Changed |
CPE Configuration |
Record truncated, showing 500 of 3665 characters.
View Entire Change Record
AND
OR
*cpe:2.3:a:oracle:jdk:1.6.0:update22:*:*:*:*:*:*
*cpe:2.3:a:oracle:jdk:1.6.0:update23:*:*:*:*:*:*
*cpe:2.3:a:oracle:jdk:1.6.0:update24:*:*:*:*:*:*
*cpe:2.3:a:oracle:jdk:1.6.0:update25:*:*:*:*:*:*
*cpe:2.3:a:oracle:jdk:1.6.0:update26:*:*:*:*:*:*
*cpe:2.3:a:oracle:jdk:1.6.0:update27:*:*:*:*:*:*
*cpe:2.3:a:oracle:jdk:1.6.0:update29:*:*:*:*:*:*
*cpe:2.3:a:oracle:jdk:1.6.0:update30:*:*:*:*:*:*
*cpe:2
|
Record truncated, showing 500 of 4491 characters.
View Entire Change Record
AND
OR
*cpe:2.3:a:oracle:jdk:*:*:*:*:*:*:*:* versions from (including) 1.4.2 up to (including) 1.4.2_37
*cpe:2.3:a:oracle:jdk:1.5.0:-:*:*:*:*:*:*
*cpe:2.3:a:oracle:jdk:1.5.0:update1:*:*:*:*:*:*
*cpe:2.3:a:oracle:jdk:1.5.0:update10:*:*:*:*:*:*
*cpe:2.3:a:oracle:jdk:1.5.0:update11:*:*:*:*:*:*
*cpe:2.3:a:oracle:jdk:1.5.0:update12:*:*:*:*:*:*
*cpe:2.3:a:oracle:jdk:1.5.0:update13:*:*:*:*:*:*
*cpe:2.3:a:oracle:jdk:1.5
|
Changed |
CPE Configuration |
Record truncated, showing 500 of 746 characters.
View Entire Change Record
AND
OR
*cpe:2.3:a:oracle:jdk:1.7.0:*:*:*:*:*:*:*
*cpe:2.3:a:oracle:jdk:1.7.0:update1:*:*:*:*:*:*
*cpe:2.3:a:oracle:jdk:1.7.0:update2:*:*:*:*:*:*
*cpe:2.3:a:oracle:jdk:1.7.0:update3:*:*:*:*:*:*
*cpe:2.3:a:oracle:jdk:*:update4:*:*:*:*:*:* versions up to (including) 1.7.0
*cpe:2.3:a:oracle:jre:1.7.0:*:*:*:*:*:*:*
*cpe:2.3:a:oracle:jre:1.7.0:update1:*:*:*:*:*:*
*cpe:2.3:a:oracle:jre:1.7.0:update2:*:*:*:*:*:*
|
Record truncated, showing 500 of 4491 characters.
View Entire Change Record
AND
OR
*cpe:2.3:a:oracle:jre:*:*:*:*:*:*:*:* versions from (including) 1.4.2 up to (including) 1.4.2_37
*cpe:2.3:a:oracle:jre:1.5.0:-:*:*:*:*:*:*
*cpe:2.3:a:oracle:jre:1.5.0:update1:*:*:*:*:*:*
*cpe:2.3:a:oracle:jre:1.5.0:update10:*:*:*:*:*:*
*cpe:2.3:a:oracle:jre:1.5.0:update11:*:*:*:*:*:*
*cpe:2.3:a:oracle:jre:1.5.0:update12:*:*:*:*:*:*
*cpe:2.3:a:oracle:jre:1.5.0:update13:*:*:*:*:*:*
*cpe:2.3:a:oracle:jre:1.5
|
Changed |
CPE Configuration |
Record truncated, showing 500 of 3961 characters.
View Entire Change Record
AND
OR
*cpe:2.3:a:sun:jdk:1.5.0:*:*:*:*:*:*:*
*cpe:2.3:a:sun:jdk:1.5.0:update1:*:*:*:*:*:*
*cpe:2.3:a:sun:jdk:1.5.0:update10:*:*:*:*:*:*
*cpe:2.3:a:sun:jdk:1.5.0:update11:*:*:*:*:*:*
*cpe:2.3:a:sun:jdk:1.5.0:update11_b03:*:*:*:*:*:*
*cpe:2.3:a:sun:jdk:1.5.0:update12:*:*:*:*:*:*
*cpe:2.3:a:sun:jdk:1.5.0:update13:*:*:*:*:*:*
*cpe:2.3:a:sun:jdk:1.5.0:update14:*:*:*:*:*:*
*cpe:2.3:a:sun:jdk:1.5.0:update15:
|
Record truncated, showing 500 of 1108 characters.
View Entire Change Record
OR
*cpe:2.3:a:redhat:icedtea6:*:*:*:*:*:*:*:* versions up to (excluding) 1.10.8
*cpe:2.3:a:redhat:icedtea6:*:*:*:*:*:*:*:* versions from (including) 1.11.0 up to (excluding) 1.11.3
*cpe:2.3:a:redhat:satellite_with_embedded_oracle:5.5:*:*:*:*:*:*:*
*cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
*cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
*cpe:2.3:o:redhat:enterprise_linux_eus:6.2:*:*:*:*:*:*:*
*cpe:2.3:o:redhat:enterprise_linux_for
|
Changed |
CPE Configuration |
Record truncated, showing 500 of 4008 characters.
View Entire Change Record
AND
OR
*cpe:2.3:a:sun:jdk:1.4.2:*:*:*:*:*:*:*
*cpe:2.3:a:sun:jdk:1.4.2_1:*:*:*:*:*:*:*
*cpe:2.3:a:sun:jdk:1.4.2_2:*:*:*:*:*:*:*
*cpe:2.3:a:sun:jdk:1.4.2_3:*:*:*:*:*:*:*
*cpe:2.3:a:sun:jdk:1.4.2_4:*:*:*:*:*:*:*
*cpe:2.3:a:sun:jdk:1.4.2_5:*:*:*:*:*:*:*
*cpe:2.3:a:sun:jdk:1.4.2_6:*:*:*:*:*:*:*
*cpe:2.3:a:sun:jdk:1.4.2_7:*:*:*:*:*:*:*
*cpe:2.3:a:sun:jdk:1.4.2_8:*:*:*:*:*:*:*
*cpe:2.3:a:sun:jdk:1.
|
OR
*cpe:2.3:o:suse:linux_enterprise_desktop:10:sp4:*:*:-:*:*:*
*cpe:2.3:o:suse:linux_enterprise_java:10:sp4:*:*:*:*:*:*
*cpe:2.3:o:suse:linux_enterprise_java:11:sp2:*:*:*:*:*:*
*cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:-:*:*:*
*cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:-:*:*
*cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:vmware:*:*
*cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp2:*:*:*:*:*:*
|
Changed |
Reference Type |
http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00020.html No Types Assigned
|
http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00020.html Mailing List, Third Party Advisory
|
Changed |
Reference Type |
http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00028.html No Types Assigned
|
http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00028.html Mailing List, Third Party Advisory
|
Changed |
Reference Type |
http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00032.html No Types Assigned
|
http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00032.html Mailing List, Third Party Advisory
|
Changed |
Reference Type |
http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00035.html No Types Assigned
|
http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00035.html Mailing List, Third Party Advisory
|
Changed |
Reference Type |
http://mail.openjdk.java.net/pipermail/distro-pkg-dev/2012-June/019076.html No Types Assigned
|
http://mail.openjdk.java.net/pipermail/distro-pkg-dev/2012-June/019076.html Third Party Advisory
|
Changed |
Reference Type |
http://rhn.redhat.com/errata/RHSA-2012-0734.html No Types Assigned
|
http://rhn.redhat.com/errata/RHSA-2012-0734.html Third Party Advisory
|
Changed |
Reference Type |
http://rhn.redhat.com/errata/RHSA-2012-1243.html No Types Assigned
|
http://rhn.redhat.com/errata/RHSA-2012-1243.html Third Party Advisory
|
Changed |
Reference Type |
http://rhn.redhat.com/errata/RHSA-2013-1455.html No Types Assigned
|
http://rhn.redhat.com/errata/RHSA-2013-1455.html Third Party Advisory
|
Changed |
Reference Type |
http://rhn.redhat.com/errata/RHSA-2013-1456.html No Types Assigned
|
http://rhn.redhat.com/errata/RHSA-2013-1456.html Third Party Advisory
|
Changed |
Reference Type |
http://secunia.com/advisories/50659 No Types Assigned
|
http://secunia.com/advisories/50659 Broken Link
|
Changed |
Reference Type |
http://secunia.com/advisories/51080 No Types Assigned
|
http://secunia.com/advisories/51080 Broken Link
|
Changed |
Reference Type |
http://security.gentoo.org/glsa/glsa-201406-32.xml No Types Assigned
|
http://security.gentoo.org/glsa/glsa-201406-32.xml Third Party Advisory
|
Changed |
Reference Type |
http://www.ibm.com/support/docview.wss?uid=swg21615246 No Types Assigned
|
http://www.ibm.com/support/docview.wss?uid=swg21615246 Broken Link
|
Changed |
Reference Type |
http://www.mandriva.com/security/advisories?name=MDVSA-2012:095 No Types Assigned
|
http://www.mandriva.com/security/advisories?name=MDVSA-2012:095 Broken Link
|
Changed |
Reference Type |
http://www.mandriva.com/security/advisories?name=MDVSA-2013:150 No Types Assigned
|
http://www.mandriva.com/security/advisories?name=MDVSA-2013:150 Broken Link
|
Changed |
Reference Type |
http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html No Types Assigned
|
http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html Patch, Vendor Advisory
|
Changed |
Reference Type |
http://www.oracle.com/technetwork/topics/security/javacpujun2012-1515912.html Vendor Advisory
|
http://www.oracle.com/technetwork/topics/security/javacpujun2012-1515912.html Patch, Vendor Advisory
|
Changed |
Reference Type |
http://www.securityfocus.com/bid/53952 No Types Assigned
|
http://www.securityfocus.com/bid/53952 Broken Link, Third Party Advisory, VDB Entry
|
Changed |
Evaluator Impact |
Per: http://www.oracle.com/technetwork/topics/security/javacpujun2012-1515912.html
'Applies to printing on the Solaris and Linux platforms. This vulnerability cannot be exploited through untrusted Java Web Start applications or untrusted Java applets. It also cannot be exploited by supplying data to APIs in the specified Component without using untrusted Java Web Start applications or untrusted Java applets, such as through a web service.'
|
Per: http://www.oracle.com/technetwork/topics/security/javacpujun2012-1515912.html
'Applies to printing on the Solaris and Linux platforms. This vulnerability cannot be exploited through untrusted Java Web Start applications or untrusted Java applets. It also cannot be exploited by supplying data to APIs in the specified Component without using untrusted Java Web Start applications or untrusted Java applets, such as through a web service.'
|