Changed |
CPE Configuration |
Record truncated, showing 500 of 581 characters.
View Entire Change Record
OR
*cpe:2.3:a:oracle:jre:1.7.0:*:*:*:*:*:*:*
*cpe:2.3:a:oracle:jre:1.7.0:update1:*:*:*:*:*:*
*cpe:2.3:a:oracle:jre:1.7.0:update10:*:*:*:*:*:*
*cpe:2.3:a:oracle:jre:1.7.0:update11:*:*:*:*:*:*
*cpe:2.3:a:oracle:jre:1.7.0:update2:*:*:*:*:*:*
*cpe:2.3:a:oracle:jre:1.7.0:update3:*:*:*:*:*:*
*cpe:2.3:a:oracle:jre:1.7.0:update4:*:*:*:*:*:*
*cpe:2.3:a:oracle:jre:1.7.0:update5:*:*:*:*:*:*
*cpe:2.3:a:oracle:jre:1.7.0:update6:*:*:*:*:*:*
*cpe:2.3:a:oracle:j
|
Record truncated, showing 500 of 581 characters.
View Entire Change Record
OR
*cpe:2.3:a:oracle:jre:1.7.0:-:*:*:*:*:*:*
*cpe:2.3:a:oracle:jre:1.7.0:update1:*:*:*:*:*:*
*cpe:2.3:a:oracle:jre:1.7.0:update10:*:*:*:*:*:*
*cpe:2.3:a:oracle:jre:1.7.0:update11:*:*:*:*:*:*
*cpe:2.3:a:oracle:jre:1.7.0:update2:*:*:*:*:*:*
*cpe:2.3:a:oracle:jre:1.7.0:update3:*:*:*:*:*:*
*cpe:2.3:a:oracle:jre:1.7.0:update4:*:*:*:*:*:*
*cpe:2.3:a:oracle:jre:1.7.0:update5:*:*:*:*:*:*
*cpe:2.3:a:oracle:jre:1.7.0:update6:*:*:*:*:*:*
*cpe:2.3:a:oracle:j
|
Changed |
CPE Configuration |
Record truncated, showing 500 of 581 characters.
View Entire Change Record
OR
*cpe:2.3:a:oracle:jdk:1.7.0:*:*:*:*:*:*:*
*cpe:2.3:a:oracle:jdk:1.7.0:update1:*:*:*:*:*:*
*cpe:2.3:a:oracle:jdk:1.7.0:update10:*:*:*:*:*:*
*cpe:2.3:a:oracle:jdk:1.7.0:update11:*:*:*:*:*:*
*cpe:2.3:a:oracle:jdk:1.7.0:update2:*:*:*:*:*:*
*cpe:2.3:a:oracle:jdk:1.7.0:update3:*:*:*:*:*:*
*cpe:2.3:a:oracle:jdk:1.7.0:update4:*:*:*:*:*:*
*cpe:2.3:a:oracle:jdk:1.7.0:update5:*:*:*:*:*:*
*cpe:2.3:a:oracle:jdk:1.7.0:update6:*:*:*:*:*:*
*cpe:2.3:a:oracle:j
|
OR
*cpe:2.3:a:oracle:openjdk:7:-:*:*:*:*:*:*
|
Changed |
Reference Type |
http://arstechnica.com/security/2013/01/critical-java-vulnerabilies-confirmed-in-latest-version/ No Types Assigned
|
http://arstechnica.com/security/2013/01/critical-java-vulnerabilies-confirmed-in-latest-version/ Third Party Advisory
|
Changed |
Reference Type |
http://blogs.computerworld.com/malware-and-vulnerabilities/21693/yet-another-java-security-flaw-discovered-number-53 No Types Assigned
|
http://blogs.computerworld.com/malware-and-vulnerabilities/21693/yet-another-java-security-flaw-discovered-number-53 Not Applicable
|
Changed |
Reference Type |
http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00001.html No Types Assigned
|
http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00001.html Third Party Advisory
|
Changed |
Reference Type |
http://marc.info/?l=bugtraq&m=136439120408139&w=2 No Types Assigned
|
http://marc.info/?l=bugtraq&m=136439120408139&w=2 Mailing List, Third Party Advisory
|
Changed |
Reference Type |
http://marc.info/?l=bugtraq&m=136733161405818&w=2 No Types Assigned
|
http://marc.info/?l=bugtraq&m=136733161405818&w=2 Mailing List, Third Party Advisory
|
Changed |
Reference Type |
http://rhn.redhat.com/errata/RHSA-2013-0237.html No Types Assigned
|
http://rhn.redhat.com/errata/RHSA-2013-0237.html Third Party Advisory
|
Changed |
Reference Type |
http://rhn.redhat.com/errata/RHSA-2013-0247.html No Types Assigned
|
http://rhn.redhat.com/errata/RHSA-2013-0247.html Third Party Advisory
|
Changed |
Reference Type |
http://seclists.org/fulldisclosure/2013/Jan/142 No Types Assigned
|
http://seclists.org/fulldisclosure/2013/Jan/142 Mailing List, Third Party Advisory
|
Changed |
Reference Type |
http://seclists.org/fulldisclosure/2013/Jan/195 No Types Assigned
|
http://seclists.org/fulldisclosure/2013/Jan/195 Mailing List, Third Party Advisory
|
Changed |
Reference Type |
http://security.gentoo.org/glsa/glsa-201406-32.xml No Types Assigned
|
http://security.gentoo.org/glsa/glsa-201406-32.xml Third Party Advisory
|
Changed |
Reference Type |
http://www.informationweek.com/security/application-security/java-hacker-uncovers-two-flaws-in-latest/240146717 No Types Assigned
|
http://www.informationweek.com/security/application-security/java-hacker-uncovers-two-flaws-in-latest/240146717 Broken Link
|
Changed |
Reference Type |
http://www.kb.cert.org/vuls/id/858729 US Government Resource
|
http://www.kb.cert.org/vuls/id/858729 Third Party Advisory, US Government Resource
|
Changed |
Reference Type |
http://www.mandriva.com/security/advisories?name=MDVSA-2013:095 No Types Assigned
|
http://www.mandriva.com/security/advisories?name=MDVSA-2013:095 Not Applicable
|
Changed |
Reference Type |
http://www.securityfocus.com/archive/1/525387/30/0/threaded No Types Assigned
|
http://www.securityfocus.com/archive/1/525387/30/0/threaded Third Party Advisory, VDB Entry
|
Changed |
Reference Type |
http://www.us-cert.gov/cas/techalerts/TA13-032A.html US Government Resource
|
http://www.us-cert.gov/cas/techalerts/TA13-032A.html Third Party Advisory, US Government Resource
|
Changed |
Reference Type |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16579 No Types Assigned
|
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16579 Broken Link
|
Changed |
Reference Type |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19418 No Types Assigned
|
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19418 Broken Link
|
Changed |
Reference Type |
https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0056 No Types Assigned
|
https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0056 Third Party Advisory
|
Removed |
Evaluator Description |
Per: http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html
"Applies to client deployment of Java only. This vulnerability can be exploited only through untrusted Java Web Start applications and untrusted Java applets. (Untrusted Java Web Start applications and untrusted applets run in the Java sandbox with limited privileges.)"
|
|