id RHSA-2013:0246
    • rhsa
      id RHSA-2013:0247
    • rhsa
      id RHSA-2013:1455
    • rhsa
      id RHSA-2013:1456
    rpms
    • java-1.6.0-openjdk-1:1.6.0.0-1.54.1.11.6.el6_3
    • java-1.6.0-openjdk-demo-1:1.6.0.0-1.54.1.11.6.el6_3
    • java-1.6.0-openjdk-devel-1:1.6.0.0-1.54.1.11.6.el6_3
    • java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.54.1.11.6.el6_3
    • java-1.6.0-openjdk-src-1:1.6.0.0-1.54.1.11.6.el6_3
    • java-1.6.0-openjdk-1:1.6.0.0-1.33.1.11.6.el5_9
    • java-1.6.0-openjdk-demo-1:1.6.0.0-1.33.1.11.6.el5_9
    • java-1.6.0-openjdk-devel-1:1.6.0.0-1.33.1.11.6.el5_9
    • java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.33.1.11.6.el5_9
    • java-1.6.0-openjdk-src-1:1.6.0.0-1.33.1.11.6.el5_9
    • java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el6_3
    • java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el6_3
    • java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el6_3
    • java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el6_3
    • java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el6_3
    • java-1.7.0-openjdk-1:1.7.0.9-2.3.5.3.el5_9
    • java-1.7.0-openjdk-demo-1:1.7.0.9-2.3.5.3.el5_9
    • java-1.7.0-openjdk-devel-1:1.7.0.9-2.3.5.3.el5_9
    • java-1.7.0-openjdk-javadoc-1:1.7.0.9-2.3.5.3.el5_9
    • java-1.7.0-openjdk-src-1:1.7.0.9-2.3.5.3.el5_9
    refmap via4
    bid 57729
    cert TA13-032A
    cert-vn VU#858729
    confirm
    gentoo GLSA-201406-32
    hp
    • HPSBMU02874
    • HPSBUX02857
    • HPSBUX02864
    • SSRT101103
    • SSRT101156
    • SSRT101184
    mandriva MDVSA-2013:095
    suse
    • openSUSE-SU-2013:0312
    • openSUSE-SU-2013:0377
    vulnerable_product via4
    • cpe:2.3:a:oracle:jre:1.7.0:*:*:*:*:*:*:*
    • cpe:2.3:a:oracle:jre:1.7.0:update1:*:*:*:*:*:*
    • cpe:2.3:a:oracle:jre:1.7.0:update10:*:*:*:*:*:*
    • cpe:2.3:a:oracle:jre:1.7.0:update11:*:*:*:*:*:*
    • cpe:2.3:a:oracle:jre:1.7.0:update2:*:*:*:*:*:*
    • cpe:2.3:a:oracle:jre:1.7.0:update3:*:*:*:*:*:*
    • cpe:2.3:a:oracle:jre:1.7.0:update4:*:*:*:*:*:*
    • cpe:2.3:a:oracle:jre:1.7.0:update5:*:*:*:*:*:*
    • cpe:2.3:a:oracle:jre:1.7.0:update6:*:*:*:*:*:*
    • cpe:2.3:a:oracle:jre:1.7.0:update7:*:*:*:*:*:*
    • cpe:2.3:a:oracle:jre:1.7.0:update9:*:*:*:*:*:*
    • cpe:2.3:a:oracle:jdk:1.7.0:*:*:*:*:*:*:*
    • cpe:2.3:a:oracle:jdk:1.7.0:update1:*:*:*:*:*:*
    • cpe:2.3:a:oracle:jdk:1.7.0:update10:*:*:*:*:*:*
    • cpe:2.3:a:oracle:jdk:1.7.0:update11:*:*:*:*:*:*
    • cpe:2.3:a:oracle:jdk:1.7.0:update2:*:*:*:*:*:*
    • cpe:2.3:a:oracle:jdk:1.7.0:update3:*:*:*:*:*:*
    • cpe:2.3:a:oracle:jdk:1.7.0:update4:*:*:*:*:*:*
    • cpe:2.3:a:oracle:jdk:1.7.0:update5:*:*:*:*:*:*
    • cpe:2.3:a:oracle:jdk:1.7.0:update6:*:*:*:*:*:*
    • cpe:2.3:a:oracle:jdk:1.7.0:update7:*:*:*:*:*:*
    • cpe:2.3:a:oracle:jdk:1.7.0:update9:*:*:*:*:*:*
    • cpe:2.3:a:oracle:jre:1.6.0:update_22:*:*:*:*:*:*
    • cpe:2.3:a:oracle:jre:1.6.0:update_23:*:*:*:*:*:*
    • cpe:2.3:a:oracle:jre:1.6.0:update_24:*:*:*:*:*:*
    • cpe:2.3:a:oracle:jre:1.6.0:update_25:*:*:*:*:*:*
    • cpe:2.3:a:oracle:jre:1.6.0:update_26:*:*:*:*:*:*
    • cpe:2.3:a:oracle:jre:1.6.0:update_27:*:*:*:*:*:*
    • cpe:2.3:a:oracle:jre:1.6.0:update_29:*:*:*:*:*:*
    • cpe:2.3:a:oracle:jre:1.6.0:update_30:*:*:*:*:*:*
    • cpe:2.3:a:oracle:jre:1.6.0:update_31:*:*:*:*:*:*
    • cpe:2.3:a:oracle:jre:1.6.0:update_32:*:*:*:*:*:*
    • cpe:2.3:a:oracle:jre:1.6.0:update_33:*:*:*:*:*:*
    • cpe:2.3:a:oracle:jre:1.6.0:update_34:*:*:*:*:*:*
    • cpe:2.3:a:oracle:jre:1.6.0:update_35:*:*:*:*:*:*
    • cpe:2.3:a:oracle:jre:1.6.0:update_37:*:*:*:*:*:*
    • cpe:2.3:a:oracle:jre:1.6.0:update_38:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.6.0:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.6.0:update_10:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.6.0:update_11:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.6.0:update_12:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.6.0:update_13:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.6.0:update_14:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.6.0:update_15:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.6.0:update_16:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.6.0:update_17:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.6.0:update_18:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.6.0:update_19:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.6.0:update_2:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.6.0:update_20:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.6.0:update_21:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.6.0:update_3:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.6.0:update_4:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.6.0:update_5:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.6.0:update_6:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.6.0:update_7:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.6.0:update_9:*:*:*:*:*:*
    • cpe:2.3:a:oracle:jdk:1.6.0:update_22:*:*:*:*:*:*
    • cpe:2.3:a:oracle:jdk:1.6.0:update_23:*:*:*:*:*:*
    • cpe:2.3:a:oracle:jdk:1.6.0:update_24:*:*:*:*:*:*
    • cpe:2.3:a:oracle:jdk:1.6.0:update_25:*:*:*:*:*:*
    • cpe:2.3:a:oracle:jdk:1.6.0:update_26:*:*:*:*:*:*
    • cpe:2.3:a:oracle:jdk:1.6.0:update_27:*:*:*:*:*:*
    • cpe:2.3:a:oracle:jdk:1.6.0:update_29:*:*:*:*:*:*
    • cpe:2.3:a:oracle:jdk:1.6.0:update_30:*:*:*:*:*:*
    • cpe:2.3:a:oracle:jdk:1.6.0:update_31:*:*:*:*:*:*
    • cpe:2.3:a:oracle:jdk:1.6.0:update_32:*:*:*:*:*:*
    • cpe:2.3:a:oracle:jdk:1.6.0:update_33:*:*:*:*:*:*
    • cpe:2.3:a:oracle:jdk:1.6.0:update_34:*:*:*:*:*:*
    • cpe:2.3:a:oracle:jdk:1.6.0:update_35:*:*:*:*:*:*
    • cpe:2.3:a:oracle:jdk:1.6.0:update_37:*:*:*:*:*:*
    • cpe:2.3:a:oracle:jdk:1.6.0:update_38:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.6.0:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.6.0:update1:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.6.0:update1_b06:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.6.0:update2:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.6.0:update_10:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.6.0:update_11:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.6.0:update_12:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.6.0:update_13:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.6.0:update_14:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.6.0:update_15:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.6.0:update_16:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.6.0:update_17:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.6.0:update_18:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.6.0:update_19:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.6.0:update_20:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.6.0:update_21:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.6.0:update_3:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.6.0:update_4:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.6.0:update_5:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.6.0:update_6:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.6.0:update_7:*:*:*:*:*:*
    Last major update 19-09-2017 - 01:35
    Published 02-02-2013 - 00:55
    Back to Top