gsd-2013-2465
Vulnerability from gsd
Modified
2023-12-13 01:22
Details
Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to "Incorrect image channel verification" in 2D.
Aliases
Aliases



{
  "GSD": {
    "alias": "CVE-2013-2465",
    "description": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to \"Incorrect image channel verification\" in 2D.",
    "id": "GSD-2013-2465",
    "references": [
      "https://www.suse.com/security/cve/CVE-2013-2465.html",
      "https://www.debian.org/security/2013/dsa-2727",
      "https://www.debian.org/security/2013/dsa-2722",
      "https://access.redhat.com/errata/RHSA-2014:0414",
      "https://access.redhat.com/errata/RHSA-2013:1456",
      "https://access.redhat.com/errata/RHSA-2013:1455",
      "https://access.redhat.com/errata/RHSA-2013:1081",
      "https://access.redhat.com/errata/RHSA-2013:1060",
      "https://access.redhat.com/errata/RHSA-2013:1059",
      "https://access.redhat.com/errata/RHSA-2013:1014",
      "https://access.redhat.com/errata/RHSA-2013:0963",
      "https://access.redhat.com/errata/RHSA-2013:0958",
      "https://access.redhat.com/errata/RHSA-2013:0957",
      "https://advisories.mageia.org/CVE-2013-2465.html",
      "https://alas.aws.amazon.com/cve/html/CVE-2013-2465.html",
      "https://linux.oracle.com/cve/CVE-2013-2465.html",
      "https://packetstormsecurity.com/files/cve/CVE-2013-2465"
    ]
  },
  "gsd": {
    "metadata": {
      "exploitCode": "unknown",
      "remediation": "unknown",
      "reportConfidence": "confirmed",
      "type": "vulnerability"
    },
    "osvSchema": {
      "aliases": [
        "CVE-2013-2465"
      ],
      "details": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to \"Incorrect image channel verification\" in 2D.",
      "id": "GSD-2013-2465",
      "modified": "2023-12-13T01:22:17.740733Z",
      "schema_version": "1.4.0"
    }
  },
  "namespaces": {
    "cisa.gov": {
      "cveID": "CVE-2013-2465",
      "dateAdded": "2022-03-28",
      "dueDate": "2022-04-18",
      "product": "Java SE",
      "requiredAction": "Apply updates per vendor instructions.",
      "shortDescription": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D",
      "vendorProject": "Oracle",
      "vulnerabilityName": "Oracle Java SE Unspecified Vulnerability"
    },
    "cve.org": {
      "CVE_data_meta": {
        "ASSIGNER": "secalert_us@oracle.com",
        "ID": "CVE-2013-2465",
        "STATE": "PUBLIC"
      },
      "affects": {
        "vendor": {
          "vendor_data": [
            {
              "product": {
                "product_data": [
                  {
                    "product_name": "n/a",
                    "version": {
                      "version_data": [
                        {
                          "version_value": "n/a"
                        }
                      ]
                    }
                  }
                ]
              },
              "vendor_name": "n/a"
            }
          ]
        }
      },
      "data_format": "MITRE",
      "data_type": "CVE",
      "data_version": "4.0",
      "description": {
        "description_data": [
          {
            "lang": "eng",
            "value": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to \"Incorrect image channel verification\" in 2D."
          }
        ]
      },
      "problemtype": {
        "problemtype_data": [
          {
            "description": [
              {
                "lang": "eng",
                "value": "n/a"
              }
            ]
          }
        ]
      },
      "references": {
        "reference_data": [
          {
            "name": "RHSA-2013:1060",
            "refsource": "REDHAT",
            "url": "http://rhn.redhat.com/errata/RHSA-2013-1060.html"
          },
          {
            "name": "HPSBUX02908",
            "refsource": "HP",
            "url": "http://marc.info/?l=bugtraq\u0026m=137545592101387\u0026w=2"
          },
          {
            "name": "RHSA-2014:0414",
            "refsource": "REDHAT",
            "url": "https://access.redhat.com/errata/RHSA-2014:0414"
          },
          {
            "name": "GLSA-201406-32",
            "refsource": "GENTOO",
            "url": "http://security.gentoo.org/glsa/glsa-201406-32.xml"
          },
          {
            "name": "60657",
            "refsource": "BID",
            "url": "http://www.securityfocus.com/bid/60657"
          },
          {
            "name": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html",
            "refsource": "CONFIRM",
            "url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html"
          },
          {
            "name": "SUSE-SU-2013:1264",
            "refsource": "SUSE",
            "url": "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00031.html"
          },
          {
            "name": "SUSE-SU-2013:1257",
            "refsource": "SUSE",
            "url": "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00028.html"
          },
          {
            "name": "HPSBUX02907",
            "refsource": "HP",
            "url": "http://marc.info/?l=bugtraq\u0026m=137545505800971\u0026w=2"
          },
          {
            "name": "SUSE-SU-2013:1256",
            "refsource": "SUSE",
            "url": "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00027.html"
          },
          {
            "name": "54154",
            "refsource": "SECUNIA",
            "url": "http://secunia.com/advisories/54154"
          },
          {
            "name": "RHSA-2013:1455",
            "refsource": "REDHAT",
            "url": "http://rhn.redhat.com/errata/RHSA-2013-1455.html"
          },
          {
            "name": "SSRT101305",
            "refsource": "HP",
            "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03898880"
          },
          {
            "name": "oval:org.mitre.oval:def:19455",
            "refsource": "OVAL",
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19455"
          },
          {
            "name": "oval:org.mitre.oval:def:19703",
            "refsource": "OVAL",
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19703"
          },
          {
            "name": "HPSBUX02922",
            "refsource": "HP",
            "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03898880"
          },
          {
            "name": "http://hg.openjdk.java.net/jdk7u/jdk7u-dev/jdk/rev/2a9c79db0040",
            "refsource": "MISC",
            "url": "http://hg.openjdk.java.net/jdk7u/jdk7u-dev/jdk/rev/2a9c79db0040"
          },
          {
            "name": "oval:org.mitre.oval:def:19074",
            "refsource": "OVAL",
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19074"
          },
          {
            "name": "SUSE-SU-2013:1263",
            "refsource": "SUSE",
            "url": "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00029.html"
          },
          {
            "name": "RHSA-2013:1059",
            "refsource": "REDHAT",
            "url": "http://rhn.redhat.com/errata/RHSA-2013-1059.html"
          },
          {
            "name": "SUSE-SU-2013:1293",
            "refsource": "SUSE",
            "url": "http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00000.html"
          },
          {
            "name": "oval:org.mitre.oval:def:17106",
            "refsource": "OVAL",
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17106"
          },
          {
            "name": "RHSA-2013:1081",
            "refsource": "REDHAT",
            "url": "http://rhn.redhat.com/errata/RHSA-2013-1081.html"
          },
          {
            "name": "TA13-169A",
            "refsource": "CERT",
            "url": "http://www.us-cert.gov/ncas/alerts/TA13-169A"
          },
          {
            "name": "http://advisories.mageia.org/MGASA-2013-0185.html",
            "refsource": "CONFIRM",
            "url": "http://advisories.mageia.org/MGASA-2013-0185.html"
          },
          {
            "name": "RHSA-2013:0963",
            "refsource": "REDHAT",
            "url": "http://rhn.redhat.com/errata/RHSA-2013-0963.html"
          },
          {
            "name": "SUSE-SU-2013:1255",
            "refsource": "SUSE",
            "url": "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00026.html"
          },
          {
            "name": "https://bugzilla.redhat.com/show_bug.cgi?id=975118",
            "refsource": "CONFIRM",
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975118"
          },
          {
            "name": "RHSA-2013:1456",
            "refsource": "REDHAT",
            "url": "http://rhn.redhat.com/errata/RHSA-2013-1456.html"
          },
          {
            "name": "MDVSA-2013:183",
            "refsource": "MANDRIVA",
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:183"
          },
          {
            "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21642336",
            "refsource": "CONFIRM",
            "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21642336"
          },
          {
            "name": "SUSE-SU-2013:1305",
            "refsource": "SUSE",
            "url": "http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00003.html"
          }
        ]
      }
    },
    "nvd.nist.gov": {
      "cve": {
        "cisaActionDue": "2022-04-18",
        "cisaExploitAdd": "2022-03-28",
        "cisaRequiredAction": "Apply updates per vendor instructions.",
        "cisaVulnerabilityName": "Oracle Java SE Unspecified Vulnerability",
        "configurations": [
          {
            "nodes": [
              {
                "cpeMatch": [
                  {
                    "criteria": "cpe:2.3:a:oracle:jre:1.7.0:-:*:*:*:*:*:*",
                    "matchCriteriaId": "DFAA351A-93CD-46A8-A480-CE2783CCD620",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:jre:1.7.0:update1:*:*:*:*:*:*",
                    "matchCriteriaId": "F4B153FD-E20B-4909-8B10-884E48F5B590",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:jre:1.7.0:update10:*:*:*:*:*:*",
                    "matchCriteriaId": "F21933FB-A27C-4AF3-9811-2DE28484A5A6",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:jre:1.7.0:update11:*:*:*:*:*:*",
                    "matchCriteriaId": "B2B20041-EB5D-4FA4-AC7D-C35E7878BCFD",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:jre:1.7.0:update13:*:*:*:*:*:*",
                    "matchCriteriaId": "F3C3C9C7-73AE-4B1D-AA85-C7F5330A4DE6",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:jre:1.7.0:update15:*:*:*:*:*:*",
                    "matchCriteriaId": "1D8BB8D7-D5EC-42D6-BEAA-CB03D1D6513E",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:jre:1.7.0:update17:*:*:*:*:*:*",
                    "matchCriteriaId": "37B5B98B-0E41-4397-8AB0-C18C6F10AED1",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:jre:1.7.0:update2:*:*:*:*:*:*",
                    "matchCriteriaId": "CB106FA9-26CE-48C5-AEA5-FD1A5454AEE2",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:jre:1.7.0:update21:*:*:*:*:*:*",
                    "matchCriteriaId": "4FF6C211-AD55-40FE-9130-77164E586F62",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:jre:1.7.0:update3:*:*:*:*:*:*",
                    "matchCriteriaId": "5831D70B-3854-4CB8-B88D-40F1743DAEE0",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:jre:1.7.0:update4:*:*:*:*:*:*",
                    "matchCriteriaId": "EEB101C9-CA38-4421-BC0C-C1AD47AA2CC9",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:jre:1.7.0:update5:*:*:*:*:*:*",
                    "matchCriteriaId": "BA302DF3-ABBB-4262-B206-4C0F7B5B1E91",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:jre:1.7.0:update6:*:*:*:*:*:*",
                    "matchCriteriaId": "F9A8EBCB-5E6A-42F0-8D07-F3A3D1C850F0",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:jre:1.7.0:update7:*:*:*:*:*:*",
                    "matchCriteriaId": "0CD8A54E-185B-4D34-82EF-C0C05739EC12",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:jre:1.7.0:update9:*:*:*:*:*:*",
                    "matchCriteriaId": "4FFC7F0D-1F32-4235-8359-277CE41382DF",
                    "vulnerable": true
                  }
                ],
                "negate": false,
                "operator": "OR"
              }
            ]
          },
          {
            "nodes": [
              {
                "cpeMatch": [
                  {
                    "criteria": "cpe:2.3:a:oracle:jre:1.6.0:-:*:*:*:*:*:*",
                    "matchCriteriaId": "EB864346-1429-46B5-A91E-A1126C486421",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:jre:1.6.0:update22:*:*:*:*:*:*",
                    "matchCriteriaId": "EF13B96D-1F80-4672-8DA3-F86F6D3BF070",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:jre:1.6.0:update23:*:*:*:*:*:*",
                    "matchCriteriaId": "D1A2D440-D966-41A6-955D-38B28DDE0FDB",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:jre:1.6.0:update24:*:*:*:*:*:*",
                    "matchCriteriaId": "B1C57774-AD93-4162-8E45-92B09139C808",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:jre:1.6.0:update25:*:*:*:*:*:*",
                    "matchCriteriaId": "CD7C4194-D34A-418F-9B00-5C6012844AAE",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:jre:1.6.0:update26:*:*:*:*:*:*",
                    "matchCriteriaId": "DAF7D86B-1B4D-4E1F-9EF0-DA7E419D7E99",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:jre:1.6.0:update27:*:*:*:*:*:*",
                    "matchCriteriaId": "F0B82FB1-0F0E-44F9-87AE-628517279E4D",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:jre:1.6.0:update29:*:*:*:*:*:*",
                    "matchCriteriaId": "A0A67640-2F4A-488A-9D8F-3FE1F4DA8DEF",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:jre:1.6.0:update30:*:*:*:*:*:*",
                    "matchCriteriaId": "0D60D98D-4363-44A0-AAB4-B61BA623EE21",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:jre:1.6.0:update31:*:*:*:*:*:*",
                    "matchCriteriaId": "23CDA4F0-C32B-4B08-A377-7D4426C2F569",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:jre:1.6.0:update32:*:*:*:*:*:*",
                    "matchCriteriaId": "8E76476E-4120-46A9-90A8-A95FE89636CD",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:jre:1.6.0:update33:*:*:*:*:*:*",
                    "matchCriteriaId": "97A84689-0CED-404F-8DC3-708BEB37D2CE",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:jre:1.6.0:update34:*:*:*:*:*:*",
                    "matchCriteriaId": "738EC3E5-A4EB-47FE-9C9A-7C8E8C669765",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:jre:1.6.0:update35:*:*:*:*:*:*",
                    "matchCriteriaId": "FF56E0D9-612D-4215-9C76-560AE0661A05",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:jre:1.6.0:update37:*:*:*:*:*:*",
                    "matchCriteriaId": "BA717604-4BB0-4968-B258-7C9F884016FF",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:jre:1.6.0:update38:*:*:*:*:*:*",
                    "matchCriteriaId": "AA71FCF4-580F-432D-AADC-65A2A92CEBC8",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:jre:1.6.0:update39:*:*:*:*:*:*",
                    "matchCriteriaId": "F1E1A8F3-5A63-401E-9BDA-ACCA30FF6AC8",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:jre:1.6.0:update41:*:*:*:*:*:*",
                    "matchCriteriaId": "5C91517E-4C81-4D09-9FCB-B7AC769C7107",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:jre:1.6.0:update43:*:*:*:*:*:*",
                    "matchCriteriaId": "8B276B96-66BE-4C09-BE9F-11FA7461CBDF",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:jre:1.6.0:update45:*:*:*:*:*:*",
                    "matchCriteriaId": "626E11CA-20EE-4AB0-84D7-8DAE7A9D8960",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:*",
                    "matchCriteriaId": "09027C19-D442-446F-B7A8-21DB6787CF43",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_10:*:*:*:*:*:*",
                    "matchCriteriaId": "0A0FEC28-0707-4F42-9740-78F3D2D551EE",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_11:*:*:*:*:*:*",
                    "matchCriteriaId": "C3C5879A-A608-4230-9DC1-C27F0F48A13B",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_12:*:*:*:*:*:*",
                    "matchCriteriaId": "0C71089A-BDDE-41FC-9DF9-9AEF4C2374DF",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_13:*:*:*:*:*:*",
                    "matchCriteriaId": "2DBB6B73-8D6B-41FF-BEE0-E0C7F5F1EB41",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_14:*:*:*:*:*:*",
                    "matchCriteriaId": "12A3B254-8580-45DB-BDE4-5B5A29CBFFB3",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_15:*:*:*:*:*:*",
                    "matchCriteriaId": "1DB1DE6A-66AE-499B-AD92-9E6ACE474C6D",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_16:*:*:*:*:*:*",
                    "matchCriteriaId": "AADBB4F9-E43E-428B-9979-F47A15696C85",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_17:*:*:*:*:*:*",
                    "matchCriteriaId": "49260B94-05DE-4B78-9068-6F5F6BFDD19E",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_18:*:*:*:*:*:*",
                    "matchCriteriaId": "C4FDE9EB-08FE-436E-A265-30E83B15DB23",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_19:*:*:*:*:*:*",
                    "matchCriteriaId": "BE409D5C-8F9F-4DE9-ACB7-0E0B813F6399",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_20:*:*:*:*:*:*",
                    "matchCriteriaId": "B08C075B-9FC0-4381-A9E4-FFF0362BD308",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_21:*:*:*:*:*:*",
                    "matchCriteriaId": "F587E635-3A15-4186-B6A1-F99BE0A56820",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_3:*:*:*:*:*:*",
                    "matchCriteriaId": "90EC6C13-4B37-48E5-8199-A702A944D5A6",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_4:*:*:*:*:*:*",
                    "matchCriteriaId": "2528152C-E20A-4D97-931C-A5EC3CEAA06D",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_5:*:*:*:*:*:*",
                    "matchCriteriaId": "A99DAB4C-272B-4C91-BC70-7729E1152590",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_6:*:*:*:*:*:*",
                    "matchCriteriaId": "30DFC10A-A4D9-4F89-B17C-AB9260087D29",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_7:*:*:*:*:*:*",
                    "matchCriteriaId": "272A5C44-18EC-41A9-8233-E9D4D0734EA6",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_9:*:*:*:*:*:*",
                    "matchCriteriaId": "81C2C04D-D4BA-4C87-9609-C53AA63BFF19",
                    "vulnerable": true
                  }
                ],
                "negate": false,
                "operator": "OR"
              }
            ]
          },
          {
            "nodes": [
              {
                "cpeMatch": [
                  {
                    "criteria": "cpe:2.3:a:oracle:jre:1.5.0:-:*:*:*:*:*:*",
                    "matchCriteriaId": "D8730889-A618-4CF9-888C-BF95802DD00F",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:jre:1.5.0:update36:*:*:*:*:*:*",
                    "matchCriteriaId": "CC062AE6-515B-4D40-9B86-46F7A1D7FF1C",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:jre:1.5.0:update38:*:*:*:*:*:*",
                    "matchCriteriaId": "B4A2D725-A7DC-4802-A377-5C3963AD9941",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:jre:1.5.0:update39:*:*:*:*:*:*",
                    "matchCriteriaId": "A47E0A76-D6A3-445E-84C8-038497655BBC",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:jre:1.5.0:update40:*:*:*:*:*:*",
                    "matchCriteriaId": "A3C6E1D8-B96E-40FB-9E66-9B3A5325E78B",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:jre:1.5.0:update41:*:*:*:*:*:*",
                    "matchCriteriaId": "F08A5AAD-84CA-491F-83D3-CEFFD16212E0",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:jre:1.5.0:update45:*:*:*:*:*:*",
                    "matchCriteriaId": "A13547EA-EF77-493A-A863-F09E2AEE8BD4",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:sun:jre:1.5.0:update1:*:*:*:*:*:*",
                    "matchCriteriaId": "A7FC09E8-7F30-4FE4-912E-588AA250E2A3",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:sun:jre:1.5.0:update10:*:*:*:*:*:*",
                    "matchCriteriaId": "A586DE4E-8A46-41DE-9FDB-5FDB81DCC87B",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:sun:jre:1.5.0:update11:*:*:*:*:*:*",
                    "matchCriteriaId": "9919D091-73D7-465A-80FF-F37D6CAF9F46",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:sun:jre:1.5.0:update12:*:*:*:*:*:*",
                    "matchCriteriaId": "02565D6F-4CB2-4671-A4EF-3169BCFA6154",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:sun:jre:1.5.0:update13:*:*:*:*:*:*",
                    "matchCriteriaId": "452A3E51-9EAC-451D-BA04-A1E7B7D917EB",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:sun:jre:1.5.0:update14:*:*:*:*:*:*",
                    "matchCriteriaId": "3E8C6AAC-C90B-4220-A69B-2A886A35CF5D",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:sun:jre:1.5.0:update15:*:*:*:*:*:*",
                    "matchCriteriaId": "55231B6B-9298-4363-9B5A-14C2DA7B1F50",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:sun:jre:1.5.0:update16:*:*:*:*:*:*",
                    "matchCriteriaId": "E42CF0F7-418C-4BB6-9B73-FA3B9171D092",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:sun:jre:1.5.0:update17:*:*:*:*:*:*",
                    "matchCriteriaId": "A5467E9D-07D8-4BEB-84D5-A3136C133519",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:sun:jre:1.5.0:update18:*:*:*:*:*:*",
                    "matchCriteriaId": "B83B2CE1-45D7-47AD-BC0A-6EC74D5F8F5A",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:sun:jre:1.5.0:update19:*:*:*:*:*:*",
                    "matchCriteriaId": "8A32F326-EA92-43CD-930E-E527B60CDD3B",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:sun:jre:1.5.0:update2:*:*:*:*:*:*",
                    "matchCriteriaId": "7EA5B9E9-654D-44F7-AE98-3D8B382804AC",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:sun:jre:1.5.0:update20:*:*:*:*:*:*",
                    "matchCriteriaId": "04344167-530E-4A4D-90EF-74C684943DF1",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:sun:jre:1.5.0:update21:*:*:*:*:*:*",
                    "matchCriteriaId": "B0E0373B-201D-408F-9234-A7EFE8B4970D",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:sun:jre:1.5.0:update22:*:*:*:*:*:*",
                    "matchCriteriaId": "15EAD76D-D5D0-4984-9D07-C1451D791083",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:sun:jre:1.5.0:update23:*:*:*:*:*:*",
                    "matchCriteriaId": "DE949EBF-2BC0-4355-8B28-B494023D45FE",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:sun:jre:1.5.0:update24:*:*:*:*:*:*",
                    "matchCriteriaId": "7E0A0A2D-62B9-4A00-84EF-90C15E47A632",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:sun:jre:1.5.0:update25:*:*:*:*:*:*",
                    "matchCriteriaId": "A070A282-CBD6-4041-B149-5E310BD12E7B",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:sun:jre:1.5.0:update26:*:*:*:*:*:*",
                    "matchCriteriaId": "3ECAE71B-C549-4EFB-A509-BFD599F5917A",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:sun:jre:1.5.0:update27:*:*:*:*:*:*",
                    "matchCriteriaId": "044BADDD-A80B-4AE2-8595-5F8186314550",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:sun:jre:1.5.0:update28:*:*:*:*:*:*",
                    "matchCriteriaId": "B7FC11BE-8CF7-4D45-BB4A-3EFA1DDBB10D",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:sun:jre:1.5.0:update29:*:*:*:*:*:*",
                    "matchCriteriaId": "1D75C40D-62AE-47F2-A6E0-53F3495260BD",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:sun:jre:1.5.0:update3:*:*:*:*:*:*",
                    "matchCriteriaId": "44051CFE-D15D-4416-A123-F3E49C67A9E7",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:sun:jre:1.5.0:update31:*:*:*:*:*:*",
                    "matchCriteriaId": "4C061911-FB19-45EB-8E88-7450224F4023",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:sun:jre:1.5.0:update33:*:*:*:*:*:*",
                    "matchCriteriaId": "0E8009BC-F5A8-4D00-9F5F-8635475C6065",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:sun:jre:1.5.0:update4:*:*:*:*:*:*",
                    "matchCriteriaId": "F296ACF3-1373-429D-B991-8B5BA704A7EF",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:sun:jre:1.5.0:update5:*:*:*:*:*:*",
                    "matchCriteriaId": "B863420B-DE16-416A-9640-1A1340A9B855",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:sun:jre:1.5.0:update6:*:*:*:*:*:*",
                    "matchCriteriaId": "724C972F-74FE-4044-BBC4-7E0E61FC9002",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:sun:jre:1.5.0:update7:*:*:*:*:*:*",
                    "matchCriteriaId": "46F41C15-0EF4-4115-BFAA-EEAD56FAEEDB",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:sun:jre:1.5.0:update8:*:*:*:*:*:*",
                    "matchCriteriaId": "EBE909DE-E55A-4BD3-A5BF-ADE407432193",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:sun:jre:1.5.0:update9:*:*:*:*:*:*",
                    "matchCriteriaId": "5DAC04D2-68FD-4793-A8E7-4690A543D7D4",
                    "vulnerable": true
                  }
                ],
                "negate": false,
                "operator": "OR"
              }
            ]
          },
          {
            "nodes": [
              {
                "cpeMatch": [
                  {
                    "criteria": "cpe:2.3:o:suse:linux_enterprise_desktop:10:sp4:*:*:-:*:*:*",
                    "matchCriteriaId": "4339DE06-19FB-4B8E-B6AE-3495F605AD05",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:suse:linux_enterprise_java:10:sp4:*:*:*:*:*:*",
                    "matchCriteriaId": "3CF5C5B9-2CB9-4CD8-B94F-A674ED909CC3",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:suse:linux_enterprise_java:11:sp2:*:*:*:*:*:*",
                    "matchCriteriaId": "252CF7A7-3FEB-4503-AEE8-B67139C5B0D5",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:suse:linux_enterprise_java:11:sp3:*:*:*:*:*:*",
                    "matchCriteriaId": "79D7DBBA-6849-45F7-AFEF-C765569C481A",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:ltss:*:*:*",
                    "matchCriteriaId": "CED02712-1031-4206-AC4D-E68710F46EC9",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:-:*:*:*",
                    "matchCriteriaId": "D1D7B467-58DD-45F1-9F1F-632620DF072A",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:-:*:*",
                    "matchCriteriaId": "88D6E858-FD8F-4C55-B7D5-CEEDA2BBA898",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:vmware:*:*",
                    "matchCriteriaId": "DB4D6749-81A1-41D7-BF4F-1C45A7F49A22",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:-:*:*",
                    "matchCriteriaId": "E534C201-BCC5-473C-AAA7-AAB97CEB5437",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*",
                    "matchCriteriaId": "2470C6E8-2024-4CF5-9982-CFF50E88EAE9",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp2:*:*:*:*:*:*",
                    "matchCriteriaId": "5AA37837-3083-4DC7-94F4-54FD5D7CB53C",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp3:*:*:*:*:*:*",
                    "matchCriteriaId": "2F7F8866-DEAD-44D1-AB10-21EE611AA026",
                    "vulnerable": true
                  }
                ],
                "negate": false,
                "operator": "OR"
              }
            ]
          }
        ],
        "descriptions": [
          {
            "lang": "en",
            "value": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to \"Incorrect image channel verification\" in 2D."
          },
          {
            "lang": "es",
            "value": "Vulnerabilidad no especificada en el componente Java Runtime Environment (JRE) en Java SE versi\u00f3n 7 Update 21 y anteriores, versi\u00f3n 6 Update 45 y anteriores, y versi\u00f3n 5.0 Update 45 y anteriores, y OpenJDK versi\u00f3n 7 de Oracle, permite a los atacantes remotos afectar la confidencialidad, integridad y disponibilidad por medio de vectores desconocidos relacionados con 2D. NOTA: la informaci\u00f3n previa es de la CPU de junio de 2013. Oracle no ha comentado sobre las afirmaciones de otro proveedor de que este problema permite a los atacantes remotos omitir el sandbox de Java por medio de vectores relacionados con la \"Incorrect image attribute verification\" en 2D."
          }
        ],
        "evaluatorComment": "Per: http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html\n\n\u0027Applies to client deployment of Java only. This vulnerability can be exploited only through sandboxed Java Web Start applications and sandboxed Java applets.\u0027",
        "id": "CVE-2013-2465",
        "lastModified": "2024-04-26T16:07:28.787",
        "metrics": {
          "cvssMetricV2": [
            {
              "acInsufInfo": false,
              "baseSeverity": "HIGH",
              "cvssData": {
                "accessComplexity": "LOW",
                "accessVector": "NETWORK",
                "authentication": "NONE",
                "availabilityImpact": "COMPLETE",
                "baseScore": 10.0,
                "confidentialityImpact": "COMPLETE",
                "integrityImpact": "COMPLETE",
                "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
                "version": "2.0"
              },
              "exploitabilityScore": 10.0,
              "impactScore": 10.0,
              "obtainAllPrivilege": false,
              "obtainOtherPrivilege": false,
              "obtainUserPrivilege": false,
              "source": "nvd@nist.gov",
              "type": "Primary",
              "userInteractionRequired": false
            }
          ]
        },
        "published": "2013-06-18T22:55:02.807",
        "references": [
          {
            "source": "secalert_us@oracle.com",
            "tags": [
              "Broken Link"
            ],
            "url": "http://advisories.mageia.org/MGASA-2013-0185.html"
          },
          {
            "source": "secalert_us@oracle.com",
            "tags": [
              "Broken Link"
            ],
            "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03898880"
          },
          {
            "source": "secalert_us@oracle.com",
            "tags": [
              "Patch"
            ],
            "url": "http://hg.openjdk.java.net/jdk7u/jdk7u-dev/jdk/rev/2a9c79db0040"
          },
          {
            "source": "secalert_us@oracle.com",
            "tags": [
              "Mailing List",
              "Third Party Advisory"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00026.html"
          },
          {
            "source": "secalert_us@oracle.com",
            "tags": [
              "Mailing List",
              "Third Party Advisory"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00027.html"
          },
          {
            "source": "secalert_us@oracle.com",
            "tags": [
              "Mailing List",
              "Third Party Advisory"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00028.html"
          },
          {
            "source": "secalert_us@oracle.com",
            "tags": [
              "Mailing List",
              "Third Party Advisory"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00029.html"
          },
          {
            "source": "secalert_us@oracle.com",
            "tags": [
              "Mailing List",
              "Third Party Advisory"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00031.html"
          },
          {
            "source": "secalert_us@oracle.com",
            "tags": [
              "Mailing List",
              "Third Party Advisory"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00000.html"
          },
          {
            "source": "secalert_us@oracle.com",
            "tags": [
              "Mailing List",
              "Third Party Advisory"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00003.html"
          },
          {
            "source": "secalert_us@oracle.com",
            "tags": [
              "Mailing List",
              "Third Party Advisory"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=137545505800971\u0026w=2"
          },
          {
            "source": "secalert_us@oracle.com",
            "tags": [
              "Mailing List",
              "Third Party Advisory"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=137545592101387\u0026w=2"
          },
          {
            "source": "secalert_us@oracle.com",
            "tags": [
              "Third Party Advisory"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2013-0963.html"
          },
          {
            "source": "secalert_us@oracle.com",
            "tags": [
              "Third Party Advisory"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2013-1059.html"
          },
          {
            "source": "secalert_us@oracle.com",
            "tags": [
              "Third Party Advisory"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2013-1060.html"
          },
          {
            "source": "secalert_us@oracle.com",
            "tags": [
              "Third Party Advisory"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2013-1081.html"
          },
          {
            "source": "secalert_us@oracle.com",
            "tags": [
              "Third Party Advisory"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2013-1455.html"
          },
          {
            "source": "secalert_us@oracle.com",
            "tags": [
              "Third Party Advisory"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2013-1456.html"
          },
          {
            "source": "secalert_us@oracle.com",
            "tags": [
              "Not Applicable"
            ],
            "url": "http://secunia.com/advisories/54154"
          },
          {
            "source": "secalert_us@oracle.com",
            "tags": [
              "Third Party Advisory"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-201406-32.xml"
          },
          {
            "source": "secalert_us@oracle.com",
            "tags": [
              "Third Party Advisory"
            ],
            "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21642336"
          },
          {
            "source": "secalert_us@oracle.com",
            "tags": [
              "Not Applicable"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:183"
          },
          {
            "source": "secalert_us@oracle.com",
            "tags": [
              "Vendor Advisory"
            ],
            "url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html"
          },
          {
            "source": "secalert_us@oracle.com",
            "tags": [
              "Broken Link",
              "Third Party Advisory",
              "VDB Entry"
            ],
            "url": "http://www.securityfocus.com/bid/60657"
          },
          {
            "source": "secalert_us@oracle.com",
            "tags": [
              "Third Party Advisory",
              "US Government Resource"
            ],
            "url": "http://www.us-cert.gov/ncas/alerts/TA13-169A"
          },
          {
            "source": "secalert_us@oracle.com",
            "tags": [
              "Third Party Advisory"
            ],
            "url": "https://access.redhat.com/errata/RHSA-2014:0414"
          },
          {
            "source": "secalert_us@oracle.com",
            "tags": [
              "Issue Tracking"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975118"
          },
          {
            "source": "secalert_us@oracle.com",
            "tags": [
              "Broken Link"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17106"
          },
          {
            "source": "secalert_us@oracle.com",
            "tags": [
              "Broken Link"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19074"
          },
          {
            "source": "secalert_us@oracle.com",
            "tags": [
              "Broken Link"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19455"
          },
          {
            "source": "secalert_us@oracle.com",
            "tags": [
              "Broken Link"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19703"
          }
        ],
        "sourceIdentifier": "secalert_us@oracle.com",
        "vulnStatus": "Analyzed",
        "weaknesses": [
          {
            "description": [
              {
                "lang": "en",
                "value": "NVD-CWE-noinfo"
              }
            ],
            "source": "nvd@nist.gov",
            "type": "Primary"
          }
        ]
      }
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading...

Loading...

Loading...
  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.