Changed |
CPE Configuration |
OR
*cpe:2.3:a:oracle:jre:1.6.0:update22:*:*:*:*:*:*
*cpe:2.3:a:oracle:jre:1.6.0:update23:*:*:*:*:*:*
*cpe:2.3:a:oracle:jre:1.6.0:update24:*:*:*:*:*:*
*cpe:2.3:a:oracle:jre:1.6.0:update25:*:*:*:*:*:*
*cpe:2.3:a:oracle:jre:1.6.0:update26:*:*:*:*:*:*
*cpe:2.3:a:oracle:jre:1.6.0:update27:*:*:*:*:*:*
*cpe:2.3:a:oracle:jre:1.6.0:update29:*:*:*:*:*:*
*cpe:2.3:a:oracle:jre:*:update30:*:*:*:*:*:* versions up to (including) 1.6.0
*cpe:2.3:a:sun:jre:1.6.0:*:*:*:*:*:*:*
*cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:*
*cpe:2.3:a:sun:jre:1.6.0:update_10:*:*:*:*:*:*
*cpe:2.3:a:sun:jre:1.6.0:update_11:*:*:*:*:*:*
*cpe:2.3:a:sun:jre:1.6.0:update_12:*:*:*:*:*:*
*cpe:2.3:a:sun:jre:1.6.0:update_13:*:*:*:*:*:*
*cpe:2.3:a:sun:jre:1.6.0:update_14:*:*:*:*:*:*
*cpe:2.3:a:sun:jre:1.6.0:update_15:*:*:*:*:*:*
*cpe:2.3:a:sun:jre:1.6.0:update_16:*:*:*:*:*:*
*cpe:2.3:a:sun:jre:1.6.0:update_17:*:*:*:*:*:*
*cpe:2.3:a:sun:jre:1.6.0:update_18:*:*:*:*:*:*
*cpe:2.3:a:sun:jre:1.6.0:update_19:*:*:*:*:*:*
*cpe:2.3:a:sun:jre:1.6.0:update_2:*:*:*:*:*:*
*cpe:2.3:a:sun:jre:1.6.0:update_20:*:*:*:*:*:*
*cpe:2.3:a:sun:jre:1.6.0:update_21:*:*:*:*:*:*
*cpe:2.3:a:sun:jre:1.6.0:update_3:*:*:*:*:*:*
*cpe:2.3:a:sun:jre:1.6.0:update_4:*:*:*:*:*:*
*cpe:2.3:a:sun:jre:1.6.0:update_5:*:*:*:*:*:*
*cpe:2.3:a:sun:jre:1.6.0:update_6:*:*:*:*:*:*
*cpe:2.3:a:sun:jre:1.6.0:update_7:*:*:*:*:*:*
|
OR
*cpe:2.3:a:oracle:jre:1.6.0:update22:*:*:*:*:*:*
*cpe:2.3:a:oracle:jre:1.6.0:update23:*:*:*:*:*:*
*cpe:2.3:a:oracle:jre:1.6.0:update24:*:*:*:*:*:*
*cpe:2.3:a:oracle:jre:1.6.0:update25:*:*:*:*:*:*
*cpe:2.3:a:oracle:jre:1.6.0:update26:*:*:*:*:*:*
*cpe:2.3:a:oracle:jre:1.6.0:update27:*:*:*:*:*:*
*cpe:2.3:a:oracle:jre:1.6.0:update29:*:*:*:*:*:*
*cpe:2.3:a:oracle:jre:1.6.0:update30:*:*:*:*:*:*
*cpe:2.3:a:sun:jre:1.6.0:-:*:*:*:*:*:*
*cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:*
*cpe:2.3:a:sun:jre:1.6.0:update_10:*:*:*:*:*:*
*cpe:2.3:a:sun:jre:1.6.0:update_11:*:*:*:*:*:*
*cpe:2.3:a:sun:jre:1.6.0:update_12:*:*:*:*:*:*
*cpe:2.3:a:sun:jre:1.6.0:update_13:*:*:*:*:*:*
*cpe:2.3:a:sun:jre:1.6.0:update_14:*:*:*:*:*:*
*cpe:2.3:a:sun:jre:1.6.0:update_15:*:*:*:*:*:*
*cpe:2.3:a:sun:jre:1.6.0:update_16:*:*:*:*:*:*
*cpe:2.3:a:sun:jre:1.6.0:update_17:*:*:*:*:*:*
*cpe:2.3:a:sun:jre:1.6.0:update_18:*:*:*:*:*:*
*cpe:2.3:a:sun:jre:1.6.0:update_19:*:*:*:*:*:*
*cpe:2.3:a:sun:jre:1.6.0:update_2:*:*:*:*:*:*
*cpe:2.3:a:sun:jre:1.6.0:update_20:*:*:*:*:*:*
*cpe:2.3:a:sun:jre:1.6.0:update_21:*:*:*:*:*:*
*cpe:2.3:a:sun:jre:1.6.0:update_3:*:*:*:*:*:*
*cpe:2.3:a:sun:jre:1.6.0:update_4:*:*:*:*:*:*
*cpe:2.3:a:sun:jre:1.6.0:update_5:*:*:*:*:*:*
*cpe:2.3:a:sun:jre:1.6.0:update_6:*:*:*:*:*:*
*cpe:2.3:a:sun:jre:1.6.0:update_7:*:*:*:*:*:*
|
Changed |
CPE Configuration |
OR
*cpe:2.3:a:oracle:jre:1.7.0:*:*:*:*:*:*:*
*cpe:2.3:a:oracle:jre:1.7.0:update1:*:*:*:*:*:*
*cpe:2.3:a:oracle:jre:*:update2:*:*:*:*:*:* versions up to (including) 1.7.0
|
OR
*cpe:2.3:a:oracle:jre:1.7.0:-:*:*:*:*:*:*
*cpe:2.3:a:oracle:jre:1.7.0:update1:*:*:*:*:*:*
*cpe:2.3:a:oracle:jre:1.7.0:update2:*:*:*:*:*:*
|
Changed |
CPE Configuration |
OR
*cpe:2.3:a:sun:jre:1.5.0:*:*:*:*:*:*:*
*cpe:2.3:a:sun:jre:1.5.0:update1:*:*:*:*:*:*
*cpe:2.3:a:sun:jre:1.5.0:update10:*:*:*:*:*:*
*cpe:2.3:a:sun:jre:1.5.0:update11:*:*:*:*:*:*
*cpe:2.3:a:sun:jre:1.5.0:update12:*:*:*:*:*:*
*cpe:2.3:a:sun:jre:1.5.0:update13:*:*:*:*:*:*
*cpe:2.3:a:sun:jre:1.5.0:update14:*:*:*:*:*:*
*cpe:2.3:a:sun:jre:1.5.0:update15:*:*:*:*:*:*
*cpe:2.3:a:sun:jre:1.5.0:update16:*:*:*:*:*:*
*cpe:2.3:a:sun:jre:1.5.0:update17:*:*:*:*:*:*
*cpe:2.3:a:sun:jre:1.5.0:update18:*:*:*:*:*:*
*cpe:2.3:a:sun:jre:1.5.0:update19:*:*:*:*:*:*
*cpe:2.3:a:sun:jre:1.5.0:update2:*:*:*:*:*:*
*cpe:2.3:a:sun:jre:1.5.0:update20:*:*:*:*:*:*
*cpe:2.3:a:sun:jre:1.5.0:update21:*:*:*:*:*:*
*cpe:2.3:a:sun:jre:1.5.0:update22:*:*:*:*:*:*
*cpe:2.3:a:sun:jre:1.5.0:update23:*:*:*:*:*:*
*cpe:2.3:a:sun:jre:1.5.0:update24:*:*:*:*:*:*
*cpe:2.3:a:sun:jre:1.5.0:update25:*:*:*:*:*:*
*cpe:2.3:a:sun:jre:1.5.0:update26:*:*:*:*:*:*
*cpe:2.3:a:sun:jre:1.5.0:update27:*:*:*:*:*:*
*cpe:2.3:a:sun:jre:1.5.0:update28:*:*:*:*:*:*
*cpe:2.3:a:sun:jre:1.5.0:update29:*:*:*:*:*:*
*cpe:2.3:a:sun:jre:1.5.0:update3:*:*:*:*:*:*
*cpe:2.3:a:sun:jre:1.5.0:update31:*:*:*:*:*:*
*cpe:2.3:a:sun:jre:1.5.0:update4:*:*:*:*:*:*
*cpe:2.3:a:sun:jre:1.5.0:update5:*:*:*:*:*:*
*cpe:2.3:a:sun:jre:1.5.0:update6:*:*:*:*:*:*
*cpe:2.3:a:sun:jre:1.5.0:update7:*:*:*:*:*:*
*cpe:2.3:a:sun:jre:1.5.0:update8:*:*:*:*:*:*
*cpe:2.3:a:sun:jre:1.5.0:update9:*:*:*:*:*:*
*cpe:2.3:a:sun:jre:*:update33:*:*:*:*:*:* versions up to (including) 1.5.0
|
OR
*cpe:2.3:a:sun:jre:1.5.0:-:*:*:*:*:*:*
*cpe:2.3:a:sun:jre:1.5.0:update1:*:*:*:*:*:*
*cpe:2.3:a:sun:jre:1.5.0:update10:*:*:*:*:*:*
*cpe:2.3:a:sun:jre:1.5.0:update11:*:*:*:*:*:*
*cpe:2.3:a:sun:jre:1.5.0:update12:*:*:*:*:*:*
*cpe:2.3:a:sun:jre:1.5.0:update13:*:*:*:*:*:*
*cpe:2.3:a:sun:jre:1.5.0:update14:*:*:*:*:*:*
*cpe:2.3:a:sun:jre:1.5.0:update15:*:*:*:*:*:*
*cpe:2.3:a:sun:jre:1.5.0:update16:*:*:*:*:*:*
*cpe:2.3:a:sun:jre:1.5.0:update17:*:*:*:*:*:*
*cpe:2.3:a:sun:jre:1.5.0:update18:*:*:*:*:*:*
*cpe:2.3:a:sun:jre:1.5.0:update19:*:*:*:*:*:*
*cpe:2.3:a:sun:jre:1.5.0:update2:*:*:*:*:*:*
*cpe:2.3:a:sun:jre:1.5.0:update20:*:*:*:*:*:*
*cpe:2.3:a:sun:jre:1.5.0:update21:*:*:*:*:*:*
*cpe:2.3:a:sun:jre:1.5.0:update22:*:*:*:*:*:*
*cpe:2.3:a:sun:jre:1.5.0:update23:*:*:*:*:*:*
*cpe:2.3:a:sun:jre:1.5.0:update24:*:*:*:*:*:*
*cpe:2.3:a:sun:jre:1.5.0:update25:*:*:*:*:*:*
*cpe:2.3:a:sun:jre:1.5.0:update26:*:*:*:*:*:*
*cpe:2.3:a:sun:jre:1.5.0:update27:*:*:*:*:*:*
*cpe:2.3:a:sun:jre:1.5.0:update28:*:*:*:*:*:*
*cpe:2.3:a:sun:jre:1.5.0:update29:*:*:*:*:*:*
*cpe:2.3:a:sun:jre:1.5.0:update3:*:*:*:*:*:*
*cpe:2.3:a:sun:jre:1.5.0:update31:*:*:*:*:*:*
*cpe:2.3:a:sun:jre:1.5.0:update33:*:*:*:*:*:*
*cpe:2.3:a:sun:jre:1.5.0:update4:*:*:*:*:*:*
*cpe:2.3:a:sun:jre:1.5.0:update5:*:*:*:*:*:*
*cpe:2.3:a:sun:jre:1.5.0:update6:*:*:*:*:*:*
*cpe:2.3:a:sun:jre:1.5.0:update7:*:*:*:*:*:*
*cpe:2.3:a:sun:jre:1.5.0:update8:*:*:*:*:*:*
*cpe:2.3:a:sun:jre:1.5.0:update9:*:*:*:*:*:*
|
Added |
CPE Configuration |
|
OR
*cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
*cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
|
Added |
CPE Configuration |
|
OR
*cpe:2.3:o:suse:linux_enterprise_desktop:10:sp4:*:*:-:*:*:*
*cpe:2.3:o:suse:linux_enterprise_java:10:sp4:*:*:*:*:*:*
*cpe:2.3:o:suse:linux_enterprise_java:11:sp1:*:*:*:*:*:*
*cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:-:*:*:*
*cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:-:*:*
*cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:vmware:*:*
*cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:-:*:*
*cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp1:*:*:*:*:*:*
*cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp2:*:*:*:*:*:*
|
Changed |
Reference Type |
http://blogs.technet.com/b/mmpc/archive/2012/03/20/an-interesting-case-of-jre-sandbox-breach-cve-2012-0507.aspx No Types Assigned
|
http://blogs.technet.com/b/mmpc/archive/2012/03/20/an-interesting-case-of-jre-sandbox-breach-cve-2012-0507.aspx Third Party Advisory
|
Changed |
Reference Type |
http://krebsonsecurity.com/2012/03/new-java-attack-rolled-into-exploit-packs/ No Types Assigned
|
http://krebsonsecurity.com/2012/03/new-java-attack-rolled-into-exploit-packs/ Third Party Advisory
|
Changed |
Reference Type |
http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html No Types Assigned
|
http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html Issue Tracking, Third Party Advisory
|
Changed |
Reference Type |
http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00010.html No Types Assigned
|
http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00010.html Mailing List, Third Party Advisory
|
Changed |
Reference Type |
http://marc.info/?l=bugtraq&m=133364885411663&w=2 No Types Assigned
|
http://marc.info/?l=bugtraq&m=133364885411663&w=2 Third Party Advisory
|
Changed |
Reference Type |
http://marc.info/?l=bugtraq&m=133365109612558&w=2 No Types Assigned
|
http://marc.info/?l=bugtraq&m=133365109612558&w=2 Third Party Advisory
|
Changed |
Reference Type |
http://marc.info/?l=bugtraq&m=133847939902305&w=2 No Types Assigned
|
http://marc.info/?l=bugtraq&m=133847939902305&w=2 Third Party Advisory
|
Changed |
Reference Type |
http://marc.info/?l=bugtraq&m=134254866602253&w=2 No Types Assigned
|
http://marc.info/?l=bugtraq&m=134254866602253&w=2 Third Party Advisory
|
Changed |
Reference Type |
http://marc.info/?l=bugtraq&m=134254957702612&w=2 No Types Assigned
|
http://marc.info/?l=bugtraq&m=134254957702612&w=2 Third Party Advisory
|
Changed |
Reference Type |
http://rhn.redhat.com/errata/RHSA-2012-0508.html No Types Assigned
|
http://rhn.redhat.com/errata/RHSA-2012-0508.html Third Party Advisory
|
Changed |
Reference Type |
http://rhn.redhat.com/errata/RHSA-2012-0514.html No Types Assigned
|
http://rhn.redhat.com/errata/RHSA-2012-0514.html Third Party Advisory
|
Changed |
Reference Type |
http://rhn.redhat.com/errata/RHSA-2013-1455.html No Types Assigned
|
http://rhn.redhat.com/errata/RHSA-2013-1455.html Third Party Advisory
|
Changed |
Reference Type |
http://secunia.com/advisories/48589 No Types Assigned
|
http://secunia.com/advisories/48589 Not Applicable
|
Changed |
Reference Type |
http://secunia.com/advisories/48692 No Types Assigned
|
http://secunia.com/advisories/48692 Not Applicable
|
Changed |
Reference Type |
http://secunia.com/advisories/48915 No Types Assigned
|
http://secunia.com/advisories/48915 Not Applicable
|
Changed |
Reference Type |
http://secunia.com/advisories/48948 No Types Assigned
|
http://secunia.com/advisories/48948 Not Applicable
|
Changed |
Reference Type |
http://secunia.com/advisories/48950 No Types Assigned
|
http://secunia.com/advisories/48950 Not Applicable
|
Changed |
Reference Type |
http://www.debian.org/security/2012/dsa-2420 No Types Assigned
|
http://www.debian.org/security/2012/dsa-2420 Mailing List, Third Party Advisory
|
Changed |
Reference Type |
http://www.securityfocus.com/bid/52161 Exploit
|
http://www.securityfocus.com/bid/52161 Exploit, Third Party Advisory, VDB Entry
|
Changed |
Reference Type |
https://bugzilla.redhat.com/show_bug.cgi?id=788994 No Types Assigned
|
https://bugzilla.redhat.com/show_bug.cgi?id=788994 Issue Tracking
|
Removed |
Evaluator Impact |
Per: http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html 'Applies to client deployments of Java. This vulnerability can be exploited only through Untrusted Java Web Start applications and Untrusted Java applets. (Untrusted Java Web Start applications and untrusted applets run in the Java sandbox with limited privileges.)'
|
|