fkie_cve-2013-3012
Vulnerability from fkie_nvd
Published
2013-07-23 11:03
Modified
2025-04-11 00:51
Severity ?
Summary
Unspecified vulnerability in the Java Runtime Environment (JRE) in IBM Java 1.4.2 before 1.4.2 SR13-FP18, 5.0 before 5.0 SR16-FP3, 6 before 6 SR14, 6.0.1 before 6.0.1 SR6, and 7 before 7 SR5 allows remote attackers to affect confidentiality, availability, and integrity via unknown vectors, a different vulnerability than CVE-2013-3009 and CVE-2013-3011.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| ibm | java | 5.0.0.0 | |
| ibm | java | 5.0.11.0 | |
| ibm | java | 5.0.11.1 | |
| ibm | java | 5.0.11.2 | |
| ibm | java | 5.0.12.0 | |
| ibm | java | 5.0.12.1 | |
| ibm | java | 5.0.12.2 | |
| ibm | java | 5.0.12.3 | |
| ibm | java | 5.0.12.4 | |
| ibm | java | 5.0.12.5 | |
| ibm | java | 5.0.13.0 | |
| ibm | java | 5.0.14.0 | |
| ibm | java | 5.0.15.0 | |
| ibm | java | 5.0.16.0 | |
| ibm | java | 5.0.16.1 | |
| ibm | java | 5.0.16.2 | |
| ibm | java | 6.0.0.0 | |
| ibm | java | 6.0.1.0 | |
| ibm | java | 6.0.2.0 | |
| ibm | java | 6.0.3.0 | |
| ibm | java | 6.0.4.0 | |
| ibm | java | 6.0.5.0 | |
| ibm | java | 6.0.6.0 | |
| ibm | java | 6.0.7.0 | |
| ibm | java | 6.0.8.0 | |
| ibm | java | 6.0.8.1 | |
| ibm | java | 6.0.9.0 | |
| ibm | java | 6.0.9.1 | |
| ibm | java | 6.0.9.2 | |
| ibm | java | 6.0.10.0 | |
| ibm | java | 6.0.10.1 | |
| ibm | java | 6.0.11.0 | |
| ibm | java | 6.0.12.0 | |
| ibm | java | 6.0.13.0 | |
| ibm | java | 6.0.13.1 | |
| ibm | java | 6.0.13.2 | |
| ibm | java | 7.0.0.0 | |
| ibm | java | 7.0.1.0 | |
| ibm | java | 7.0.2.0 | |
| ibm | java | 7.0.3.0 | |
| ibm | java | 7.0.4.0 | |
| ibm | java | 7.0.4.1 | |
| ibm | java | 7.0.4.2 | |
| ibm | java | 1.4.2 | |
| ibm | java | 1.4.2.13 | |
| ibm | java | 1.4.2.13.1 | |
| ibm | java | 1.4.2.13.2 | |
| ibm | java | 1.4.2.13.3 | |
| ibm | java | 1.4.2.13.4 | |
| ibm | java | 1.4.2.13.5 | |
| ibm | java | 1.4.2.13.6 | |
| ibm | java | 1.4.2.13.7 | |
| ibm | java | 1.4.2.13.8 | |
| ibm | java | 1.4.2.13.9 | |
| ibm | java | 1.4.2.13.10 | |
| ibm | java | 1.4.2.13.11 | |
| ibm | java | 1.4.2.13.12 | |
| ibm | java | 1.4.2.13.13 | |
| ibm | java | 1.4.2.13.14 | |
| ibm | java | 1.4.2.13.15 | |
| ibm | java | 1.4.2.13.16 | |
| ibm | java | 1.4.2.13.17 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:ibm:java:5.0.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "03D3F84F-3F6E-4DF1-B162-152293D951EA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:java:5.0.11.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A18121C3-F3F1-4EC7-A64E-3F6A0C9788C8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:java:5.0.11.1:*:*:*:*:*:*:*",
"matchCriteriaId": "BAD59912-7325-4AE1-ACCF-D4F804AF3947",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:java:5.0.11.2:*:*:*:*:*:*:*",
"matchCriteriaId": "62783157-E3B6-4A23-8D2F-1FBD0762E9A0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:java:5.0.12.0:*:*:*:*:*:*:*",
"matchCriteriaId": "14CC0D53-8AB8-4D44-82BB-0E6A974C36AB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:java:5.0.12.1:*:*:*:*:*:*:*",
"matchCriteriaId": "91A3129F-17A6-4F32-BD5D-34E4A1D1A840",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:java:5.0.12.2:*:*:*:*:*:*:*",
"matchCriteriaId": "E2845FF4-2620-4B8D-96CF-CC26B3DEA3C4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:java:5.0.12.3:*:*:*:*:*:*:*",
"matchCriteriaId": "CC7CD279-54B6-4F6B-AE14-299FB319C690",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:java:5.0.12.4:*:*:*:*:*:*:*",
"matchCriteriaId": "0EA269CA-4676-4008-89EF-20FAB89886A1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:java:5.0.12.5:*:*:*:*:*:*:*",
"matchCriteriaId": "D22105B6-1378-4E1C-B28A-FCAE00A2D5CF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:java:5.0.13.0:*:*:*:*:*:*:*",
"matchCriteriaId": "601762D3-1188-4945-931D-EB8DAC2847A1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:java:5.0.14.0:*:*:*:*:*:*:*",
"matchCriteriaId": "FA4A30A6-498C-46B8-8EFC-45EB13354EAF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:java:5.0.15.0:*:*:*:*:*:*:*",
"matchCriteriaId": "414CC00A-C797-4C34-8709-75DC061DCDE1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:java:5.0.16.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4401B967-0550-44F1-8753-9632120D2A44",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:java:5.0.16.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4961693D-F56C-46CD-B721-6A15E2837C17",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:java:5.0.16.2:*:*:*:*:*:*:*",
"matchCriteriaId": "AA4FBB66-CF6A-42D2-B122-1861F4139E75",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:ibm:java:6.0.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "14AD4A87-382A-41F0-96D8-0F0A9B738773",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:java:6.0.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "33701DDF-6882-41D3-A11B-A1F4585A77A7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:java:6.0.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "25C58BBA-06AC-40CD-A906-FD1B3B0AAB69",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:java:6.0.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "76C5B430-EE11-4674-B4B0-895D66E3B32F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:java:6.0.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B1837D84-6B4F-40D8-9A3F-71C328F659BA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:java:6.0.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D20A369B-2168-4883-A84C-BB48A71AFB33",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:java:6.0.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "3628AAB4-E524-46E5-AAF4-1980256F13CE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:java:6.0.7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "30DC9FE3-CDE9-4F83-989B-4E431BA18B56",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:java:6.0.8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C17B1C6B-04CE-49FB-B9BD-98ECD626B26F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:java:6.0.8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "81F529EB-2BCA-4E3E-93E4-2A9880CDA367",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:java:6.0.9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8DEAC3D6-F9F8-4F82-9BF1-FF0EC07A3274",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:java:6.0.9.1:*:*:*:*:*:*:*",
"matchCriteriaId": "7694638C-CDAC-44DF-B9F9-F7237CD98017",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:java:6.0.9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "23903A3C-1760-4836-BAE6-BDD32CBB4CBD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:java:6.0.10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "2477E033-D26B-4D71-839B-5FE4B0927559",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:java:6.0.10.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B1CAB7BF-265E-411D-A584-E78DE171F065",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:java:6.0.11.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4E45F670-232F-4CE5-8926-6463E5619506",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:java:6.0.12.0:*:*:*:*:*:*:*",
"matchCriteriaId": "5B70E6E3-15B3-4D48-AE49-B9184A58EECE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:java:6.0.13.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D5BCE3FD-B89B-4141-8103-9DB941AD60D0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:java:6.0.13.1:*:*:*:*:*:*:*",
"matchCriteriaId": "8EADFB3B-738F-4919-B165-9ECEED46EA6C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:java:6.0.13.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B23A5431-E599-4848-AB83-B299898F5EF0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:ibm:java:7.0.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9A8BF650-B8F5-467E-8DBF-81788B55F345",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:java:7.0.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1752A831-916F-4A7D-8AAE-1CEFACC51F91",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:java:7.0.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "0C9744C4-76BE-428B-AFF2-5BCE00A58322",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:java:7.0.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "48B1DE45-90F9-416B-9087-8AEF5B0A3C46",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:java:7.0.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9EF6A045-0DF6-463B-A0DB-6C31D8C2984C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:java:7.0.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "A731493C-9B46-4105-9902-B15BA0E0FB11",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:java:7.0.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "49454369-A494-4EAA-88D5-181570DEBB4A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:ibm:java:1.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "82F48415-7D29-488D-B0F0-21BBF67A8025",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:java:1.4.2.13:*:*:*:*:*:*:*",
"matchCriteriaId": "429E0F9B-63D2-46C1-9BB3-C0B91FC5A0B8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:java:1.4.2.13.1:*:*:*:*:*:*:*",
"matchCriteriaId": "7D454628-6074-42C5-B2F4-8ABC5597746E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:java:1.4.2.13.2:*:*:*:*:*:*:*",
"matchCriteriaId": "BC71A3DD-E08E-41FF-8443-5A75AD9F4FB1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:java:1.4.2.13.3:*:*:*:*:*:*:*",
"matchCriteriaId": "E09B43A6-87FB-4ECA-B837-469AA63FCED7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:java:1.4.2.13.4:*:*:*:*:*:*:*",
"matchCriteriaId": "55BD6A1E-8043-43AA-980D-8A277CE3CDB2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:java:1.4.2.13.5:*:*:*:*:*:*:*",
"matchCriteriaId": "8549B650-7862-4C3B-8F26-8D9EC490000E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:java:1.4.2.13.6:*:*:*:*:*:*:*",
"matchCriteriaId": "89D960CA-0065-44FE-83C4-F02119FEA7CF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:java:1.4.2.13.7:*:*:*:*:*:*:*",
"matchCriteriaId": "F2F28E80-A2FE-4985-8D02-06E6E10D8186",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:java:1.4.2.13.8:*:*:*:*:*:*:*",
"matchCriteriaId": "E484DE96-7DDE-4B49-B6CF-E4A4F22BDA5F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:java:1.4.2.13.9:*:*:*:*:*:*:*",
"matchCriteriaId": "F6EA48C2-7EF8-4E2E-A366-DE53B73029F6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:java:1.4.2.13.10:*:*:*:*:*:*:*",
"matchCriteriaId": "7EF5408C-D5CA-4404-9268-D0C26325FDD4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:java:1.4.2.13.11:*:*:*:*:*:*:*",
"matchCriteriaId": "6515717B-2DBF-4D91-BA6F-8BD77DE860F7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:java:1.4.2.13.12:*:*:*:*:*:*:*",
"matchCriteriaId": "5A5E269F-A5F5-40D9-8FF2-8FAAD73AFA32",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:java:1.4.2.13.13:*:*:*:*:*:*:*",
"matchCriteriaId": "95CB9215-CB52-484A-A67A-C7C2CBA8F68D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:java:1.4.2.13.14:*:*:*:*:*:*:*",
"matchCriteriaId": "6944A8CC-B4E5-4F1F-BA71-384D7EE074B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:java:1.4.2.13.15:*:*:*:*:*:*:*",
"matchCriteriaId": "7D8146AC-57A3-4FB3-A384-DD3B00133E69",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:java:1.4.2.13.16:*:*:*:*:*:*:*",
"matchCriteriaId": "5803B80C-3169-45ED-B5C9-095C032778A0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:java:1.4.2.13.17:*:*:*:*:*:*:*",
"matchCriteriaId": "DD37B25A-3306-4FD2-84D4-EDDAA3236C12",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Unspecified vulnerability in the Java Runtime Environment (JRE) in IBM Java 1.4.2 before 1.4.2 SR13-FP18, 5.0 before 5.0 SR16-FP3, 6 before 6 SR14, 6.0.1 before 6.0.1 SR6, and 7 before 7 SR5 allows remote attackers to affect confidentiality, availability, and integrity via unknown vectors, a different vulnerability than CVE-2013-3009 and CVE-2013-3011."
},
{
"lang": "es",
"value": "Vulnerabilidad sin especificar en Java Runtime Environment (JRE) en IBM Java 1.4.2 anterior a 1.4.2 SR13-FP18, 5.0 anterior a 5.0 SR16-FP3, 6 anterior a 6 SR14, 6.0.1 anterior a 6.0.1 SR6, y 7 anterior a 7 SR5, permite a atacantes remotos comprometer la disponibilidad, confidencialidad e integridad a trav\u00e9s de vectores no especificados. Vulnerabilidad distinta de CVE-2013-3009 y CVE-2013-3011."
}
],
"id": "CVE-2013-3012",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.3,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2013-07-23T11:03:19.767",
"references": [
{
"source": "psirt@us.ibm.com",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00026.html"
},
{
"source": "psirt@us.ibm.com",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00027.html"
},
{
"source": "psirt@us.ibm.com",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00028.html"
},
{
"source": "psirt@us.ibm.com",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00029.html"
},
{
"source": "psirt@us.ibm.com",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00031.html"
},
{
"source": "psirt@us.ibm.com",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00000.html"
},
{
"source": "psirt@us.ibm.com",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00003.html"
},
{
"source": "psirt@us.ibm.com",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1059.html"
},
{
"source": "psirt@us.ibm.com",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1060.html"
},
{
"source": "psirt@us.ibm.com",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1081.html"
},
{
"source": "psirt@us.ibm.com",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/54154"
},
{
"source": "psirt@us.ibm.com",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV44796"
},
{
"source": "psirt@us.ibm.com",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV44797"
},
{
"source": "psirt@us.ibm.com",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV44798"
},
{
"source": "psirt@us.ibm.com",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PM91730"
},
{
"source": "psirt@us.ibm.com",
"tags": [
"Vendor Advisory"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21642336"
},
{
"source": "psirt@us.ibm.com",
"tags": [
"Vendor Advisory"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21644197"
},
{
"source": "psirt@us.ibm.com",
"tags": [
"Vendor Advisory"
],
"url": "http://www.ibm.com/developerworks/java/jdk/alerts/#IBM_Security_Update_July_2013"
},
{
"source": "psirt@us.ibm.com",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/84153"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00026.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00027.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00028.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00029.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00031.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00000.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00003.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1059.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1060.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1081.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/54154"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV44796"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV44797"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV44798"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PM91730"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21642336"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21644197"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.ibm.com/developerworks/java/jdk/alerts/#IBM_Security_Update_July_2013"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/84153"
}
],
"sourceIdentifier": "psirt@us.ibm.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…