CVE-2012-5079

medium
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, 5.0 Update 36 and earlier, and 1.4.2_38 and earlier allows remote attackers to affect integrity via unknown vectors related to Libraries, a different vulnerability than CVE-2012-5073.

References

http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00016.html

http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00023.html

http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00010.html

http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00011.html

http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00022.html

http://marc.info/?l=bugtraq&m=135542848327757&w=2

http://marc.info/?l=bugtraq&m=135758563611658&w=2

http://rhn.redhat.com/errata/RHSA-2012-1385.html

http://rhn.redhat.com/errata/RHSA-2012-1386.html

http://rhn.redhat.com/errata/RHSA-2012-1391.html

http://rhn.redhat.com/errata/RHSA-2012-1392.html

http://rhn.redhat.com/errata/RHSA-2012-1465.html

http://rhn.redhat.com/errata/RHSA-2012-1466.html

http://rhn.redhat.com/errata/RHSA-2012-1467.html

http://rhn.redhat.com/errata/RHSA-2013-1455.html

http://rhn.redhat.com/errata/RHSA-2013-1456.html

http://secunia.com/advisories/51028

http://secunia.com/advisories/51029

http://secunia.com/advisories/51141

http://secunia.com/advisories/51166

http://secunia.com/advisories/51313

http://secunia.com/advisories/51315

http://secunia.com/advisories/51326

http://secunia.com/advisories/51327

http://secunia.com/advisories/51328

http://secunia.com/advisories/51390

http://secunia.com/advisories/51393

http://secunia.com/advisories/51438

http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS12-023/index.html

http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html

http://www.securityfocus.com/bid/56082

http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf

http://www-01.ibm.com/support/docview.wss?uid=swg21616490

http://www-01.ibm.com/support/docview.wss?uid=swg21620037

http://www-01.ibm.com/support/docview.wss?uid=swg21621154

http://www-01.ibm.com/support/docview.wss?uid=swg21631786

https://exchange.xforce.ibmcloud.com/vulnerabilities/79433

https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16602

Details

Source: MITRE

Published: 2012-10-16

Updated: 2017-09-19

Risk Information

CVSS v2

Base Score: 5

Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N

Impact Score: 2.9

Exploitability Score: 10

Severity: MEDIUM

Vulnerable Software

Configuration 1

OR

cpe:2.3:a:oracle:jdk:1.7.0:*:*:*:*:*:*:*

cpe:2.3:a:oracle:jdk:1.7.0:update1:*:*:*:*:*:*

cpe:2.3:a:oracle:jdk:1.7.0:update2:*:*:*:*:*:*

cpe:2.3:a:oracle:jdk:1.7.0:update3:*:*:*:*:*:*

cpe:2.3:a:oracle:jdk:1.7.0:update4:*:*:*:*:*:*

cpe:2.3:a:oracle:jdk:1.7.0:update5:*:*:*:*:*:*

cpe:2.3:a:oracle:jdk:1.7.0:update6:*:*:*:*:*:*

cpe:2.3:a:oracle:jdk:*:update7:*:*:*:*:*:* versions up to 1.7.0 (inclusive)

cpe:2.3:a:oracle:jre:1.7.0:*:*:*:*:*:*:*

cpe:2.3:a:oracle:jre:1.7.0:update1:*:*:*:*:*:*

cpe:2.3:a:oracle:jre:1.7.0:update2:*:*:*:*:*:*

cpe:2.3:a:oracle:jre:1.7.0:update3:*:*:*:*:*:*

cpe:2.3:a:oracle:jre:1.7.0:update4:*:*:*:*:*:*

cpe:2.3:a:oracle:jre:1.7.0:update5:*:*:*:*:*:*

cpe:2.3:a:oracle:jre:1.7.0:update6:*:*:*:*:*:*

cpe:2.3:a:oracle:jre:*:update7:*:*:*:*:*:* versions up to 1.7.0 (inclusive)

Configuration 2

OR

cpe:2.3:a:oracle:jdk:1.6.0:update_22:*:*:*:*:*:*

cpe:2.3:a:oracle:jdk:1.6.0:update_23:*:*:*:*:*:*

cpe:2.3:a:oracle:jdk:1.6.0:update_24:*:*:*:*:*:*

cpe:2.3:a:oracle:jdk:1.6.0:update_25:*:*:*:*:*:*

cpe:2.3:a:oracle:jdk:1.6.0:update_26:*:*:*:*:*:*

cpe:2.3:a:oracle:jdk:1.6.0:update_27:*:*:*:*:*:*

cpe:2.3:a:oracle:jdk:1.6.0:update_29:*:*:*:*:*:*

cpe:2.3:a:oracle:jdk:1.6.0:update_30:*:*:*:*:*:*

cpe:2.3:a:oracle:jdk:1.6.0:update_31:*:*:*:*:*:*

cpe:2.3:a:oracle:jdk:1.6.0:update_32:*:*:*:*:*:*

cpe:2.3:a:oracle:jdk:1.6.0:update_33:*:*:*:*:*:*

cpe:2.3:a:oracle:jdk:1.6.0:update_34:*:*:*:*:*:*

cpe:2.3:a:oracle:jdk:*:update_35:*:*:*:*:*:* versions up to 1.6.0 (inclusive)

cpe:2.3:a:oracle:jre:1.6.0:update_22:*:*:*:*:*:*

cpe:2.3:a:oracle:jre:1.6.0:update_23:*:*:*:*:*:*

cpe:2.3:a:oracle:jre:1.6.0:update_24:*:*:*:*:*:*

cpe:2.3:a:oracle:jre:1.6.0:update_25:*:*:*:*:*:*

cpe:2.3:a:oracle:jre:1.6.0:update_26:*:*:*:*:*:*

cpe:2.3:a:oracle:jre:1.6.0:update_27:*:*:*:*:*:*

cpe:2.3:a:oracle:jre:1.6.0:update_29:*:*:*:*:*:*

cpe:2.3:a:oracle:jre:1.6.0:update_30:*:*:*:*:*:*

cpe:2.3:a:oracle:jre:1.6.0:update_31:*:*:*:*:*:*

cpe:2.3:a:oracle:jre:1.6.0:update_32:*:*:*:*:*:*

cpe:2.3:a:oracle:jre:1.6.0:update_33:*:*:*:*:*:*

cpe:2.3:a:oracle:jre:1.6.0:update_34:*:*:*:*:*:*

cpe:2.3:a:oracle:jre:*:update_35:*:*:*:*:*:* versions up to 1.6.0 (inclusive)

cpe:2.3:a:sun:jdk:1.6.0:update1:*:*:*:*:*:*

cpe:2.3:a:sun:jdk:1.6.0:update1_b06:*:*:*:*:*:*

cpe:2.3:a:sun:jdk:1.6.0:update2:*:*:*:*:*:*

cpe:2.3:a:sun:jdk:1.6.0:update_10:*:*:*:*:*:*

cpe:2.3:a:sun:jdk:1.6.0:update_11:*:*:*:*:*:*

cpe:2.3:a:sun:jdk:1.6.0:update_12:*:*:*:*:*:*

cpe:2.3:a:sun:jdk:1.6.0:update_13:*:*:*:*:*:*

cpe:2.3:a:sun:jdk:1.6.0:update_14:*:*:*:*:*:*

cpe:2.3:a:sun:jdk:1.6.0:update_15:*:*:*:*:*:*

cpe:2.3:a:sun:jdk:1.6.0:update_16:*:*:*:*:*:*

cpe:2.3:a:sun:jdk:1.6.0:update_17:*:*:*:*:*:*

cpe:2.3:a:sun:jdk:1.6.0:update_18:*:*:*:*:*:*

cpe:2.3:a:sun:jdk:1.6.0:update_19:*:*:*:*:*:*

cpe:2.3:a:sun:jdk:1.6.0:update_3:*:*:*:*:*:*

cpe:2.3:a:sun:jdk:1.6.0:update_4:*:*:*:*:*:*

cpe:2.3:a:sun:jdk:1.6.0:update_5:*:*:*:*:*:*

cpe:2.3:a:sun:jdk:1.6.0:update_6:*:*:*:*:*:*

cpe:2.3:a:sun:jdk:1.6.0:update_7:*:*:*:*:*:*

cpe:2.3:a:sun:jdk:1.6.0.200:update20:*:*:*:*:*:*

cpe:2.3:a:sun:jdk:1.6.0.210:update21:*:*:*:*:*:*

cpe:2.3:a:sun:jre:1.6.0:*:*:*:*:*:*:*

cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:*

cpe:2.3:a:sun:jre:1.6.0:update_10:*:*:*:*:*:*

cpe:2.3:a:sun:jre:1.6.0:update_11:*:*:*:*:*:*

cpe:2.3:a:sun:jre:1.6.0:update_12:*:*:*:*:*:*

cpe:2.3:a:sun:jre:1.6.0:update_13:*:*:*:*:*:*

cpe:2.3:a:sun:jre:1.6.0:update_14:*:*:*:*:*:*

cpe:2.3:a:sun:jre:1.6.0:update_15:*:*:*:*:*:*

cpe:2.3:a:sun:jre:1.6.0:update_16:*:*:*:*:*:*

cpe:2.3:a:sun:jre:1.6.0:update_17:*:*:*:*:*:*

cpe:2.3:a:sun:jre:1.6.0:update_18:*:*:*:*:*:*

cpe:2.3:a:sun:jre:1.6.0:update_19:*:*:*:*:*:*

cpe:2.3:a:sun:jre:1.6.0:update_2:*:*:*:*:*:*

cpe:2.3:a:sun:jre:1.6.0:update_20:*:*:*:*:*:*

cpe:2.3:a:sun:jre:1.6.0:update_21:*:*:*:*:*:*

cpe:2.3:a:sun:jre:1.6.0:update_3:*:*:*:*:*:*

cpe:2.3:a:sun:jre:1.6.0:update_4:*:*:*:*:*:*

cpe:2.3:a:sun:jre:1.6.0:update_5:*:*:*:*:*:*

cpe:2.3:a:sun:jre:1.6.0:update_6:*:*:*:*:*:*

cpe:2.3:a:sun:jre:1.6.0:update_7:*:*:*:*:*:*

Configuration 3

OR

cpe:2.3:a:oracle:jdk:*:update_36:*:*:*:*:*:* versions up to 1.5.0 (inclusive)

cpe:2.3:a:oracle:jre:*:update_36:*:*:*:*:*:* versions up to 1.5.0 (inclusive)

cpe:2.3:a:sun:jdk:1.5.0:*:*:*:*:*:*:*

cpe:2.3:a:sun:jdk:1.5.0:update1:*:*:*:*:*:*

cpe:2.3:a:sun:jdk:1.5.0:update10:*:*:*:*:*:*

cpe:2.3:a:sun:jdk:1.5.0:update11:*:*:*:*:*:*

cpe:2.3:a:sun:jdk:1.5.0:update11_b03:*:*:*:*:*:*

cpe:2.3:a:sun:jdk:1.5.0:update12:*:*:*:*:*:*

cpe:2.3:a:sun:jdk:1.5.0:update13:*:*:*:*:*:*

cpe:2.3:a:sun:jdk:1.5.0:update14:*:*:*:*:*:*

cpe:2.3:a:sun:jdk:1.5.0:update15:*:*:*:*:*:*

cpe:2.3:a:sun:jdk:1.5.0:update16:*:*:*:*:*:*

cpe:2.3:a:sun:jdk:1.5.0:update17:*:*:*:*:*:*

cpe:2.3:a:sun:jdk:1.5.0:update18:*:*:*:*:*:*

cpe:2.3:a:sun:jdk:1.5.0:update19:*:*:*:*:*:*

cpe:2.3:a:sun:jdk:1.5.0:update2:*:*:*:*:*:*

cpe:2.3:a:sun:jdk:1.5.0:update20:*:*:*:*:*:*

cpe:2.3:a:sun:jdk:1.5.0:update21:*:*:*:*:*:*

cpe:2.3:a:sun:jdk:1.5.0:update22:*:*:*:*:*:*

cpe:2.3:a:sun:jdk:1.5.0:update23:*:*:*:*:*:*

cpe:2.3:a:sun:jdk:1.5.0:update24:*:*:*:*:*:*

cpe:2.3:a:sun:jdk:1.5.0:update25:*:*:*:*:*:*

cpe:2.3:a:sun:jdk:1.5.0:update26:*:*:*:*:*:*

cpe:2.3:a:sun:jdk:1.5.0:update27:*:*:*:*:*:*

cpe:2.3:a:sun:jdk:1.5.0:update28:*:*:*:*:*:*

cpe:2.3:a:sun:jdk:1.5.0:update29:*:*:*:*:*:*

cpe:2.3:a:sun:jdk:1.5.0:update3:*:*:*:*:*:*

cpe:2.3:a:sun:jdk:1.5.0:update31:*:*:*:*:*:*

cpe:2.3:a:sun:jdk:1.5.0:update33:*:*:*:*:*:*

cpe:2.3:a:sun:jdk:1.5.0:update4:*:*:*:*:*:*

cpe:2.3:a:sun:jdk:1.5.0:update5:*:*:*:*:*:*

cpe:2.3:a:sun:jdk:1.5.0:update6:*:*:*:*:*:*

cpe:2.3:a:sun:jdk:1.5.0:update7:*:*:*:*:*:*

cpe:2.3:a:sun:jdk:1.5.0:update7_b03:*:*:*:*:*:*

cpe:2.3:a:sun:jdk:1.5.0:update8:*:*:*:*:*:*

cpe:2.3:a:sun:jdk:1.5.0:update9:*:*:*:*:*:*

cpe:2.3:a:sun:jre:1.5.0:*:*:*:*:*:*:*

cpe:2.3:a:sun:jre:1.5.0:update1:*:*:*:*:*:*

cpe:2.3:a:sun:jre:1.5.0:update10:*:*:*:*:*:*

cpe:2.3:a:sun:jre:1.5.0:update11:*:*:*:*:*:*

cpe:2.3:a:sun:jre:1.5.0:update12:*:*:*:*:*:*

cpe:2.3:a:sun:jre:1.5.0:update13:*:*:*:*:*:*

cpe:2.3:a:sun:jre:1.5.0:update14:*:*:*:*:*:*

cpe:2.3:a:sun:jre:1.5.0:update15:*:*:*:*:*:*

cpe:2.3:a:sun:jre:1.5.0:update16:*:*:*:*:*:*

cpe:2.3:a:sun:jre:1.5.0:update17:*:*:*:*:*:*

cpe:2.3:a:sun:jre:1.5.0:update18:*:*:*:*:*:*

cpe:2.3:a:sun:jre:1.5.0:update19:*:*:*:*:*:*

cpe:2.3:a:sun:jre:1.5.0:update2:*:*:*:*:*:*

cpe:2.3:a:sun:jre:1.5.0:update20:*:*:*:*:*:*

cpe:2.3:a:sun:jre:1.5.0:update21:*:*:*:*:*:*

cpe:2.3:a:sun:jre:1.5.0:update22:*:*:*:*:*:*

cpe:2.3:a:sun:jre:1.5.0:update23:*:*:*:*:*:*

cpe:2.3:a:sun:jre:1.5.0:update24:*:*:*:*:*:*

cpe:2.3:a:sun:jre:1.5.0:update25:*:*:*:*:*:*

cpe:2.3:a:sun:jre:1.5.0:update26:*:*:*:*:*:*

cpe:2.3:a:sun:jre:1.5.0:update27:*:*:*:*:*:*

cpe:2.3:a:sun:jre:1.5.0:update28:*:*:*:*:*:*

cpe:2.3:a:sun:jre:1.5.0:update29:*:*:*:*:*:*

cpe:2.3:a:sun:jre:1.5.0:update3:*:*:*:*:*:*

cpe:2.3:a:sun:jre:1.5.0:update31:*:*:*:*:*:*

cpe:2.3:a:sun:jre:1.5.0:update33:*:*:*:*:*:*

cpe:2.3:a:sun:jre:1.5.0:update4:*:*:*:*:*:*

cpe:2.3:a:sun:jre:1.5.0:update5:*:*:*:*:*:*

cpe:2.3:a:sun:jre:1.5.0:update6:*:*:*:*:*:*

cpe:2.3:a:sun:jre:1.5.0:update7:*:*:*:*:*:*

cpe:2.3:a:sun:jre:1.5.0:update8:*:*:*:*:*:*

cpe:2.3:a:sun:jre:1.5.0:update9:*:*:*:*:*:*

Configuration 4

OR

cpe:2.3:a:oracle:jdk:*:*:*:*:*:*:*:* versions up to 1.4.2_38 (inclusive)

cpe:2.3:a:oracle:jre:*:*:*:*:*:*:*:* versions up to 1.4.2_38 (inclusive)

cpe:2.3:a:sun:jdk:1.4.2:*:*:*:*:*:*:*

cpe:2.3:a:sun:jdk:1.4.2_1:*:*:*:*:*:*:*

cpe:2.3:a:sun:jdk:1.4.2_2:*:*:*:*:*:*:*

cpe:2.3:a:sun:jdk:1.4.2_3:*:*:*:*:*:*:*

cpe:2.3:a:sun:jdk:1.4.2_4:*:*:*:*:*:*:*

cpe:2.3:a:sun:jdk:1.4.2_5:*:*:*:*:*:*:*

cpe:2.3:a:sun:jdk:1.4.2_6:*:*:*:*:*:*:*

cpe:2.3:a:sun:jdk:1.4.2_7:*:*:*:*:*:*:*

cpe:2.3:a:sun:jdk:1.4.2_8:*:*:*:*:*:*:*

cpe:2.3:a:sun:jdk:1.4.2_9:*:*:*:*:*:*:*

cpe:2.3:a:sun:jdk:1.4.2_10:*:*:*:*:*:*:*

cpe:2.3:a:sun:jdk:1.4.2_11:*:*:*:*:*:*:*

cpe:2.3:a:sun:jdk:1.4.2_12:*:*:*:*:*:*:*

cpe:2.3:a:sun:jdk:1.4.2_13:*:*:*:*:*:*:*

cpe:2.3:a:sun:jdk:1.4.2_14:*:*:*:*:*:*:*

cpe:2.3:a:sun:jdk:1.4.2_15:*:*:*:*:*:*:*

cpe:2.3:a:sun:jdk:1.4.2_16:*:*:*:*:*:*:*

cpe:2.3:a:sun:jdk:1.4.2_17:*:*:*:*:*:*:*

cpe:2.3:a:sun:jdk:1.4.2_18:*:*:*:*:*:*:*

cpe:2.3:a:sun:jdk:1.4.2_19:*:*:*:*:*:*:*

cpe:2.3:a:sun:jdk:1.4.2_22:*:*:*:*:*:*:*

cpe:2.3:a:sun:jdk:1.4.2_23:*:*:*:*:*:*:*

cpe:2.3:a:sun:jdk:1.4.2_25:*:*:*:*:*:*:*

cpe:2.3:a:sun:jdk:1.4.2_26:*:*:*:*:*:*:*

cpe:2.3:a:sun:jdk:1.4.2_27:*:*:*:*:*:*:*

cpe:2.3:a:sun:jdk:1.4.2_28:*:*:*:*:*:*:*

cpe:2.3:a:sun:jdk:1.4.2_29:*:*:*:*:*:*:*

cpe:2.3:a:sun:jdk:1.4.2_30:*:*:*:*:*:*:*

cpe:2.3:a:sun:jdk:1.4.2_31:*:*:*:*:*:*:*

cpe:2.3:a:sun:jdk:1.4.2_32:*:*:*:*:*:*:*

cpe:2.3:a:sun:jdk:1.4.2_33:*:*:*:*:*:*:*

cpe:2.3:a:sun:jdk:1.4.2_34:*:*:*:*:*:*:*

cpe:2.3:a:sun:jdk:1.4.2_35:*:*:*:*:*:*:*

cpe:2.3:a:sun:jdk:1.4.2_36:*:*:*:*:*:*:*

cpe:2.3:a:sun:jdk:1.4.2_37:*:*:*:*:*:*:*

cpe:2.3:a:sun:jre:1.4.2_1:*:*:*:*:*:*:*

cpe:2.3:a:sun:jre:1.4.2_2:*:*:*:*:*:*:*

cpe:2.3:a:sun:jre:1.4.2_3:*:*:*:*:*:*:*

cpe:2.3:a:sun:jre:1.4.2_4:*:*:*:*:*:*:*

cpe:2.3:a:sun:jre:1.4.2_5:*:*:*:*:*:*:*

cpe:2.3:a:sun:jre:1.4.2_6:*:*:*:*:*:*:*

cpe:2.3:a:sun:jre:1.4.2_7:*:*:*:*:*:*:*

cpe:2.3:a:sun:jre:1.4.2_8:*:*:*:*:*:*:*

cpe:2.3:a:sun:jre:1.4.2_9:*:*:*:*:*:*:*

cpe:2.3:a:sun:jre:1.4.2_10:*:*:*:*:*:*:*

cpe:2.3:a:sun:jre:1.4.2_11:*:*:*:*:*:*:*

cpe:2.3:a:sun:jre:1.4.2_12:*:*:*:*:*:*:*

cpe:2.3:a:sun:jre:1.4.2_13:*:*:*:*:*:*:*

cpe:2.3:a:sun:jre:1.4.2_14:*:*:*:*:*:*:*

cpe:2.3:a:sun:jre:1.4.2_15:*:*:*:*:*:*:*

cpe:2.3:a:sun:jre:1.4.2_16:*:*:*:*:*:*:*

cpe:2.3:a:sun:jre:1.4.2_17:*:*:*:*:*:*:*

cpe:2.3:a:sun:jre:1.4.2_18:*:*:*:*:*:*:*

cpe:2.3:a:sun:jre:1.4.2_19:*:*:*:*:*:*:*

cpe:2.3:a:sun:jre:1.4.2_20:*:*:*:*:*:*:*

cpe:2.3:a:sun:jre:1.4.2_21:*:*:*:*:*:*:*

cpe:2.3:a:sun:jre:1.4.2_22:*:*:*:*:*:*:*

cpe:2.3:a:sun:jre:1.4.2_23:*:*:*:*:*:*:*

cpe:2.3:a:sun:jre:1.4.2_24:*:*:*:*:*:*:*

cpe:2.3:a:sun:jre:1.4.2_25:*:*:*:*:*:*:*

cpe:2.3:a:sun:jre:1.4.2_26:*:*:*:*:*:*:*

cpe:2.3:a:sun:jre:1.4.2_27:*:*:*:*:*:*:*

cpe:2.3:a:sun:jre:1.4.2_28:*:*:*:*:*:*:*

cpe:2.3:a:sun:jre:1.4.2_29:*:*:*:*:*:*:*

cpe:2.3:a:sun:jre:1.4.2_30:*:*:*:*:*:*:*

cpe:2.3:a:sun:jre:1.4.2_31:*:*:*:*:*:*:*

cpe:2.3:a:sun:jre:1.4.2_32:*:*:*:*:*:*:*

cpe:2.3:a:sun:jre:1.4.2_33:*:*:*:*:*:*:*

cpe:2.3:a:sun:jre:1.4.2_34:*:*:*:*:*:*:*

cpe:2.3:a:sun:jre:1.4.2_35:*:*:*:*:*:*:*

cpe:2.3:a:sun:jre:1.4.2_36:*:*:*:*:*:*:*

cpe:2.3:a:sun:jre:1.4.2_37:*:*:*:*:*:*:*

Tenable Plugins

View all (45 total)

IDNameProductFamilySeverity
89663VMware ESX / ESXi NFC and Third-Party Libraries Multiple Vulnerabilities (VMSA-2013-0003) (remote check)NessusMisc.
critical
83568SUSE SLES10 / SLES11 Security Update : IBM Java 1.4.2 (SUSE-SU-2012:1490-1)NessusSuSE Local Security Checks
critical
83567SUSE SLES11 Security Update : IBM Java 1.7.0 (SUSE-SU-2012:1489-2)NessusSuSE Local Security Checks
critical
83566SUSE SLED10 / SLES10 Security Update : IBM Java 1.5.0 (SUSE-SU-2012:1489-1)NessusSuSE Local Security Checks
critical
78976RHEL 5 / 6 : IBM Java Runtime in Satellite Server (RHSA-2013:1456) (ROBOT)NessusRed Hat Local Security Checks
critical
78975RHEL 5 / 6 : IBM Java Runtime in Satellite Server (RHSA-2013:1455) (BEAST) (ROBOT)NessusRed Hat Local Security Checks
critical
76303GLSA-201406-32 : IcedTea JDK: Multiple vulnerabilities (BEAST) (ROBOT)NessusGentoo Local Security Checks
critical
74800openSUSE Security Update : java-1_6_0-openjdk (openSUSE-SU-2012:1424-1) (ROBOT)NessusSuSE Local Security Checks
critical
74799openSUSE Security Update : java-1_6_0-openjdk (openSUSE-SU-2012:1423-1) (ROBOT)NessusSuSE Local Security Checks
critical
74793openSUSE Security Update : java-1_7_0-openjdk (openSUSE-SU-2012:1419-1) (ROBOT)NessusSuSE Local Security Checks
critical
72139GLSA-201401-30 : Oracle JRE/JDK: Multiple vulnerabilities (ROBOT)NessusGentoo Local Security Checks
critical
69627Amazon Linux AMI : java-1.7.0-openjdk (ALAS-2012-137) (ROBOT)NessusAmazon Linux Local Security Checks
critical
69626Amazon Linux AMI : java-1.6.0-openjdk (ALAS-2012-136) (ROBOT)NessusAmazon Linux Local Security Checks
critical
68646Oracle Linux 6 : java-1.7.0-openjdk (ELSA-2012-1386) (ROBOT)NessusOracle Linux Local Security Checks
critical
68645Oracle Linux 5 : java-1.6.0-openjdk (ELSA-2012-1385) (ROBOT)NessusOracle Linux Local Security Checks
critical
68644Oracle Linux 6 : java-1.6.0-openjdk (ELSA-2012-1384) (ROBOT)NessusOracle Linux Local Security Checks
critical
64849Oracle Java SE Multiple Vulnerabilities (October 2012 CPU) (Unix)NessusMisc.
critical
64171SuSE 11.2 Security Update : IBM Java 1.7.0 (SAT Patch Number 7046)NessusSuSE Local Security Checks
critical
64169SuSE 11.2 Security Update : OpenJDK (SAT Patch Number 6987)NessusSuSE Local Security Checks
critical
64166SuSE 11.2 Security Update : IBM Java 1.6.0 (SAT Patch Number 7095)NessusSuSE Local Security Checks
critical
64163SuSE 11.2 Security Update : IBM Java 1.4.2 (SAT Patch Number 7043)NessusSuSE Local Security Checks
critical
64063RHEL 5 : java-1.4.2-ibm (RHSA-2012:1485) (ROBOT)NessusRed Hat Local Security Checks
critical
63092SuSE 10 Security Update : IBM Java 1.6.0 (ZYPP Patch Number 8383) (ROBOT)NessusSuSE Local Security Checks
critical
62962SuSE 10 Security Update : IBM Java 1.5.0 (ZYPP Patch Number 8362) (ROBOT)NessusSuSE Local Security Checks
critical
62961SuSE 10 Security Update : IBM Java 1.4.2 (ZYPP Patch Number 8366) (ROBOT)NessusSuSE Local Security Checks
critical
62932RHEL 6 : java-1.7.0-ibm (RHSA-2012:1467) (ROBOT)NessusRed Hat Local Security Checks
critical
62931RHEL 5 / 6 : java-1.6.0-ibm (RHSA-2012:1466) (ROBOT)NessusRed Hat Local Security Checks
critical
62930RHEL 5 / 6 : java-1.5.0-ibm (RHSA-2012:1465) (ROBOT)NessusRed Hat Local Security Checks
critical
62794Mandriva Linux Security Advisory : java-1.6.0-openjdk (MDVSA-2012:169)NessusMandriva Local Security Checks
critical
62773Scientific Linux Security Update : java-1.6.0-sun on SL5.x i386/x86_64 (20121018) (ROBOT)NessusScientific Linux Local Security Checks
critical
62709Ubuntu 10.04 LTS / 11.04 / 11.10 / 12.04 LTS / 12.10 : openjdk-6, openjdk-7 vulnerabilities (USN-1619-1) (ROBOT)NessusUbuntu Local Security Checks
critical
62653Scientific Linux Security Update : java-1.7.0-openjdk on SL6.x i386/x86_64 (20121017) (ROBOT)NessusScientific Linux Local Security Checks
critical
62636RHEL 5 / 6 : java-1.6.0-sun (RHSA-2012:1392)NessusRed Hat Local Security Checks
critical
62635RHEL 6 : java-1.7.0-oracle (RHSA-2012:1391)NessusRed Hat Local Security Checks
critical
62630CentOS 5 : java-1.6.0-openjdk (CESA-2012:1385) (ROBOT)NessusCentOS Local Security Checks
critical
62618Scientific Linux Security Update : java-1.6.0-openjdk on SL6.x i386/x86_64 (20121017) (ROBOT)NessusScientific Linux Local Security Checks
critical
62617Scientific Linux Security Update : java-1.6.0-openjdk on SL5.x i386/x86_64 (20121017) (ROBOT)NessusScientific Linux Local Security Checks
critical
62615RHEL 6 : java-1.7.0-openjdk (RHSA-2012:1386) (ROBOT)NessusRed Hat Local Security Checks
critical
62614RHEL 5 : java-1.6.0-openjdk (RHSA-2012:1385) (ROBOT)NessusRed Hat Local Security Checks
critical
62613RHEL 6 : java-1.6.0-openjdk (RHSA-2012:1384) (ROBOT)NessusRed Hat Local Security Checks
critical
62598CentOS 6 : java-1.7.0-openjdk (CESA-2012:1386) (ROBOT)NessusCentOS Local Security Checks
critical
62597CentOS 6 : java-1.6.0-openjdk (CESA-2012:1384) (ROBOT)NessusCentOS Local Security Checks
critical
62595Mac OS X : Java for OS X 2012-006NessusMacOS X Local Security Checks
critical
62594Mac OS X : Java for Mac OS X 10.6 Update 11NessusMacOS X Local Security Checks
critical
62593Oracle Java SE Multiple Vulnerabilities (October 2012 CPU)NessusWindows
critical