Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-6wcf-8jg2-2yex
Summary
Multiple vulnerabilities have been found in the IcedTea JDK, the
    worst of which could lead to arbitrary code execution.
Aliases
0
alias CVE-2013-1493
Fixed_packages
0
url pkg:ebuild/app-emulation/emul-linux-x86-java@1.7.0.51
purl pkg:ebuild/app-emulation/emul-linux-x86-java@1.7.0.51
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/emul-linux-x86-java@1.7.0.51
1
url pkg:ebuild/dev-java/icedtea-bin@6.1.13.3
purl pkg:ebuild/dev-java/icedtea-bin@6.1.13.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@6.1.13.3
2
url pkg:ebuild/dev-java/oracle-jdk-bin@1.7.0.51
purl pkg:ebuild/dev-java/oracle-jdk-bin@1.7.0.51
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/oracle-jdk-bin@1.7.0.51
3
url pkg:ebuild/dev-java/oracle-jre-bin@1.7.0.51
purl pkg:ebuild/dev-java/oracle-jre-bin@1.7.0.51
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/oracle-jre-bin@1.7.0.51
4
url pkg:ebuild/dev-java/sun-jre-bin@1.7.0.51
purl pkg:ebuild/dev-java/sun-jre-bin@1.7.0.51
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/sun-jre-bin@1.7.0.51
Affected_packages
0
url pkg:ebuild/app-emulation/emul-linux-x86-java@1.6.0.45
purl pkg:ebuild/app-emulation/emul-linux-x86-java@1.6.0.45
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-16x3-b9jp-pqej
1
vulnerability VCID-17nn-wrs1-fkb6
2
vulnerability VCID-1m3h-7qcm-rbfb
3
vulnerability VCID-1r7j-ntmu-pfft
4
vulnerability VCID-1ts5-h2ey-uqa7
5
vulnerability VCID-1xgy-w8w2-rfbx
6
vulnerability VCID-25t1-bm52-vfdf
7
vulnerability VCID-2fjq-fhwy-syav
8
vulnerability VCID-2fzv-2u6c-eyf8
9
vulnerability VCID-2gme-zs8y-bqec
10
vulnerability VCID-2jj1-ebr5-5bbj
11
vulnerability VCID-2nc7-hgsm-9yd7
12
vulnerability VCID-2rtq-mm1z-mqg9
13
vulnerability VCID-2udw-8wht-fbgt
14
vulnerability VCID-2uzz-8f2r-yke6
15
vulnerability VCID-3927-a6zv-dfhf
16
vulnerability VCID-3cf3-4nbu-8ugb
17
vulnerability VCID-3dse-wv2n-suhm
18
vulnerability VCID-3gv3-fegj-1qb4
19
vulnerability VCID-3kpz-hath-rkbu
20
vulnerability VCID-3pmx-vxa8-nbcb
21
vulnerability VCID-3ppf-bdas-6ug3
22
vulnerability VCID-3qa8-r3be-tba7
23
vulnerability VCID-3zd7-1c2k-6bf6
24
vulnerability VCID-42sk-j4hm-rkgk
25
vulnerability VCID-452s-21q5-rfh3
26
vulnerability VCID-4arp-hkg6-w7hd
27
vulnerability VCID-4bm5-d5d1-gfem
28
vulnerability VCID-4hus-uqjr-1kag
29
vulnerability VCID-4j1g-wau3-3ya5
30
vulnerability VCID-4qsk-zyhg-a3dq
31
vulnerability VCID-4x5f-5aph-tudz
32
vulnerability VCID-56n7-82vg-jfan
33
vulnerability VCID-5fd6-geeb-fufj
34
vulnerability VCID-5fdv-qzac-n7h4
35
vulnerability VCID-5g76-sgm3-5qgy
36
vulnerability VCID-5jk9-kwhs-4kfa
37
vulnerability VCID-5mff-qcs4-1qeu
38
vulnerability VCID-5q76-be54-3fau
39
vulnerability VCID-5t85-1xvn-c3fp
40
vulnerability VCID-5zkg-4awj-gbd8
41
vulnerability VCID-61yv-hp28-k3a6
42
vulnerability VCID-67w9-dry7-ybcx
43
vulnerability VCID-6dhw-uqtb-kua5
44
vulnerability VCID-6mtv-ft8u-q3c6
45
vulnerability VCID-6q4h-4h6p-nufq
46
vulnerability VCID-6wcf-8jg2-2yex
47
vulnerability VCID-74bf-engd-87et
48
vulnerability VCID-76k9-jkjs-h3b6
49
vulnerability VCID-76wu-nfc9-ebb5
50
vulnerability VCID-7cha-wvmq-jbbr
51
vulnerability VCID-7cvu-7n2n-yfcd
52
vulnerability VCID-7htx-k5bn-ayb4
53
vulnerability VCID-7n2c-p6xz-97gw
54
vulnerability VCID-7nfj-4kye-bqd1
55
vulnerability VCID-7pdn-vqkz-m3bf
56
vulnerability VCID-7rua-9gwq-pkcu
57
vulnerability VCID-7w4t-zbpu-ryds
58
vulnerability VCID-818r-ddzw-a3g5
59
vulnerability VCID-831v-7kmc-aucv
60
vulnerability VCID-8a83-3gjn-k3ge
61
vulnerability VCID-8ccx-15ad-8qgx
62
vulnerability VCID-8faz-85u1-zbeq
63
vulnerability VCID-8jtg-kntk-zuhp
64
vulnerability VCID-8nr2-vwxr-17bx
65
vulnerability VCID-8znu-znzw-bbe3
66
vulnerability VCID-91fb-xx5h-ukfx
67
vulnerability VCID-98s6-fdp7-gkg6
68
vulnerability VCID-9f18-fhez-5qba
69
vulnerability VCID-9hpn-u1y1-9bdf
70
vulnerability VCID-9m3k-ak8j-f3f5
71
vulnerability VCID-9n7g-864v-hufw
72
vulnerability VCID-9np5-mkt9-tke6
73
vulnerability VCID-9y8q-cnzk-fyht
74
vulnerability VCID-a21v-fxys-5khy
75
vulnerability VCID-a6h2-sy81-3yg5
76
vulnerability VCID-a7qr-dzhg-qbbq
77
vulnerability VCID-afac-ub77-k7c6
78
vulnerability VCID-amqp-krc8-mkc7
79
vulnerability VCID-aqtv-nbes-33aw
80
vulnerability VCID-avtm-kfue-wyed
81
vulnerability VCID-ax8m-mt4a-efa7
82
vulnerability VCID-ay5n-1ryf-hkga
83
vulnerability VCID-ayrx-nm2u-6fde
84
vulnerability VCID-b1m6-r1bv-d7gr
85
vulnerability VCID-b7ae-xzrv-3qga
86
vulnerability VCID-bkcn-7xu6-g7at
87
vulnerability VCID-bpsj-krfk-q7b1
88
vulnerability VCID-bqxe-tpzn-dygb
89
vulnerability VCID-c2yd-ygs1-1uaf
90
vulnerability VCID-c56h-7v77-57b7
91
vulnerability VCID-c9ga-jwuz-9qcs
92
vulnerability VCID-camp-gyaa-2qf4
93
vulnerability VCID-cb52-8wmv-h3cp
94
vulnerability VCID-cbwv-kegx-kqg1
95
vulnerability VCID-cpu9-mxb8-n3a2
96
vulnerability VCID-crjw-es17-qyhq
97
vulnerability VCID-cvuc-vk1m-p7eh
98
vulnerability VCID-d2gm-9p7z-53hc
99
vulnerability VCID-d8nw-yfn5-5uev
100
vulnerability VCID-dghq-cq9k-9kan
101
vulnerability VCID-drf5-44h5-hud4
102
vulnerability VCID-dt9f-ns4h-judb
103
vulnerability VCID-dxv7-9y1b-pff7
104
vulnerability VCID-dzaq-rw8t-wqba
105
vulnerability VCID-e62d-ya99-9ucv
106
vulnerability VCID-e62p-4szd-3ubj
107
vulnerability VCID-e7hx-8hda-kua9
108
vulnerability VCID-e8ej-ed3x-cyf9
109
vulnerability VCID-erxc-qxay-ayhr
110
vulnerability VCID-f2zj-pup6-x3a3
111
vulnerability VCID-f4d5-mkub-b3e1
112
vulnerability VCID-fc7q-fpp2-7yfy
113
vulnerability VCID-fejr-r95x-5bht
114
vulnerability VCID-fftg-8wp1-bqdy
115
vulnerability VCID-fkxb-595t-cbex
116
vulnerability VCID-ftff-7h3z-yyg5
117
vulnerability VCID-g9j8-jt9n-ckab
118
vulnerability VCID-gftp-xpk4-g7ew
119
vulnerability VCID-gr4j-ve8d-guc9
120
vulnerability VCID-h2bt-bykk-3fgt
121
vulnerability VCID-h6t6-seem-ybcy
122
vulnerability VCID-ha9m-r5c1-2ffd
123
vulnerability VCID-hb7c-tfkx-sfec
124
vulnerability VCID-hc5d-2ygd-pqb3
125
vulnerability VCID-hgmm-ay8w-hyca
126
vulnerability VCID-hjsb-ex5e-8qfv
127
vulnerability VCID-j6nz-htn7-ubbr
128
vulnerability VCID-j7g4-h24q-ckc9
129
vulnerability VCID-j9w1-znfd-ubh1
130
vulnerability VCID-ja3a-fems-gufe
131
vulnerability VCID-jktb-47k1-rffu
132
vulnerability VCID-jrtu-g6eh-hfac
133
vulnerability VCID-jrxs-q15y-pudg
134
vulnerability VCID-juub-pk4e-4bd5
135
vulnerability VCID-jwhg-5nwu-yfb5
136
vulnerability VCID-jwpp-qr3e-ffgn
137
vulnerability VCID-k22n-2xpj-augm
138
vulnerability VCID-k7w4-sz2t-ryah
139
vulnerability VCID-kct4-fj4c-7kgv
140
vulnerability VCID-kggz-28dg-dubz
141
vulnerability VCID-khuw-dsag-p7ey
142
vulnerability VCID-kn39-nd68-a7c8
143
vulnerability VCID-ks2a-sb7b-6yb7
144
vulnerability VCID-ktxr-hy5c-23fz
145
vulnerability VCID-ku1m-f4yh-p7bc
146
vulnerability VCID-kufr-v4kx-a7da
147
vulnerability VCID-kyt7-ky8c-6ydd
148
vulnerability VCID-m2d2-shze-ybgs
149
vulnerability VCID-m5sv-6fpk-2kfr
150
vulnerability VCID-mdmd-uc64-2uev
151
vulnerability VCID-mds1-pfjh-dbap
152
vulnerability VCID-mebk-ymrs-wkd2
153
vulnerability VCID-mmhg-araa-fkb8
154
vulnerability VCID-msfq-snpj-4beg
155
vulnerability VCID-msup-sd1d-j3b8
156
vulnerability VCID-muqs-gqsv-wuev
157
vulnerability VCID-mym5-f9ns-t3cn
158
vulnerability VCID-n6gc-cnsc-z7a6
159
vulnerability VCID-n7ju-v5t7-h3eq
160
vulnerability VCID-nj59-1wrw-kbd1
161
vulnerability VCID-nkx2-akqj-73dx
162
vulnerability VCID-nyf1-5f2w-q3g1
163
vulnerability VCID-p127-f7pc-gfen
164
vulnerability VCID-p1m1-2pz6-vkaw
165
vulnerability VCID-p93f-g98h-x3cb
166
vulnerability VCID-pbdx-8nxr-nbew
167
vulnerability VCID-pf5g-cuwm-7bey
168
vulnerability VCID-pg5w-ajf1-97fp
169
vulnerability VCID-prnm-yq7v-gbdv
170
vulnerability VCID-prza-8x9q-nfhc
171
vulnerability VCID-pshs-rsdz-cufm
172
vulnerability VCID-q12q-umtv-pyb4
173
vulnerability VCID-q5c8-hwra-zyfr
174
vulnerability VCID-qfw9-f3rm-kfah
175
vulnerability VCID-qkyd-ehgp-gkgs
176
vulnerability VCID-qmvf-8y88-gqhh
177
vulnerability VCID-qn9t-vaqg-tkf8
178
vulnerability VCID-qr8g-acpq-pqfc
179
vulnerability VCID-qswt-y34k-5kc8
180
vulnerability VCID-r3jr-7dkg-5khb
181
vulnerability VCID-r3tj-qpxn-dya5
182
vulnerability VCID-r6a5-wtaz-8bgu
183
vulnerability VCID-rfp8-t93a-2qa4
184
vulnerability VCID-rn74-ggyj-mkf3
185
vulnerability VCID-ru3b-tbku-vqdm
186
vulnerability VCID-sk3j-q3uf-5yfp
187
vulnerability VCID-skvx-a4ep-sufh
188
vulnerability VCID-sq82-bf47-4yae
189
vulnerability VCID-sw7w-bref-83aq
190
vulnerability VCID-t3ej-bwa3-r3gz
191
vulnerability VCID-t418-tu7d-ybcz
192
vulnerability VCID-t42f-1uff-buer
193
vulnerability VCID-t653-gwcf-4bfp
194
vulnerability VCID-te2n-je4h-j7bc
195
vulnerability VCID-tft2-nbge-kya2
196
vulnerability VCID-tfzc-gyvj-5yh8
197
vulnerability VCID-tkuc-9da4-vqdk
198
vulnerability VCID-tn8p-wsmb-93h7
199
vulnerability VCID-trqz-42v7-3ues
200
vulnerability VCID-tt7k-yzuf-9bc4
201
vulnerability VCID-tu9y-6vmr-k3ft
202
vulnerability VCID-twh8-87va-juf9
203
vulnerability VCID-udmy-u2ru-rbeb
204
vulnerability VCID-ug4j-yfam-zqa9
205
vulnerability VCID-ut7m-y9d5-y7h1
206
vulnerability VCID-uu8k-h28e-wygf
207
vulnerability VCID-uud1-wmsy-r3fd
208
vulnerability VCID-uvbz-c5pd-a3hc
209
vulnerability VCID-uvxw-46pp-fyaj
210
vulnerability VCID-v2e9-45y6-8qd4
211
vulnerability VCID-v5dh-t6fz-t3gh
212
vulnerability VCID-vd1b-gxgh-kyg9
213
vulnerability VCID-vf6r-a833-fbg6
214
vulnerability VCID-vjya-1h5w-j7as
215
vulnerability VCID-vqaz-cm94-mugt
216
vulnerability VCID-vqyx-33vq-fqdt
217
vulnerability VCID-vr7q-u9qz-hua5
218
vulnerability VCID-vrm5-g1d9-ufey
219
vulnerability VCID-vscb-htug-bbde
220
vulnerability VCID-we8p-qdzs-wub4
221
vulnerability VCID-wfz2-6mu3-hbcg
222
vulnerability VCID-wj8s-enzz-aka2
223
vulnerability VCID-wq9n-kz7d-4ued
224
vulnerability VCID-wxtc-4524-pqb7
225
vulnerability VCID-x4b6-868b-gbbh
226
vulnerability VCID-x65k-nney-23b5
227
vulnerability VCID-x72p-yry2-bugs
228
vulnerability VCID-xjxt-uybu-27dt
229
vulnerability VCID-xksx-3w4p-zkdz
230
vulnerability VCID-xnnp-qm2g-1uej
231
vulnerability VCID-xprc-hqhv-8fc9
232
vulnerability VCID-xtbz-97wf-hudp
233
vulnerability VCID-y121-2nk3-pqf5
234
vulnerability VCID-y21s-gezt-bfeq
235
vulnerability VCID-yh4p-xvup-u7dp
236
vulnerability VCID-yqwk-xtsx-eufh
237
vulnerability VCID-yvbv-c7hx-aqah
238
vulnerability VCID-z63k-wes3-gqgw
239
vulnerability VCID-ze38-fyef-wbcr
240
vulnerability VCID-zed9-s11h-f3bz
241
vulnerability VCID-zncv-7rwk-nket
242
vulnerability VCID-zp2x-b1fa-jqe3
243
vulnerability VCID-zpd2-a2fk-hudm
244
vulnerability VCID-zvmd-6wrn-jkcr
245
vulnerability VCID-zw5y-hqqv-rkcc
246
vulnerability VCID-zx4b-qwy1-fkf8
247
vulnerability VCID-zxe5-nrnq-e7fz
248
vulnerability VCID-zzzw-t6t2-qqft
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/emul-linux-x86-java@1.6.0.45
1
url pkg:ebuild/dev-java/icedtea-bin@6
purl pkg:ebuild/dev-java/icedtea-bin@6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-14yk-ezmb-hfet
1
vulnerability VCID-15qm-fyc8-f3da
2
vulnerability VCID-17nn-wrs1-fkb6
3
vulnerability VCID-1m2k-jt6j-kyam
4
vulnerability VCID-1m3h-7qcm-rbfb
5
vulnerability VCID-1r7j-ntmu-pfft
6
vulnerability VCID-1yyz-wmtf-n7af
7
vulnerability VCID-25t1-bm52-vfdf
8
vulnerability VCID-2fdb-zr4u-juga
9
vulnerability VCID-2fzv-2u6c-eyf8
10
vulnerability VCID-2g73-94ue-wbac
11
vulnerability VCID-2gme-zs8y-bqec
12
vulnerability VCID-2jj1-ebr5-5bbj
13
vulnerability VCID-2n55-tkzw-g7b9
14
vulnerability VCID-2nc7-hgsm-9yd7
15
vulnerability VCID-2uc7-aypy-jkde
16
vulnerability VCID-2udw-8wht-fbgt
17
vulnerability VCID-2uzz-8f2r-yke6
18
vulnerability VCID-3cf3-4nbu-8ugb
19
vulnerability VCID-3dse-wv2n-suhm
20
vulnerability VCID-3ehy-szsm-qqcd
21
vulnerability VCID-3kpz-hath-rkbu
22
vulnerability VCID-3pmx-vxa8-nbcb
23
vulnerability VCID-3qa8-r3be-tba7
24
vulnerability VCID-3zd7-1c2k-6bf6
25
vulnerability VCID-4142-6bvd-ryfh
26
vulnerability VCID-48md-gspa-h3ax
27
vulnerability VCID-4arp-hkg6-w7hd
28
vulnerability VCID-4g9p-kms6-33fy
29
vulnerability VCID-4p3u-gdhr-jucj
30
vulnerability VCID-4qsk-zyhg-a3dq
31
vulnerability VCID-5396-g8m1-y3cq
32
vulnerability VCID-5a95-kbje-y3hp
33
vulnerability VCID-5g76-sgm3-5qgy
34
vulnerability VCID-5mff-qcs4-1qeu
35
vulnerability VCID-5u17-kgsw-akar
36
vulnerability VCID-5wx8-nzpy-kfhg
37
vulnerability VCID-6573-arns-dubp
38
vulnerability VCID-67w9-dry7-ybcx
39
vulnerability VCID-6d27-47wg-v7a2
40
vulnerability VCID-6dhw-uqtb-kua5
41
vulnerability VCID-6f4g-2v9h-e3d2
42
vulnerability VCID-6mtv-ft8u-q3c6
43
vulnerability VCID-6q4h-4h6p-nufq
44
vulnerability VCID-6qse-ddhe-f7ea
45
vulnerability VCID-6wcf-8jg2-2yex
46
vulnerability VCID-6y1r-9shn-abdp
47
vulnerability VCID-71j7-fgmc-9ygm
48
vulnerability VCID-753c-x7gd-37dd
49
vulnerability VCID-76k9-jkjs-h3b6
50
vulnerability VCID-76wu-nfc9-ebb5
51
vulnerability VCID-7cvu-7n2n-yfcd
52
vulnerability VCID-7dwd-t56z-nyga
53
vulnerability VCID-7nfj-4kye-bqd1
54
vulnerability VCID-7pdn-vqkz-m3bf
55
vulnerability VCID-7rua-9gwq-pkcu
56
vulnerability VCID-7w4t-zbpu-ryds
57
vulnerability VCID-7y2q-c6xs-nbex
58
vulnerability VCID-82f8-r9qy-a3a9
59
vulnerability VCID-831v-7kmc-aucv
60
vulnerability VCID-85a2-7xgd-sydv
61
vulnerability VCID-865x-zdpg-vbfb
62
vulnerability VCID-87f2-a1zb-7qgp
63
vulnerability VCID-8faz-85u1-zbeq
64
vulnerability VCID-8h5u-kf61-nkbg
65
vulnerability VCID-8jtg-kntk-zuhp
66
vulnerability VCID-8nr2-vwxr-17bx
67
vulnerability VCID-8s7r-edj6-wyeq
68
vulnerability VCID-96cv-7mvp-kyfn
69
vulnerability VCID-98s6-fdp7-gkg6
70
vulnerability VCID-9b24-nsw7-yyfx
71
vulnerability VCID-9efe-yne6-pbct
72
vulnerability VCID-9hpn-u1y1-9bdf
73
vulnerability VCID-9n7g-864v-hufw
74
vulnerability VCID-9np5-mkt9-tke6
75
vulnerability VCID-9wuu-5sx8-kqas
76
vulnerability VCID-9xy4-pu4v-xuff
77
vulnerability VCID-9y8q-cnzk-fyht
78
vulnerability VCID-a21v-fxys-5khy
79
vulnerability VCID-a326-kbt5-h7bp
80
vulnerability VCID-a6wc-3mp6-63ek
81
vulnerability VCID-a7qr-dzhg-qbbq
82
vulnerability VCID-ajy9-yfsa-5bc5
83
vulnerability VCID-amqp-krc8-mkc7
84
vulnerability VCID-ands-9hzf-1qgk
85
vulnerability VCID-au4s-5j9w-nybx
86
vulnerability VCID-b1m6-r1bv-d7gr
87
vulnerability VCID-b9wa-u375-xuef
88
vulnerability VCID-bkcn-7xu6-g7at
89
vulnerability VCID-bkf4-nqbw-13be
90
vulnerability VCID-bmqy-5rm7-pqhx
91
vulnerability VCID-bnn4-y7cn-7kd4
92
vulnerability VCID-bqxe-tpzn-dygb
93
vulnerability VCID-c2yd-ygs1-1uaf
94
vulnerability VCID-c2zx-s8vs-fbgp
95
vulnerability VCID-c9ga-jwuz-9qcs
96
vulnerability VCID-camp-gyaa-2qf4
97
vulnerability VCID-cb52-8wmv-h3cp
98
vulnerability VCID-ccht-tkj5-jfez
99
vulnerability VCID-cf31-qyvb-pyem
100
vulnerability VCID-cqv9-h7xq-hqcd
101
vulnerability VCID-cu4d-hpxb-4kcs
102
vulnerability VCID-cvuc-vk1m-p7eh
103
vulnerability VCID-cwm3-jvbw-pycs
104
vulnerability VCID-db2p-gyj9-5fh2
105
vulnerability VCID-dfgc-ykg1-wfcp
106
vulnerability VCID-dfrc-cgad-9bft
107
vulnerability VCID-dghq-cq9k-9kan
108
vulnerability VCID-dnjn-pxun-p7c5
109
vulnerability VCID-dr2n-9pz1-gfd5
110
vulnerability VCID-ds2p-83xe-dfdm
111
vulnerability VCID-dt9f-ns4h-judb
112
vulnerability VCID-dxv7-9y1b-pff7
113
vulnerability VCID-dyt1-cndg-7fds
114
vulnerability VCID-dzaq-rw8t-wqba
115
vulnerability VCID-e1yx-dxa6-1bba
116
vulnerability VCID-e4dr-2bah-k7bp
117
vulnerability VCID-e62p-4szd-3ubj
118
vulnerability VCID-e8zs-h9pn-5qhm
119
vulnerability VCID-eav9-k1cf-8uaq
120
vulnerability VCID-edhe-xduh-8fb9
121
vulnerability VCID-erxc-qxay-ayhr
122
vulnerability VCID-eu81-714z-1yeq
123
vulnerability VCID-evb5-19yd-dyep
124
vulnerability VCID-f1vn-re8k-gqb4
125
vulnerability VCID-f2zj-pup6-x3a3
126
vulnerability VCID-f4d5-mkub-b3e1
127
vulnerability VCID-fbds-ed54-xufq
128
vulnerability VCID-fc7q-fpp2-7yfy
129
vulnerability VCID-fftg-8wp1-bqdy
130
vulnerability VCID-fkxb-595t-cbex
131
vulnerability VCID-fr3v-tdqc-y3d7
132
vulnerability VCID-ftff-7h3z-yyg5
133
vulnerability VCID-gagr-4wpm-uye5
134
vulnerability VCID-gftp-xpk4-g7ew
135
vulnerability VCID-gted-bme5-r7gf
136
vulnerability VCID-h14x-y4n6-skem
137
vulnerability VCID-had5-3tnv-k3hm
138
vulnerability VCID-hff9-wv9j-ffh9
139
vulnerability VCID-hfru-xr8y-efcs
140
vulnerability VCID-j35a-btuq-83hs
141
vulnerability VCID-j4dz-vj7k-jugu
142
vulnerability VCID-j9w1-znfd-ubh1
143
vulnerability VCID-j9z8-5zpv-8bhy
144
vulnerability VCID-jau7-gfz8-dkfa
145
vulnerability VCID-jj9j-kwv8-byba
146
vulnerability VCID-jpam-uapv-tfch
147
vulnerability VCID-jrxs-q15y-pudg
148
vulnerability VCID-jsar-ckqj-67ew
149
vulnerability VCID-jt92-wb33-k3bs
150
vulnerability VCID-jwhg-5nwu-yfb5
151
vulnerability VCID-jwjm-hptr-a3hy
152
vulnerability VCID-jwpp-qr3e-ffgn
153
vulnerability VCID-k4uz-574m-aqd3
154
vulnerability VCID-kahp-6ybn-9yax
155
vulnerability VCID-kct4-fj4c-7kgv
156
vulnerability VCID-khuw-dsag-p7ey
157
vulnerability VCID-kkh1-7ery-8ugq
158
vulnerability VCID-kn39-nd68-a7c8
159
vulnerability VCID-knv6-1uv9-yfcy
160
vulnerability VCID-ks2a-sb7b-6yb7
161
vulnerability VCID-ksn8-e1kf-bucg
162
vulnerability VCID-kwu7-a77q-2fea
163
vulnerability VCID-m2d2-shze-ybgs
164
vulnerability VCID-mebk-ymrs-wkd2
165
vulnerability VCID-mmcx-4heu-dbdh
166
vulnerability VCID-mmrp-aqn2-nkd1
167
vulnerability VCID-mqdc-3qdf-efhs
168
vulnerability VCID-msup-sd1d-j3b8
169
vulnerability VCID-muqs-gqsv-wuev
170
vulnerability VCID-mv29-w9jk-vybs
171
vulnerability VCID-n6gc-cnsc-z7a6
172
vulnerability VCID-n7ju-v5t7-h3eq
173
vulnerability VCID-ncb3-763z-tfak
174
vulnerability VCID-nd4r-zsay-xycv
175
vulnerability VCID-ngcv-sjuw-23hu
176
vulnerability VCID-nj59-1wrw-kbd1
177
vulnerability VCID-nucv-r9w9-4yc5
178
vulnerability VCID-nv52-jzcr-37ay
179
vulnerability VCID-nyf1-5f2w-q3g1
180
vulnerability VCID-nyhx-9tes-9ygr
181
vulnerability VCID-p127-f7pc-gfen
182
vulnerability VCID-p9m1-4uhu-7kfh
183
vulnerability VCID-pbdx-8nxr-nbew
184
vulnerability VCID-pe1n-mzny-93ek
185
vulnerability VCID-pf5g-cuwm-7bey
186
vulnerability VCID-ppc6-sk8a-ebf6
187
vulnerability VCID-prnm-yq7v-gbdv
188
vulnerability VCID-pshs-rsdz-cufm
189
vulnerability VCID-pvtc-vwz8-wfdg
190
vulnerability VCID-q12q-umtv-pyb4
191
vulnerability VCID-q5c8-hwra-zyfr
192
vulnerability VCID-q7ua-vcgd-q7e6
193
vulnerability VCID-q8r7-cndd-v3ap
194
vulnerability VCID-q9dd-2y4c-1fgc
195
vulnerability VCID-qb3m-qxb4-vydk
196
vulnerability VCID-qb56-zfz8-4bev
197
vulnerability VCID-qfw9-f3rm-kfah
198
vulnerability VCID-qmvf-8y88-gqhh
199
vulnerability VCID-qn9t-vaqg-tkf8
200
vulnerability VCID-qr8g-acpq-pqfc
201
vulnerability VCID-qskx-yp83-dufy
202
vulnerability VCID-qswt-y34k-5kc8
203
vulnerability VCID-qt82-aw67-tqhk
204
vulnerability VCID-r3tj-qpxn-dya5
205
vulnerability VCID-r691-77bt-skhe
206
vulnerability VCID-r992-zpw8-hke2
207
vulnerability VCID-rf3h-5anf-jkdy
208
vulnerability VCID-rfp8-t93a-2qa4
209
vulnerability VCID-rn74-ggyj-mkf3
210
vulnerability VCID-rp28-xxta-67gr
211
vulnerability VCID-rrdj-ssn7-zfdj
212
vulnerability VCID-rxz6-u57e-jqdf
213
vulnerability VCID-rypa-d47y-q3a6
214
vulnerability VCID-s73e-gcn1-77hr
215
vulnerability VCID-s9hj-8yru-hyd7
216
vulnerability VCID-sk3j-q3uf-5yfp
217
vulnerability VCID-skq8-j6yq-1bgq
218
vulnerability VCID-skvx-a4ep-sufh
219
vulnerability VCID-smhf-tqrh-1bam
220
vulnerability VCID-sn49-t5fd-u3hc
221
vulnerability VCID-t1yx-brps-4yhe
222
vulnerability VCID-t653-gwcf-4bfp
223
vulnerability VCID-t6qx-k3n7-a7en
224
vulnerability VCID-t7b6-9vnd-6be1
225
vulnerability VCID-tc7a-29c8-b3dx
226
vulnerability VCID-tft2-nbge-kya2
227
vulnerability VCID-tmtc-dkqf-p3ap
228
vulnerability VCID-tr2q-ye8m-8ke7
229
vulnerability VCID-tt7k-yzuf-9bc4
230
vulnerability VCID-twh8-87va-juf9
231
vulnerability VCID-u5jr-jf83-gbbb
232
vulnerability VCID-uaur-z1tw-v7gk
233
vulnerability VCID-ug4j-yfam-zqa9
234
vulnerability VCID-uq19-1f86-cqgk
235
vulnerability VCID-uu8k-h28e-wygf
236
vulnerability VCID-uud1-wmsy-r3fd
237
vulnerability VCID-uvbz-c5pd-a3hc
238
vulnerability VCID-uvxw-46pp-fyaj
239
vulnerability VCID-uwxq-bbum-1yhw
240
vulnerability VCID-v2e9-45y6-8qd4
241
vulnerability VCID-vath-gcc5-zybq
242
vulnerability VCID-vd1b-gxgh-kyg9
243
vulnerability VCID-vf65-ugfc-nueg
244
vulnerability VCID-vr7q-u9qz-hua5
245
vulnerability VCID-vrm5-g1d9-ufey
246
vulnerability VCID-vuvu-hscm-guh1
247
vulnerability VCID-w2fp-p4vj-q3ar
248
vulnerability VCID-wbup-e69y-3fgh
249
vulnerability VCID-we8p-qdzs-wub4
250
vulnerability VCID-wfkg-16pe-wba2
251
vulnerability VCID-wkkv-61uc-jufm
252
vulnerability VCID-wqcq-rktw-jyct
253
vulnerability VCID-wy3y-qjfn-xudt
254
vulnerability VCID-x72p-yry2-bugs
255
vulnerability VCID-xgvx-tpbg-73hf
256
vulnerability VCID-xtbz-97wf-hudp
257
vulnerability VCID-y121-2nk3-pqf5
258
vulnerability VCID-y21s-gezt-bfeq
259
vulnerability VCID-y85b-vf43-1bfz
260
vulnerability VCID-y93w-et8f-8bgr
261
vulnerability VCID-ykt4-n3sx-v3cd
262
vulnerability VCID-ynn9-thtp-wkbh
263
vulnerability VCID-ys2q-r978-c3gf
264
vulnerability VCID-yvbv-c7hx-aqah
265
vulnerability VCID-yy8m-5wp3-tbby
266
vulnerability VCID-yyav-75eb-e3av
267
vulnerability VCID-z63k-wes3-gqgw
268
vulnerability VCID-z8sf-9vvx-uqea
269
vulnerability VCID-ze38-fyef-wbcr
270
vulnerability VCID-zed9-s11h-f3bz
271
vulnerability VCID-zp2x-b1fa-jqe3
272
vulnerability VCID-ztyf-ukmt-63b3
273
vulnerability VCID-zvmd-6wrn-jkcr
274
vulnerability VCID-zzzw-t6t2-qqft
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@6
2
url pkg:ebuild/dev-java/oracle-jdk-bin@1.6.0.45
purl pkg:ebuild/dev-java/oracle-jdk-bin@1.6.0.45
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-16x3-b9jp-pqej
1
vulnerability VCID-17nn-wrs1-fkb6
2
vulnerability VCID-1m3h-7qcm-rbfb
3
vulnerability VCID-1r7j-ntmu-pfft
4
vulnerability VCID-1ts5-h2ey-uqa7
5
vulnerability VCID-1xgy-w8w2-rfbx
6
vulnerability VCID-25t1-bm52-vfdf
7
vulnerability VCID-2fjq-fhwy-syav
8
vulnerability VCID-2fzv-2u6c-eyf8
9
vulnerability VCID-2gme-zs8y-bqec
10
vulnerability VCID-2jj1-ebr5-5bbj
11
vulnerability VCID-2nc7-hgsm-9yd7
12
vulnerability VCID-2rtq-mm1z-mqg9
13
vulnerability VCID-2udw-8wht-fbgt
14
vulnerability VCID-2uzz-8f2r-yke6
15
vulnerability VCID-3927-a6zv-dfhf
16
vulnerability VCID-3cf3-4nbu-8ugb
17
vulnerability VCID-3dse-wv2n-suhm
18
vulnerability VCID-3gv3-fegj-1qb4
19
vulnerability VCID-3kpz-hath-rkbu
20
vulnerability VCID-3pmx-vxa8-nbcb
21
vulnerability VCID-3ppf-bdas-6ug3
22
vulnerability VCID-3qa8-r3be-tba7
23
vulnerability VCID-3zd7-1c2k-6bf6
24
vulnerability VCID-42sk-j4hm-rkgk
25
vulnerability VCID-452s-21q5-rfh3
26
vulnerability VCID-4arp-hkg6-w7hd
27
vulnerability VCID-4bm5-d5d1-gfem
28
vulnerability VCID-4hus-uqjr-1kag
29
vulnerability VCID-4j1g-wau3-3ya5
30
vulnerability VCID-4qsk-zyhg-a3dq
31
vulnerability VCID-4x5f-5aph-tudz
32
vulnerability VCID-56n7-82vg-jfan
33
vulnerability VCID-5fd6-geeb-fufj
34
vulnerability VCID-5fdv-qzac-n7h4
35
vulnerability VCID-5g76-sgm3-5qgy
36
vulnerability VCID-5jk9-kwhs-4kfa
37
vulnerability VCID-5mff-qcs4-1qeu
38
vulnerability VCID-5q76-be54-3fau
39
vulnerability VCID-5t85-1xvn-c3fp
40
vulnerability VCID-5zkg-4awj-gbd8
41
vulnerability VCID-61yv-hp28-k3a6
42
vulnerability VCID-67w9-dry7-ybcx
43
vulnerability VCID-6dhw-uqtb-kua5
44
vulnerability VCID-6mtv-ft8u-q3c6
45
vulnerability VCID-6q4h-4h6p-nufq
46
vulnerability VCID-6wcf-8jg2-2yex
47
vulnerability VCID-74bf-engd-87et
48
vulnerability VCID-76k9-jkjs-h3b6
49
vulnerability VCID-76wu-nfc9-ebb5
50
vulnerability VCID-7cha-wvmq-jbbr
51
vulnerability VCID-7cvu-7n2n-yfcd
52
vulnerability VCID-7htx-k5bn-ayb4
53
vulnerability VCID-7n2c-p6xz-97gw
54
vulnerability VCID-7nfj-4kye-bqd1
55
vulnerability VCID-7pdn-vqkz-m3bf
56
vulnerability VCID-7rua-9gwq-pkcu
57
vulnerability VCID-7w4t-zbpu-ryds
58
vulnerability VCID-818r-ddzw-a3g5
59
vulnerability VCID-831v-7kmc-aucv
60
vulnerability VCID-8a83-3gjn-k3ge
61
vulnerability VCID-8ccx-15ad-8qgx
62
vulnerability VCID-8faz-85u1-zbeq
63
vulnerability VCID-8jtg-kntk-zuhp
64
vulnerability VCID-8nr2-vwxr-17bx
65
vulnerability VCID-8znu-znzw-bbe3
66
vulnerability VCID-91fb-xx5h-ukfx
67
vulnerability VCID-98s6-fdp7-gkg6
68
vulnerability VCID-9f18-fhez-5qba
69
vulnerability VCID-9hpn-u1y1-9bdf
70
vulnerability VCID-9m3k-ak8j-f3f5
71
vulnerability VCID-9n7g-864v-hufw
72
vulnerability VCID-9np5-mkt9-tke6
73
vulnerability VCID-9y8q-cnzk-fyht
74
vulnerability VCID-a21v-fxys-5khy
75
vulnerability VCID-a6h2-sy81-3yg5
76
vulnerability VCID-a7qr-dzhg-qbbq
77
vulnerability VCID-afac-ub77-k7c6
78
vulnerability VCID-amqp-krc8-mkc7
79
vulnerability VCID-aqtv-nbes-33aw
80
vulnerability VCID-avtm-kfue-wyed
81
vulnerability VCID-ax8m-mt4a-efa7
82
vulnerability VCID-ay5n-1ryf-hkga
83
vulnerability VCID-ayrx-nm2u-6fde
84
vulnerability VCID-b1m6-r1bv-d7gr
85
vulnerability VCID-b7ae-xzrv-3qga
86
vulnerability VCID-bkcn-7xu6-g7at
87
vulnerability VCID-bpsj-krfk-q7b1
88
vulnerability VCID-bqxe-tpzn-dygb
89
vulnerability VCID-c2yd-ygs1-1uaf
90
vulnerability VCID-c56h-7v77-57b7
91
vulnerability VCID-c9ga-jwuz-9qcs
92
vulnerability VCID-camp-gyaa-2qf4
93
vulnerability VCID-cb52-8wmv-h3cp
94
vulnerability VCID-cbwv-kegx-kqg1
95
vulnerability VCID-cpu9-mxb8-n3a2
96
vulnerability VCID-crjw-es17-qyhq
97
vulnerability VCID-cvuc-vk1m-p7eh
98
vulnerability VCID-d2gm-9p7z-53hc
99
vulnerability VCID-d8nw-yfn5-5uev
100
vulnerability VCID-dghq-cq9k-9kan
101
vulnerability VCID-drf5-44h5-hud4
102
vulnerability VCID-dt9f-ns4h-judb
103
vulnerability VCID-dxv7-9y1b-pff7
104
vulnerability VCID-dzaq-rw8t-wqba
105
vulnerability VCID-e62d-ya99-9ucv
106
vulnerability VCID-e62p-4szd-3ubj
107
vulnerability VCID-e7hx-8hda-kua9
108
vulnerability VCID-e8ej-ed3x-cyf9
109
vulnerability VCID-erxc-qxay-ayhr
110
vulnerability VCID-f2zj-pup6-x3a3
111
vulnerability VCID-f4d5-mkub-b3e1
112
vulnerability VCID-fc7q-fpp2-7yfy
113
vulnerability VCID-fejr-r95x-5bht
114
vulnerability VCID-fftg-8wp1-bqdy
115
vulnerability VCID-fkxb-595t-cbex
116
vulnerability VCID-ftff-7h3z-yyg5
117
vulnerability VCID-g9j8-jt9n-ckab
118
vulnerability VCID-gftp-xpk4-g7ew
119
vulnerability VCID-gr4j-ve8d-guc9
120
vulnerability VCID-h2bt-bykk-3fgt
121
vulnerability VCID-h6t6-seem-ybcy
122
vulnerability VCID-ha9m-r5c1-2ffd
123
vulnerability VCID-hb7c-tfkx-sfec
124
vulnerability VCID-hc5d-2ygd-pqb3
125
vulnerability VCID-hgmm-ay8w-hyca
126
vulnerability VCID-hjsb-ex5e-8qfv
127
vulnerability VCID-j6nz-htn7-ubbr
128
vulnerability VCID-j7g4-h24q-ckc9
129
vulnerability VCID-j9w1-znfd-ubh1
130
vulnerability VCID-ja3a-fems-gufe
131
vulnerability VCID-jktb-47k1-rffu
132
vulnerability VCID-jrtu-g6eh-hfac
133
vulnerability VCID-jrxs-q15y-pudg
134
vulnerability VCID-juub-pk4e-4bd5
135
vulnerability VCID-jwhg-5nwu-yfb5
136
vulnerability VCID-jwpp-qr3e-ffgn
137
vulnerability VCID-k22n-2xpj-augm
138
vulnerability VCID-k7w4-sz2t-ryah
139
vulnerability VCID-kct4-fj4c-7kgv
140
vulnerability VCID-kggz-28dg-dubz
141
vulnerability VCID-khuw-dsag-p7ey
142
vulnerability VCID-kn39-nd68-a7c8
143
vulnerability VCID-ks2a-sb7b-6yb7
144
vulnerability VCID-ktxr-hy5c-23fz
145
vulnerability VCID-ku1m-f4yh-p7bc
146
vulnerability VCID-kufr-v4kx-a7da
147
vulnerability VCID-kyt7-ky8c-6ydd
148
vulnerability VCID-m2d2-shze-ybgs
149
vulnerability VCID-m5sv-6fpk-2kfr
150
vulnerability VCID-mdmd-uc64-2uev
151
vulnerability VCID-mds1-pfjh-dbap
152
vulnerability VCID-mebk-ymrs-wkd2
153
vulnerability VCID-mmhg-araa-fkb8
154
vulnerability VCID-msfq-snpj-4beg
155
vulnerability VCID-msup-sd1d-j3b8
156
vulnerability VCID-muqs-gqsv-wuev
157
vulnerability VCID-mym5-f9ns-t3cn
158
vulnerability VCID-n6gc-cnsc-z7a6
159
vulnerability VCID-n7ju-v5t7-h3eq
160
vulnerability VCID-nj59-1wrw-kbd1
161
vulnerability VCID-nkx2-akqj-73dx
162
vulnerability VCID-nyf1-5f2w-q3g1
163
vulnerability VCID-p127-f7pc-gfen
164
vulnerability VCID-p1m1-2pz6-vkaw
165
vulnerability VCID-p93f-g98h-x3cb
166
vulnerability VCID-pbdx-8nxr-nbew
167
vulnerability VCID-pf5g-cuwm-7bey
168
vulnerability VCID-pg5w-ajf1-97fp
169
vulnerability VCID-prnm-yq7v-gbdv
170
vulnerability VCID-prza-8x9q-nfhc
171
vulnerability VCID-pshs-rsdz-cufm
172
vulnerability VCID-q12q-umtv-pyb4
173
vulnerability VCID-q5c8-hwra-zyfr
174
vulnerability VCID-qfw9-f3rm-kfah
175
vulnerability VCID-qkyd-ehgp-gkgs
176
vulnerability VCID-qmvf-8y88-gqhh
177
vulnerability VCID-qn9t-vaqg-tkf8
178
vulnerability VCID-qr8g-acpq-pqfc
179
vulnerability VCID-qswt-y34k-5kc8
180
vulnerability VCID-r3jr-7dkg-5khb
181
vulnerability VCID-r3tj-qpxn-dya5
182
vulnerability VCID-r6a5-wtaz-8bgu
183
vulnerability VCID-rfp8-t93a-2qa4
184
vulnerability VCID-rn74-ggyj-mkf3
185
vulnerability VCID-ru3b-tbku-vqdm
186
vulnerability VCID-sk3j-q3uf-5yfp
187
vulnerability VCID-skvx-a4ep-sufh
188
vulnerability VCID-sq82-bf47-4yae
189
vulnerability VCID-sw7w-bref-83aq
190
vulnerability VCID-t3ej-bwa3-r3gz
191
vulnerability VCID-t418-tu7d-ybcz
192
vulnerability VCID-t42f-1uff-buer
193
vulnerability VCID-t653-gwcf-4bfp
194
vulnerability VCID-te2n-je4h-j7bc
195
vulnerability VCID-tft2-nbge-kya2
196
vulnerability VCID-tfzc-gyvj-5yh8
197
vulnerability VCID-tkuc-9da4-vqdk
198
vulnerability VCID-tn8p-wsmb-93h7
199
vulnerability VCID-trqz-42v7-3ues
200
vulnerability VCID-tt7k-yzuf-9bc4
201
vulnerability VCID-tu9y-6vmr-k3ft
202
vulnerability VCID-twh8-87va-juf9
203
vulnerability VCID-udmy-u2ru-rbeb
204
vulnerability VCID-ug4j-yfam-zqa9
205
vulnerability VCID-ut7m-y9d5-y7h1
206
vulnerability VCID-uu8k-h28e-wygf
207
vulnerability VCID-uud1-wmsy-r3fd
208
vulnerability VCID-uvbz-c5pd-a3hc
209
vulnerability VCID-uvxw-46pp-fyaj
210
vulnerability VCID-v2e9-45y6-8qd4
211
vulnerability VCID-v5dh-t6fz-t3gh
212
vulnerability VCID-vd1b-gxgh-kyg9
213
vulnerability VCID-vf6r-a833-fbg6
214
vulnerability VCID-vjya-1h5w-j7as
215
vulnerability VCID-vqaz-cm94-mugt
216
vulnerability VCID-vqyx-33vq-fqdt
217
vulnerability VCID-vr7q-u9qz-hua5
218
vulnerability VCID-vrm5-g1d9-ufey
219
vulnerability VCID-vscb-htug-bbde
220
vulnerability VCID-we8p-qdzs-wub4
221
vulnerability VCID-wfz2-6mu3-hbcg
222
vulnerability VCID-wj8s-enzz-aka2
223
vulnerability VCID-wq9n-kz7d-4ued
224
vulnerability VCID-wxtc-4524-pqb7
225
vulnerability VCID-x4b6-868b-gbbh
226
vulnerability VCID-x65k-nney-23b5
227
vulnerability VCID-x72p-yry2-bugs
228
vulnerability VCID-xjxt-uybu-27dt
229
vulnerability VCID-xksx-3w4p-zkdz
230
vulnerability VCID-xnnp-qm2g-1uej
231
vulnerability VCID-xprc-hqhv-8fc9
232
vulnerability VCID-xtbz-97wf-hudp
233
vulnerability VCID-y121-2nk3-pqf5
234
vulnerability VCID-y21s-gezt-bfeq
235
vulnerability VCID-yh4p-xvup-u7dp
236
vulnerability VCID-yqwk-xtsx-eufh
237
vulnerability VCID-yvbv-c7hx-aqah
238
vulnerability VCID-z63k-wes3-gqgw
239
vulnerability VCID-ze38-fyef-wbcr
240
vulnerability VCID-zed9-s11h-f3bz
241
vulnerability VCID-zncv-7rwk-nket
242
vulnerability VCID-zp2x-b1fa-jqe3
243
vulnerability VCID-zpd2-a2fk-hudm
244
vulnerability VCID-zvmd-6wrn-jkcr
245
vulnerability VCID-zw5y-hqqv-rkcc
246
vulnerability VCID-zx4b-qwy1-fkf8
247
vulnerability VCID-zxe5-nrnq-e7fz
248
vulnerability VCID-zzzw-t6t2-qqft
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/oracle-jdk-bin@1.6.0.45
3
url pkg:ebuild/dev-java/oracle-jre-bin@1.6.0.45
purl pkg:ebuild/dev-java/oracle-jre-bin@1.6.0.45
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-16x3-b9jp-pqej
1
vulnerability VCID-17nn-wrs1-fkb6
2
vulnerability VCID-1m3h-7qcm-rbfb
3
vulnerability VCID-1r7j-ntmu-pfft
4
vulnerability VCID-1ts5-h2ey-uqa7
5
vulnerability VCID-1xgy-w8w2-rfbx
6
vulnerability VCID-25t1-bm52-vfdf
7
vulnerability VCID-2fjq-fhwy-syav
8
vulnerability VCID-2fzv-2u6c-eyf8
9
vulnerability VCID-2gme-zs8y-bqec
10
vulnerability VCID-2jj1-ebr5-5bbj
11
vulnerability VCID-2nc7-hgsm-9yd7
12
vulnerability VCID-2rtq-mm1z-mqg9
13
vulnerability VCID-2udw-8wht-fbgt
14
vulnerability VCID-2uzz-8f2r-yke6
15
vulnerability VCID-3927-a6zv-dfhf
16
vulnerability VCID-3cf3-4nbu-8ugb
17
vulnerability VCID-3dse-wv2n-suhm
18
vulnerability VCID-3gv3-fegj-1qb4
19
vulnerability VCID-3kpz-hath-rkbu
20
vulnerability VCID-3pmx-vxa8-nbcb
21
vulnerability VCID-3ppf-bdas-6ug3
22
vulnerability VCID-3qa8-r3be-tba7
23
vulnerability VCID-3zd7-1c2k-6bf6
24
vulnerability VCID-42sk-j4hm-rkgk
25
vulnerability VCID-452s-21q5-rfh3
26
vulnerability VCID-4arp-hkg6-w7hd
27
vulnerability VCID-4bm5-d5d1-gfem
28
vulnerability VCID-4hus-uqjr-1kag
29
vulnerability VCID-4j1g-wau3-3ya5
30
vulnerability VCID-4qsk-zyhg-a3dq
31
vulnerability VCID-4x5f-5aph-tudz
32
vulnerability VCID-56n7-82vg-jfan
33
vulnerability VCID-5fd6-geeb-fufj
34
vulnerability VCID-5fdv-qzac-n7h4
35
vulnerability VCID-5g76-sgm3-5qgy
36
vulnerability VCID-5jk9-kwhs-4kfa
37
vulnerability VCID-5mff-qcs4-1qeu
38
vulnerability VCID-5q76-be54-3fau
39
vulnerability VCID-5t85-1xvn-c3fp
40
vulnerability VCID-5zkg-4awj-gbd8
41
vulnerability VCID-61yv-hp28-k3a6
42
vulnerability VCID-67w9-dry7-ybcx
43
vulnerability VCID-6dhw-uqtb-kua5
44
vulnerability VCID-6mtv-ft8u-q3c6
45
vulnerability VCID-6q4h-4h6p-nufq
46
vulnerability VCID-6wcf-8jg2-2yex
47
vulnerability VCID-74bf-engd-87et
48
vulnerability VCID-76k9-jkjs-h3b6
49
vulnerability VCID-76wu-nfc9-ebb5
50
vulnerability VCID-7cha-wvmq-jbbr
51
vulnerability VCID-7cvu-7n2n-yfcd
52
vulnerability VCID-7htx-k5bn-ayb4
53
vulnerability VCID-7n2c-p6xz-97gw
54
vulnerability VCID-7nfj-4kye-bqd1
55
vulnerability VCID-7pdn-vqkz-m3bf
56
vulnerability VCID-7rua-9gwq-pkcu
57
vulnerability VCID-7w4t-zbpu-ryds
58
vulnerability VCID-818r-ddzw-a3g5
59
vulnerability VCID-831v-7kmc-aucv
60
vulnerability VCID-8a83-3gjn-k3ge
61
vulnerability VCID-8ccx-15ad-8qgx
62
vulnerability VCID-8faz-85u1-zbeq
63
vulnerability VCID-8jtg-kntk-zuhp
64
vulnerability VCID-8nr2-vwxr-17bx
65
vulnerability VCID-8znu-znzw-bbe3
66
vulnerability VCID-91fb-xx5h-ukfx
67
vulnerability VCID-98s6-fdp7-gkg6
68
vulnerability VCID-9f18-fhez-5qba
69
vulnerability VCID-9hpn-u1y1-9bdf
70
vulnerability VCID-9m3k-ak8j-f3f5
71
vulnerability VCID-9n7g-864v-hufw
72
vulnerability VCID-9np5-mkt9-tke6
73
vulnerability VCID-9y8q-cnzk-fyht
74
vulnerability VCID-a21v-fxys-5khy
75
vulnerability VCID-a6h2-sy81-3yg5
76
vulnerability VCID-a7qr-dzhg-qbbq
77
vulnerability VCID-afac-ub77-k7c6
78
vulnerability VCID-amqp-krc8-mkc7
79
vulnerability VCID-aqtv-nbes-33aw
80
vulnerability VCID-avtm-kfue-wyed
81
vulnerability VCID-ax8m-mt4a-efa7
82
vulnerability VCID-ay5n-1ryf-hkga
83
vulnerability VCID-ayrx-nm2u-6fde
84
vulnerability VCID-b1m6-r1bv-d7gr
85
vulnerability VCID-b7ae-xzrv-3qga
86
vulnerability VCID-bkcn-7xu6-g7at
87
vulnerability VCID-bpsj-krfk-q7b1
88
vulnerability VCID-bqxe-tpzn-dygb
89
vulnerability VCID-c2yd-ygs1-1uaf
90
vulnerability VCID-c56h-7v77-57b7
91
vulnerability VCID-c9ga-jwuz-9qcs
92
vulnerability VCID-camp-gyaa-2qf4
93
vulnerability VCID-cb52-8wmv-h3cp
94
vulnerability VCID-cbwv-kegx-kqg1
95
vulnerability VCID-cpu9-mxb8-n3a2
96
vulnerability VCID-crjw-es17-qyhq
97
vulnerability VCID-cvuc-vk1m-p7eh
98
vulnerability VCID-d2gm-9p7z-53hc
99
vulnerability VCID-d8nw-yfn5-5uev
100
vulnerability VCID-dghq-cq9k-9kan
101
vulnerability VCID-drf5-44h5-hud4
102
vulnerability VCID-dt9f-ns4h-judb
103
vulnerability VCID-dxv7-9y1b-pff7
104
vulnerability VCID-dzaq-rw8t-wqba
105
vulnerability VCID-e62d-ya99-9ucv
106
vulnerability VCID-e62p-4szd-3ubj
107
vulnerability VCID-e7hx-8hda-kua9
108
vulnerability VCID-e8ej-ed3x-cyf9
109
vulnerability VCID-erxc-qxay-ayhr
110
vulnerability VCID-f2zj-pup6-x3a3
111
vulnerability VCID-f4d5-mkub-b3e1
112
vulnerability VCID-fc7q-fpp2-7yfy
113
vulnerability VCID-fejr-r95x-5bht
114
vulnerability VCID-fftg-8wp1-bqdy
115
vulnerability VCID-fkxb-595t-cbex
116
vulnerability VCID-ftff-7h3z-yyg5
117
vulnerability VCID-g9j8-jt9n-ckab
118
vulnerability VCID-gftp-xpk4-g7ew
119
vulnerability VCID-gr4j-ve8d-guc9
120
vulnerability VCID-h2bt-bykk-3fgt
121
vulnerability VCID-h6t6-seem-ybcy
122
vulnerability VCID-ha9m-r5c1-2ffd
123
vulnerability VCID-hb7c-tfkx-sfec
124
vulnerability VCID-hc5d-2ygd-pqb3
125
vulnerability VCID-hgmm-ay8w-hyca
126
vulnerability VCID-hjsb-ex5e-8qfv
127
vulnerability VCID-j6nz-htn7-ubbr
128
vulnerability VCID-j7g4-h24q-ckc9
129
vulnerability VCID-j9w1-znfd-ubh1
130
vulnerability VCID-ja3a-fems-gufe
131
vulnerability VCID-jktb-47k1-rffu
132
vulnerability VCID-jrtu-g6eh-hfac
133
vulnerability VCID-jrxs-q15y-pudg
134
vulnerability VCID-juub-pk4e-4bd5
135
vulnerability VCID-jwhg-5nwu-yfb5
136
vulnerability VCID-jwpp-qr3e-ffgn
137
vulnerability VCID-k22n-2xpj-augm
138
vulnerability VCID-k7w4-sz2t-ryah
139
vulnerability VCID-kct4-fj4c-7kgv
140
vulnerability VCID-kggz-28dg-dubz
141
vulnerability VCID-khuw-dsag-p7ey
142
vulnerability VCID-kn39-nd68-a7c8
143
vulnerability VCID-ks2a-sb7b-6yb7
144
vulnerability VCID-ktxr-hy5c-23fz
145
vulnerability VCID-ku1m-f4yh-p7bc
146
vulnerability VCID-kufr-v4kx-a7da
147
vulnerability VCID-kyt7-ky8c-6ydd
148
vulnerability VCID-m2d2-shze-ybgs
149
vulnerability VCID-m5sv-6fpk-2kfr
150
vulnerability VCID-mdmd-uc64-2uev
151
vulnerability VCID-mds1-pfjh-dbap
152
vulnerability VCID-mebk-ymrs-wkd2
153
vulnerability VCID-mmhg-araa-fkb8
154
vulnerability VCID-msfq-snpj-4beg
155
vulnerability VCID-msup-sd1d-j3b8
156
vulnerability VCID-muqs-gqsv-wuev
157
vulnerability VCID-mym5-f9ns-t3cn
158
vulnerability VCID-n6gc-cnsc-z7a6
159
vulnerability VCID-n7ju-v5t7-h3eq
160
vulnerability VCID-nj59-1wrw-kbd1
161
vulnerability VCID-nkx2-akqj-73dx
162
vulnerability VCID-nyf1-5f2w-q3g1
163
vulnerability VCID-p127-f7pc-gfen
164
vulnerability VCID-p1m1-2pz6-vkaw
165
vulnerability VCID-p93f-g98h-x3cb
166
vulnerability VCID-pbdx-8nxr-nbew
167
vulnerability VCID-pf5g-cuwm-7bey
168
vulnerability VCID-pg5w-ajf1-97fp
169
vulnerability VCID-prnm-yq7v-gbdv
170
vulnerability VCID-prza-8x9q-nfhc
171
vulnerability VCID-pshs-rsdz-cufm
172
vulnerability VCID-q12q-umtv-pyb4
173
vulnerability VCID-q5c8-hwra-zyfr
174
vulnerability VCID-qfw9-f3rm-kfah
175
vulnerability VCID-qkyd-ehgp-gkgs
176
vulnerability VCID-qmvf-8y88-gqhh
177
vulnerability VCID-qn9t-vaqg-tkf8
178
vulnerability VCID-qr8g-acpq-pqfc
179
vulnerability VCID-qswt-y34k-5kc8
180
vulnerability VCID-r3jr-7dkg-5khb
181
vulnerability VCID-r3tj-qpxn-dya5
182
vulnerability VCID-r6a5-wtaz-8bgu
183
vulnerability VCID-rfp8-t93a-2qa4
184
vulnerability VCID-rn74-ggyj-mkf3
185
vulnerability VCID-ru3b-tbku-vqdm
186
vulnerability VCID-sk3j-q3uf-5yfp
187
vulnerability VCID-skvx-a4ep-sufh
188
vulnerability VCID-sq82-bf47-4yae
189
vulnerability VCID-sw7w-bref-83aq
190
vulnerability VCID-t3ej-bwa3-r3gz
191
vulnerability VCID-t418-tu7d-ybcz
192
vulnerability VCID-t42f-1uff-buer
193
vulnerability VCID-t653-gwcf-4bfp
194
vulnerability VCID-te2n-je4h-j7bc
195
vulnerability VCID-tft2-nbge-kya2
196
vulnerability VCID-tfzc-gyvj-5yh8
197
vulnerability VCID-tkuc-9da4-vqdk
198
vulnerability VCID-tn8p-wsmb-93h7
199
vulnerability VCID-trqz-42v7-3ues
200
vulnerability VCID-tt7k-yzuf-9bc4
201
vulnerability VCID-tu9y-6vmr-k3ft
202
vulnerability VCID-twh8-87va-juf9
203
vulnerability VCID-udmy-u2ru-rbeb
204
vulnerability VCID-ug4j-yfam-zqa9
205
vulnerability VCID-ut7m-y9d5-y7h1
206
vulnerability VCID-uu8k-h28e-wygf
207
vulnerability VCID-uud1-wmsy-r3fd
208
vulnerability VCID-uvbz-c5pd-a3hc
209
vulnerability VCID-uvxw-46pp-fyaj
210
vulnerability VCID-v2e9-45y6-8qd4
211
vulnerability VCID-v5dh-t6fz-t3gh
212
vulnerability VCID-vd1b-gxgh-kyg9
213
vulnerability VCID-vf6r-a833-fbg6
214
vulnerability VCID-vjya-1h5w-j7as
215
vulnerability VCID-vqaz-cm94-mugt
216
vulnerability VCID-vqyx-33vq-fqdt
217
vulnerability VCID-vr7q-u9qz-hua5
218
vulnerability VCID-vrm5-g1d9-ufey
219
vulnerability VCID-vscb-htug-bbde
220
vulnerability VCID-we8p-qdzs-wub4
221
vulnerability VCID-wfz2-6mu3-hbcg
222
vulnerability VCID-wj8s-enzz-aka2
223
vulnerability VCID-wq9n-kz7d-4ued
224
vulnerability VCID-wxtc-4524-pqb7
225
vulnerability VCID-x4b6-868b-gbbh
226
vulnerability VCID-x65k-nney-23b5
227
vulnerability VCID-x72p-yry2-bugs
228
vulnerability VCID-xjxt-uybu-27dt
229
vulnerability VCID-xksx-3w4p-zkdz
230
vulnerability VCID-xnnp-qm2g-1uej
231
vulnerability VCID-xprc-hqhv-8fc9
232
vulnerability VCID-xtbz-97wf-hudp
233
vulnerability VCID-y121-2nk3-pqf5
234
vulnerability VCID-y21s-gezt-bfeq
235
vulnerability VCID-yh4p-xvup-u7dp
236
vulnerability VCID-yqwk-xtsx-eufh
237
vulnerability VCID-yvbv-c7hx-aqah
238
vulnerability VCID-z63k-wes3-gqgw
239
vulnerability VCID-ze38-fyef-wbcr
240
vulnerability VCID-zed9-s11h-f3bz
241
vulnerability VCID-zncv-7rwk-nket
242
vulnerability VCID-zp2x-b1fa-jqe3
243
vulnerability VCID-zpd2-a2fk-hudm
244
vulnerability VCID-zvmd-6wrn-jkcr
245
vulnerability VCID-zw5y-hqqv-rkcc
246
vulnerability VCID-zx4b-qwy1-fkf8
247
vulnerability VCID-zxe5-nrnq-e7fz
248
vulnerability VCID-zzzw-t6t2-qqft
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/oracle-jre-bin@1.6.0.45
4
url pkg:ebuild/dev-java/sun-jdk@1.6.0.45
purl pkg:ebuild/dev-java/sun-jdk@1.6.0.45
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-16x3-b9jp-pqej
1
vulnerability VCID-17nn-wrs1-fkb6
2
vulnerability VCID-1m3h-7qcm-rbfb
3
vulnerability VCID-1r7j-ntmu-pfft
4
vulnerability VCID-1ts5-h2ey-uqa7
5
vulnerability VCID-1xgy-w8w2-rfbx
6
vulnerability VCID-25t1-bm52-vfdf
7
vulnerability VCID-2fjq-fhwy-syav
8
vulnerability VCID-2fzv-2u6c-eyf8
9
vulnerability VCID-2gme-zs8y-bqec
10
vulnerability VCID-2jj1-ebr5-5bbj
11
vulnerability VCID-2nc7-hgsm-9yd7
12
vulnerability VCID-2rtq-mm1z-mqg9
13
vulnerability VCID-2udw-8wht-fbgt
14
vulnerability VCID-2uzz-8f2r-yke6
15
vulnerability VCID-3927-a6zv-dfhf
16
vulnerability VCID-3cf3-4nbu-8ugb
17
vulnerability VCID-3dse-wv2n-suhm
18
vulnerability VCID-3gv3-fegj-1qb4
19
vulnerability VCID-3kpz-hath-rkbu
20
vulnerability VCID-3pmx-vxa8-nbcb
21
vulnerability VCID-3ppf-bdas-6ug3
22
vulnerability VCID-3qa8-r3be-tba7
23
vulnerability VCID-3zd7-1c2k-6bf6
24
vulnerability VCID-42sk-j4hm-rkgk
25
vulnerability VCID-452s-21q5-rfh3
26
vulnerability VCID-4arp-hkg6-w7hd
27
vulnerability VCID-4bm5-d5d1-gfem
28
vulnerability VCID-4hus-uqjr-1kag
29
vulnerability VCID-4j1g-wau3-3ya5
30
vulnerability VCID-4qsk-zyhg-a3dq
31
vulnerability VCID-4x5f-5aph-tudz
32
vulnerability VCID-56n7-82vg-jfan
33
vulnerability VCID-5fd6-geeb-fufj
34
vulnerability VCID-5fdv-qzac-n7h4
35
vulnerability VCID-5g76-sgm3-5qgy
36
vulnerability VCID-5jk9-kwhs-4kfa
37
vulnerability VCID-5mff-qcs4-1qeu
38
vulnerability VCID-5q76-be54-3fau
39
vulnerability VCID-5t85-1xvn-c3fp
40
vulnerability VCID-5zkg-4awj-gbd8
41
vulnerability VCID-61yv-hp28-k3a6
42
vulnerability VCID-67w9-dry7-ybcx
43
vulnerability VCID-6dhw-uqtb-kua5
44
vulnerability VCID-6mtv-ft8u-q3c6
45
vulnerability VCID-6q4h-4h6p-nufq
46
vulnerability VCID-6wcf-8jg2-2yex
47
vulnerability VCID-74bf-engd-87et
48
vulnerability VCID-76k9-jkjs-h3b6
49
vulnerability VCID-76wu-nfc9-ebb5
50
vulnerability VCID-7cha-wvmq-jbbr
51
vulnerability VCID-7cvu-7n2n-yfcd
52
vulnerability VCID-7htx-k5bn-ayb4
53
vulnerability VCID-7n2c-p6xz-97gw
54
vulnerability VCID-7nfj-4kye-bqd1
55
vulnerability VCID-7pdn-vqkz-m3bf
56
vulnerability VCID-7rua-9gwq-pkcu
57
vulnerability VCID-7w4t-zbpu-ryds
58
vulnerability VCID-818r-ddzw-a3g5
59
vulnerability VCID-831v-7kmc-aucv
60
vulnerability VCID-8a83-3gjn-k3ge
61
vulnerability VCID-8ccx-15ad-8qgx
62
vulnerability VCID-8faz-85u1-zbeq
63
vulnerability VCID-8jtg-kntk-zuhp
64
vulnerability VCID-8nr2-vwxr-17bx
65
vulnerability VCID-8znu-znzw-bbe3
66
vulnerability VCID-91fb-xx5h-ukfx
67
vulnerability VCID-98s6-fdp7-gkg6
68
vulnerability VCID-9f18-fhez-5qba
69
vulnerability VCID-9hpn-u1y1-9bdf
70
vulnerability VCID-9m3k-ak8j-f3f5
71
vulnerability VCID-9n7g-864v-hufw
72
vulnerability VCID-9np5-mkt9-tke6
73
vulnerability VCID-9y8q-cnzk-fyht
74
vulnerability VCID-a21v-fxys-5khy
75
vulnerability VCID-a6h2-sy81-3yg5
76
vulnerability VCID-a7qr-dzhg-qbbq
77
vulnerability VCID-afac-ub77-k7c6
78
vulnerability VCID-amqp-krc8-mkc7
79
vulnerability VCID-aqtv-nbes-33aw
80
vulnerability VCID-avtm-kfue-wyed
81
vulnerability VCID-ax8m-mt4a-efa7
82
vulnerability VCID-ay5n-1ryf-hkga
83
vulnerability VCID-ayrx-nm2u-6fde
84
vulnerability VCID-b1m6-r1bv-d7gr
85
vulnerability VCID-b7ae-xzrv-3qga
86
vulnerability VCID-bkcn-7xu6-g7at
87
vulnerability VCID-bpsj-krfk-q7b1
88
vulnerability VCID-bqxe-tpzn-dygb
89
vulnerability VCID-c2yd-ygs1-1uaf
90
vulnerability VCID-c56h-7v77-57b7
91
vulnerability VCID-c9ga-jwuz-9qcs
92
vulnerability VCID-camp-gyaa-2qf4
93
vulnerability VCID-cb52-8wmv-h3cp
94
vulnerability VCID-cbwv-kegx-kqg1
95
vulnerability VCID-cpu9-mxb8-n3a2
96
vulnerability VCID-crjw-es17-qyhq
97
vulnerability VCID-cvuc-vk1m-p7eh
98
vulnerability VCID-d2gm-9p7z-53hc
99
vulnerability VCID-d8nw-yfn5-5uev
100
vulnerability VCID-dghq-cq9k-9kan
101
vulnerability VCID-drf5-44h5-hud4
102
vulnerability VCID-dt9f-ns4h-judb
103
vulnerability VCID-dxv7-9y1b-pff7
104
vulnerability VCID-dzaq-rw8t-wqba
105
vulnerability VCID-e62d-ya99-9ucv
106
vulnerability VCID-e62p-4szd-3ubj
107
vulnerability VCID-e7hx-8hda-kua9
108
vulnerability VCID-e8ej-ed3x-cyf9
109
vulnerability VCID-erxc-qxay-ayhr
110
vulnerability VCID-f2zj-pup6-x3a3
111
vulnerability VCID-f4d5-mkub-b3e1
112
vulnerability VCID-fc7q-fpp2-7yfy
113
vulnerability VCID-fejr-r95x-5bht
114
vulnerability VCID-fftg-8wp1-bqdy
115
vulnerability VCID-fkxb-595t-cbex
116
vulnerability VCID-ftff-7h3z-yyg5
117
vulnerability VCID-g9j8-jt9n-ckab
118
vulnerability VCID-gftp-xpk4-g7ew
119
vulnerability VCID-gr4j-ve8d-guc9
120
vulnerability VCID-h2bt-bykk-3fgt
121
vulnerability VCID-h6t6-seem-ybcy
122
vulnerability VCID-ha9m-r5c1-2ffd
123
vulnerability VCID-hb7c-tfkx-sfec
124
vulnerability VCID-hc5d-2ygd-pqb3
125
vulnerability VCID-hgmm-ay8w-hyca
126
vulnerability VCID-hjsb-ex5e-8qfv
127
vulnerability VCID-j6nz-htn7-ubbr
128
vulnerability VCID-j7g4-h24q-ckc9
129
vulnerability VCID-j9w1-znfd-ubh1
130
vulnerability VCID-ja3a-fems-gufe
131
vulnerability VCID-jktb-47k1-rffu
132
vulnerability VCID-jrtu-g6eh-hfac
133
vulnerability VCID-jrxs-q15y-pudg
134
vulnerability VCID-juub-pk4e-4bd5
135
vulnerability VCID-jwhg-5nwu-yfb5
136
vulnerability VCID-jwpp-qr3e-ffgn
137
vulnerability VCID-k22n-2xpj-augm
138
vulnerability VCID-k7w4-sz2t-ryah
139
vulnerability VCID-kct4-fj4c-7kgv
140
vulnerability VCID-kggz-28dg-dubz
141
vulnerability VCID-khuw-dsag-p7ey
142
vulnerability VCID-kn39-nd68-a7c8
143
vulnerability VCID-ks2a-sb7b-6yb7
144
vulnerability VCID-ktxr-hy5c-23fz
145
vulnerability VCID-ku1m-f4yh-p7bc
146
vulnerability VCID-kufr-v4kx-a7da
147
vulnerability VCID-kyt7-ky8c-6ydd
148
vulnerability VCID-m2d2-shze-ybgs
149
vulnerability VCID-m5sv-6fpk-2kfr
150
vulnerability VCID-mdmd-uc64-2uev
151
vulnerability VCID-mds1-pfjh-dbap
152
vulnerability VCID-mebk-ymrs-wkd2
153
vulnerability VCID-mmhg-araa-fkb8
154
vulnerability VCID-msfq-snpj-4beg
155
vulnerability VCID-msup-sd1d-j3b8
156
vulnerability VCID-muqs-gqsv-wuev
157
vulnerability VCID-mym5-f9ns-t3cn
158
vulnerability VCID-n6gc-cnsc-z7a6
159
vulnerability VCID-n7ju-v5t7-h3eq
160
vulnerability VCID-nj59-1wrw-kbd1
161
vulnerability VCID-nkx2-akqj-73dx
162
vulnerability VCID-nyf1-5f2w-q3g1
163
vulnerability VCID-p127-f7pc-gfen
164
vulnerability VCID-p1m1-2pz6-vkaw
165
vulnerability VCID-p93f-g98h-x3cb
166
vulnerability VCID-pbdx-8nxr-nbew
167
vulnerability VCID-pf5g-cuwm-7bey
168
vulnerability VCID-pg5w-ajf1-97fp
169
vulnerability VCID-prnm-yq7v-gbdv
170
vulnerability VCID-prza-8x9q-nfhc
171
vulnerability VCID-pshs-rsdz-cufm
172
vulnerability VCID-q12q-umtv-pyb4
173
vulnerability VCID-q5c8-hwra-zyfr
174
vulnerability VCID-qfw9-f3rm-kfah
175
vulnerability VCID-qkyd-ehgp-gkgs
176
vulnerability VCID-qmvf-8y88-gqhh
177
vulnerability VCID-qn9t-vaqg-tkf8
178
vulnerability VCID-qr8g-acpq-pqfc
179
vulnerability VCID-qswt-y34k-5kc8
180
vulnerability VCID-r3jr-7dkg-5khb
181
vulnerability VCID-r3tj-qpxn-dya5
182
vulnerability VCID-r6a5-wtaz-8bgu
183
vulnerability VCID-rfp8-t93a-2qa4
184
vulnerability VCID-rn74-ggyj-mkf3
185
vulnerability VCID-ru3b-tbku-vqdm
186
vulnerability VCID-sk3j-q3uf-5yfp
187
vulnerability VCID-skvx-a4ep-sufh
188
vulnerability VCID-sq82-bf47-4yae
189
vulnerability VCID-sw7w-bref-83aq
190
vulnerability VCID-t3ej-bwa3-r3gz
191
vulnerability VCID-t418-tu7d-ybcz
192
vulnerability VCID-t42f-1uff-buer
193
vulnerability VCID-t653-gwcf-4bfp
194
vulnerability VCID-te2n-je4h-j7bc
195
vulnerability VCID-tft2-nbge-kya2
196
vulnerability VCID-tfzc-gyvj-5yh8
197
vulnerability VCID-tkuc-9da4-vqdk
198
vulnerability VCID-tn8p-wsmb-93h7
199
vulnerability VCID-trqz-42v7-3ues
200
vulnerability VCID-tt7k-yzuf-9bc4
201
vulnerability VCID-tu9y-6vmr-k3ft
202
vulnerability VCID-twh8-87va-juf9
203
vulnerability VCID-udmy-u2ru-rbeb
204
vulnerability VCID-ug4j-yfam-zqa9
205
vulnerability VCID-ut7m-y9d5-y7h1
206
vulnerability VCID-uu8k-h28e-wygf
207
vulnerability VCID-uud1-wmsy-r3fd
208
vulnerability VCID-uvbz-c5pd-a3hc
209
vulnerability VCID-uvxw-46pp-fyaj
210
vulnerability VCID-v2e9-45y6-8qd4
211
vulnerability VCID-v5dh-t6fz-t3gh
212
vulnerability VCID-vd1b-gxgh-kyg9
213
vulnerability VCID-vf6r-a833-fbg6
214
vulnerability VCID-vjya-1h5w-j7as
215
vulnerability VCID-vqaz-cm94-mugt
216
vulnerability VCID-vqyx-33vq-fqdt
217
vulnerability VCID-vr7q-u9qz-hua5
218
vulnerability VCID-vrm5-g1d9-ufey
219
vulnerability VCID-vscb-htug-bbde
220
vulnerability VCID-we8p-qdzs-wub4
221
vulnerability VCID-wfz2-6mu3-hbcg
222
vulnerability VCID-wj8s-enzz-aka2
223
vulnerability VCID-wq9n-kz7d-4ued
224
vulnerability VCID-wxtc-4524-pqb7
225
vulnerability VCID-x4b6-868b-gbbh
226
vulnerability VCID-x65k-nney-23b5
227
vulnerability VCID-x72p-yry2-bugs
228
vulnerability VCID-xjxt-uybu-27dt
229
vulnerability VCID-xksx-3w4p-zkdz
230
vulnerability VCID-xnnp-qm2g-1uej
231
vulnerability VCID-xprc-hqhv-8fc9
232
vulnerability VCID-xtbz-97wf-hudp
233
vulnerability VCID-y121-2nk3-pqf5
234
vulnerability VCID-y21s-gezt-bfeq
235
vulnerability VCID-yh4p-xvup-u7dp
236
vulnerability VCID-yqwk-xtsx-eufh
237
vulnerability VCID-yvbv-c7hx-aqah
238
vulnerability VCID-z63k-wes3-gqgw
239
vulnerability VCID-ze38-fyef-wbcr
240
vulnerability VCID-zed9-s11h-f3bz
241
vulnerability VCID-zncv-7rwk-nket
242
vulnerability VCID-zp2x-b1fa-jqe3
243
vulnerability VCID-zpd2-a2fk-hudm
244
vulnerability VCID-zvmd-6wrn-jkcr
245
vulnerability VCID-zw5y-hqqv-rkcc
246
vulnerability VCID-zx4b-qwy1-fkf8
247
vulnerability VCID-zxe5-nrnq-e7fz
248
vulnerability VCID-zzzw-t6t2-qqft
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/sun-jdk@1.6.0.45
5
url pkg:ebuild/dev-java/sun-jre-bin@1.6.0.45
purl pkg:ebuild/dev-java/sun-jre-bin@1.6.0.45
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-16x3-b9jp-pqej
1
vulnerability VCID-17nn-wrs1-fkb6
2
vulnerability VCID-1m3h-7qcm-rbfb
3
vulnerability VCID-1r7j-ntmu-pfft
4
vulnerability VCID-1ts5-h2ey-uqa7
5
vulnerability VCID-1xgy-w8w2-rfbx
6
vulnerability VCID-25t1-bm52-vfdf
7
vulnerability VCID-2fjq-fhwy-syav
8
vulnerability VCID-2fzv-2u6c-eyf8
9
vulnerability VCID-2gme-zs8y-bqec
10
vulnerability VCID-2jj1-ebr5-5bbj
11
vulnerability VCID-2nc7-hgsm-9yd7
12
vulnerability VCID-2rtq-mm1z-mqg9
13
vulnerability VCID-2udw-8wht-fbgt
14
vulnerability VCID-2uzz-8f2r-yke6
15
vulnerability VCID-3927-a6zv-dfhf
16
vulnerability VCID-3cf3-4nbu-8ugb
17
vulnerability VCID-3dse-wv2n-suhm
18
vulnerability VCID-3gv3-fegj-1qb4
19
vulnerability VCID-3kpz-hath-rkbu
20
vulnerability VCID-3pmx-vxa8-nbcb
21
vulnerability VCID-3ppf-bdas-6ug3
22
vulnerability VCID-3qa8-r3be-tba7
23
vulnerability VCID-3zd7-1c2k-6bf6
24
vulnerability VCID-42sk-j4hm-rkgk
25
vulnerability VCID-452s-21q5-rfh3
26
vulnerability VCID-4arp-hkg6-w7hd
27
vulnerability VCID-4bm5-d5d1-gfem
28
vulnerability VCID-4hus-uqjr-1kag
29
vulnerability VCID-4j1g-wau3-3ya5
30
vulnerability VCID-4qsk-zyhg-a3dq
31
vulnerability VCID-4x5f-5aph-tudz
32
vulnerability VCID-56n7-82vg-jfan
33
vulnerability VCID-5fd6-geeb-fufj
34
vulnerability VCID-5fdv-qzac-n7h4
35
vulnerability VCID-5g76-sgm3-5qgy
36
vulnerability VCID-5jk9-kwhs-4kfa
37
vulnerability VCID-5mff-qcs4-1qeu
38
vulnerability VCID-5q76-be54-3fau
39
vulnerability VCID-5t85-1xvn-c3fp
40
vulnerability VCID-5zkg-4awj-gbd8
41
vulnerability VCID-61yv-hp28-k3a6
42
vulnerability VCID-67w9-dry7-ybcx
43
vulnerability VCID-6dhw-uqtb-kua5
44
vulnerability VCID-6mtv-ft8u-q3c6
45
vulnerability VCID-6q4h-4h6p-nufq
46
vulnerability VCID-6wcf-8jg2-2yex
47
vulnerability VCID-74bf-engd-87et
48
vulnerability VCID-76k9-jkjs-h3b6
49
vulnerability VCID-76wu-nfc9-ebb5
50
vulnerability VCID-7cha-wvmq-jbbr
51
vulnerability VCID-7cvu-7n2n-yfcd
52
vulnerability VCID-7htx-k5bn-ayb4
53
vulnerability VCID-7n2c-p6xz-97gw
54
vulnerability VCID-7nfj-4kye-bqd1
55
vulnerability VCID-7pdn-vqkz-m3bf
56
vulnerability VCID-7rua-9gwq-pkcu
57
vulnerability VCID-7w4t-zbpu-ryds
58
vulnerability VCID-818r-ddzw-a3g5
59
vulnerability VCID-831v-7kmc-aucv
60
vulnerability VCID-8a83-3gjn-k3ge
61
vulnerability VCID-8ccx-15ad-8qgx
62
vulnerability VCID-8faz-85u1-zbeq
63
vulnerability VCID-8jtg-kntk-zuhp
64
vulnerability VCID-8nr2-vwxr-17bx
65
vulnerability VCID-8znu-znzw-bbe3
66
vulnerability VCID-91fb-xx5h-ukfx
67
vulnerability VCID-98s6-fdp7-gkg6
68
vulnerability VCID-9f18-fhez-5qba
69
vulnerability VCID-9hpn-u1y1-9bdf
70
vulnerability VCID-9m3k-ak8j-f3f5
71
vulnerability VCID-9n7g-864v-hufw
72
vulnerability VCID-9np5-mkt9-tke6
73
vulnerability VCID-9y8q-cnzk-fyht
74
vulnerability VCID-a21v-fxys-5khy
75
vulnerability VCID-a6h2-sy81-3yg5
76
vulnerability VCID-a7qr-dzhg-qbbq
77
vulnerability VCID-afac-ub77-k7c6
78
vulnerability VCID-amqp-krc8-mkc7
79
vulnerability VCID-aqtv-nbes-33aw
80
vulnerability VCID-avtm-kfue-wyed
81
vulnerability VCID-ax8m-mt4a-efa7
82
vulnerability VCID-ay5n-1ryf-hkga
83
vulnerability VCID-ayrx-nm2u-6fde
84
vulnerability VCID-b1m6-r1bv-d7gr
85
vulnerability VCID-b7ae-xzrv-3qga
86
vulnerability VCID-bkcn-7xu6-g7at
87
vulnerability VCID-bpsj-krfk-q7b1
88
vulnerability VCID-bqxe-tpzn-dygb
89
vulnerability VCID-c2yd-ygs1-1uaf
90
vulnerability VCID-c56h-7v77-57b7
91
vulnerability VCID-c9ga-jwuz-9qcs
92
vulnerability VCID-camp-gyaa-2qf4
93
vulnerability VCID-cb52-8wmv-h3cp
94
vulnerability VCID-cbwv-kegx-kqg1
95
vulnerability VCID-cpu9-mxb8-n3a2
96
vulnerability VCID-crjw-es17-qyhq
97
vulnerability VCID-cvuc-vk1m-p7eh
98
vulnerability VCID-d2gm-9p7z-53hc
99
vulnerability VCID-d8nw-yfn5-5uev
100
vulnerability VCID-dghq-cq9k-9kan
101
vulnerability VCID-drf5-44h5-hud4
102
vulnerability VCID-dt9f-ns4h-judb
103
vulnerability VCID-dxv7-9y1b-pff7
104
vulnerability VCID-dzaq-rw8t-wqba
105
vulnerability VCID-e62d-ya99-9ucv
106
vulnerability VCID-e62p-4szd-3ubj
107
vulnerability VCID-e7hx-8hda-kua9
108
vulnerability VCID-e8ej-ed3x-cyf9
109
vulnerability VCID-erxc-qxay-ayhr
110
vulnerability VCID-f2zj-pup6-x3a3
111
vulnerability VCID-f4d5-mkub-b3e1
112
vulnerability VCID-fc7q-fpp2-7yfy
113
vulnerability VCID-fejr-r95x-5bht
114
vulnerability VCID-fftg-8wp1-bqdy
115
vulnerability VCID-fkxb-595t-cbex
116
vulnerability VCID-ftff-7h3z-yyg5
117
vulnerability VCID-g9j8-jt9n-ckab
118
vulnerability VCID-gftp-xpk4-g7ew
119
vulnerability VCID-gr4j-ve8d-guc9
120
vulnerability VCID-h2bt-bykk-3fgt
121
vulnerability VCID-h6t6-seem-ybcy
122
vulnerability VCID-ha9m-r5c1-2ffd
123
vulnerability VCID-hb7c-tfkx-sfec
124
vulnerability VCID-hc5d-2ygd-pqb3
125
vulnerability VCID-hgmm-ay8w-hyca
126
vulnerability VCID-hjsb-ex5e-8qfv
127
vulnerability VCID-j6nz-htn7-ubbr
128
vulnerability VCID-j7g4-h24q-ckc9
129
vulnerability VCID-j9w1-znfd-ubh1
130
vulnerability VCID-ja3a-fems-gufe
131
vulnerability VCID-jktb-47k1-rffu
132
vulnerability VCID-jrtu-g6eh-hfac
133
vulnerability VCID-jrxs-q15y-pudg
134
vulnerability VCID-juub-pk4e-4bd5
135
vulnerability VCID-jwhg-5nwu-yfb5
136
vulnerability VCID-jwpp-qr3e-ffgn
137
vulnerability VCID-k22n-2xpj-augm
138
vulnerability VCID-k7w4-sz2t-ryah
139
vulnerability VCID-kct4-fj4c-7kgv
140
vulnerability VCID-kggz-28dg-dubz
141
vulnerability VCID-khuw-dsag-p7ey
142
vulnerability VCID-kn39-nd68-a7c8
143
vulnerability VCID-ks2a-sb7b-6yb7
144
vulnerability VCID-ktxr-hy5c-23fz
145
vulnerability VCID-ku1m-f4yh-p7bc
146
vulnerability VCID-kufr-v4kx-a7da
147
vulnerability VCID-kyt7-ky8c-6ydd
148
vulnerability VCID-m2d2-shze-ybgs
149
vulnerability VCID-m5sv-6fpk-2kfr
150
vulnerability VCID-mdmd-uc64-2uev
151
vulnerability VCID-mds1-pfjh-dbap
152
vulnerability VCID-mebk-ymrs-wkd2
153
vulnerability VCID-mmhg-araa-fkb8
154
vulnerability VCID-msfq-snpj-4beg
155
vulnerability VCID-msup-sd1d-j3b8
156
vulnerability VCID-muqs-gqsv-wuev
157
vulnerability VCID-mym5-f9ns-t3cn
158
vulnerability VCID-n6gc-cnsc-z7a6
159
vulnerability VCID-n7ju-v5t7-h3eq
160
vulnerability VCID-nj59-1wrw-kbd1
161
vulnerability VCID-nkx2-akqj-73dx
162
vulnerability VCID-nyf1-5f2w-q3g1
163
vulnerability VCID-p127-f7pc-gfen
164
vulnerability VCID-p1m1-2pz6-vkaw
165
vulnerability VCID-p93f-g98h-x3cb
166
vulnerability VCID-pbdx-8nxr-nbew
167
vulnerability VCID-pf5g-cuwm-7bey
168
vulnerability VCID-pg5w-ajf1-97fp
169
vulnerability VCID-prnm-yq7v-gbdv
170
vulnerability VCID-prza-8x9q-nfhc
171
vulnerability VCID-pshs-rsdz-cufm
172
vulnerability VCID-q12q-umtv-pyb4
173
vulnerability VCID-q5c8-hwra-zyfr
174
vulnerability VCID-qfw9-f3rm-kfah
175
vulnerability VCID-qkyd-ehgp-gkgs
176
vulnerability VCID-qmvf-8y88-gqhh
177
vulnerability VCID-qn9t-vaqg-tkf8
178
vulnerability VCID-qr8g-acpq-pqfc
179
vulnerability VCID-qswt-y34k-5kc8
180
vulnerability VCID-r3jr-7dkg-5khb
181
vulnerability VCID-r3tj-qpxn-dya5
182
vulnerability VCID-r6a5-wtaz-8bgu
183
vulnerability VCID-rfp8-t93a-2qa4
184
vulnerability VCID-rn74-ggyj-mkf3
185
vulnerability VCID-ru3b-tbku-vqdm
186
vulnerability VCID-sk3j-q3uf-5yfp
187
vulnerability VCID-skvx-a4ep-sufh
188
vulnerability VCID-sq82-bf47-4yae
189
vulnerability VCID-sw7w-bref-83aq
190
vulnerability VCID-t3ej-bwa3-r3gz
191
vulnerability VCID-t418-tu7d-ybcz
192
vulnerability VCID-t42f-1uff-buer
193
vulnerability VCID-t653-gwcf-4bfp
194
vulnerability VCID-te2n-je4h-j7bc
195
vulnerability VCID-tft2-nbge-kya2
196
vulnerability VCID-tfzc-gyvj-5yh8
197
vulnerability VCID-tkuc-9da4-vqdk
198
vulnerability VCID-tn8p-wsmb-93h7
199
vulnerability VCID-trqz-42v7-3ues
200
vulnerability VCID-tt7k-yzuf-9bc4
201
vulnerability VCID-tu9y-6vmr-k3ft
202
vulnerability VCID-twh8-87va-juf9
203
vulnerability VCID-udmy-u2ru-rbeb
204
vulnerability VCID-ug4j-yfam-zqa9
205
vulnerability VCID-ut7m-y9d5-y7h1
206
vulnerability VCID-uu8k-h28e-wygf
207
vulnerability VCID-uud1-wmsy-r3fd
208
vulnerability VCID-uvbz-c5pd-a3hc
209
vulnerability VCID-uvxw-46pp-fyaj
210
vulnerability VCID-v2e9-45y6-8qd4
211
vulnerability VCID-v5dh-t6fz-t3gh
212
vulnerability VCID-vd1b-gxgh-kyg9
213
vulnerability VCID-vf6r-a833-fbg6
214
vulnerability VCID-vjya-1h5w-j7as
215
vulnerability VCID-vqaz-cm94-mugt
216
vulnerability VCID-vqyx-33vq-fqdt
217
vulnerability VCID-vr7q-u9qz-hua5
218
vulnerability VCID-vrm5-g1d9-ufey
219
vulnerability VCID-vscb-htug-bbde
220
vulnerability VCID-we8p-qdzs-wub4
221
vulnerability VCID-wfz2-6mu3-hbcg
222
vulnerability VCID-wj8s-enzz-aka2
223
vulnerability VCID-wq9n-kz7d-4ued
224
vulnerability VCID-wxtc-4524-pqb7
225
vulnerability VCID-x4b6-868b-gbbh
226
vulnerability VCID-x65k-nney-23b5
227
vulnerability VCID-x72p-yry2-bugs
228
vulnerability VCID-xjxt-uybu-27dt
229
vulnerability VCID-xksx-3w4p-zkdz
230
vulnerability VCID-xnnp-qm2g-1uej
231
vulnerability VCID-xprc-hqhv-8fc9
232
vulnerability VCID-xtbz-97wf-hudp
233
vulnerability VCID-y121-2nk3-pqf5
234
vulnerability VCID-y21s-gezt-bfeq
235
vulnerability VCID-yh4p-xvup-u7dp
236
vulnerability VCID-yqwk-xtsx-eufh
237
vulnerability VCID-yvbv-c7hx-aqah
238
vulnerability VCID-z63k-wes3-gqgw
239
vulnerability VCID-ze38-fyef-wbcr
240
vulnerability VCID-zed9-s11h-f3bz
241
vulnerability VCID-zncv-7rwk-nket
242
vulnerability VCID-zp2x-b1fa-jqe3
243
vulnerability VCID-zpd2-a2fk-hudm
244
vulnerability VCID-zvmd-6wrn-jkcr
245
vulnerability VCID-zw5y-hqqv-rkcc
246
vulnerability VCID-zx4b-qwy1-fkf8
247
vulnerability VCID-zxe5-nrnq-e7fz
248
vulnerability VCID-zzzw-t6t2-qqft
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/sun-jre-bin@1.6.0.45
6
url pkg:rpm/redhat/java-1.5.0-ibm@1:1.5.0.16.0-1jpp.1?arch=el5_9
purl pkg:rpm/redhat/java-1.5.0-ibm@1:1.5.0.16.0-1jpp.1?arch=el5_9
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-15qm-fyc8-f3da
1
vulnerability VCID-2g73-94ue-wbac
2
vulnerability VCID-3zd7-1c2k-6bf6
3
vulnerability VCID-6wcf-8jg2-2yex
4
vulnerability VCID-7dwd-t56z-nyga
5
vulnerability VCID-9b24-nsw7-yyfx
6
vulnerability VCID-9np5-mkt9-tke6
7
vulnerability VCID-ands-9hzf-1qgk
8
vulnerability VCID-cb52-8wmv-h3cp
9
vulnerability VCID-crjw-es17-qyhq
10
vulnerability VCID-eav9-k1cf-8uaq
11
vulnerability VCID-j6nz-htn7-ubbr
12
vulnerability VCID-j9z8-5zpv-8bhy
13
vulnerability VCID-jsar-ckqj-67ew
14
vulnerability VCID-jt92-wb33-k3bs
15
vulnerability VCID-qb3m-qxb4-vydk
16
vulnerability VCID-t6qx-k3n7-a7en
17
vulnerability VCID-t7b6-9vnd-6be1
18
vulnerability VCID-tkuc-9da4-vqdk
19
vulnerability VCID-tr2q-ye8m-8ke7
20
vulnerability VCID-uaur-z1tw-v7gk
21
vulnerability VCID-wfkg-16pe-wba2
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/java-1.5.0-ibm@1:1.5.0.16.0-1jpp.1%3Farch=el5_9
7
url pkg:rpm/redhat/java-1.5.0-ibm@1:1.5.0.16.0-1jpp.1?arch=el6_4
purl pkg:rpm/redhat/java-1.5.0-ibm@1:1.5.0.16.0-1jpp.1?arch=el6_4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-15qm-fyc8-f3da
1
vulnerability VCID-2g73-94ue-wbac
2
vulnerability VCID-3zd7-1c2k-6bf6
3
vulnerability VCID-6wcf-8jg2-2yex
4
vulnerability VCID-7dwd-t56z-nyga
5
vulnerability VCID-9b24-nsw7-yyfx
6
vulnerability VCID-9np5-mkt9-tke6
7
vulnerability VCID-ands-9hzf-1qgk
8
vulnerability VCID-cb52-8wmv-h3cp
9
vulnerability VCID-crjw-es17-qyhq
10
vulnerability VCID-eav9-k1cf-8uaq
11
vulnerability VCID-j6nz-htn7-ubbr
12
vulnerability VCID-j9z8-5zpv-8bhy
13
vulnerability VCID-jsar-ckqj-67ew
14
vulnerability VCID-jt92-wb33-k3bs
15
vulnerability VCID-qb3m-qxb4-vydk
16
vulnerability VCID-t6qx-k3n7-a7en
17
vulnerability VCID-t7b6-9vnd-6be1
18
vulnerability VCID-tkuc-9da4-vqdk
19
vulnerability VCID-tr2q-ye8m-8ke7
20
vulnerability VCID-uaur-z1tw-v7gk
21
vulnerability VCID-wfkg-16pe-wba2
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/java-1.5.0-ibm@1:1.5.0.16.0-1jpp.1%3Farch=el6_4
8
url pkg:rpm/redhat/java-1.6.0-ibm@1:1.6.0.13.0-1jpp.2?arch=el5_9
purl pkg:rpm/redhat/java-1.6.0-ibm@1:1.6.0.13.0-1jpp.2?arch=el5_9
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-15qm-fyc8-f3da
1
vulnerability VCID-2g73-94ue-wbac
2
vulnerability VCID-3gv3-fegj-1qb4
3
vulnerability VCID-3zd7-1c2k-6bf6
4
vulnerability VCID-4hus-uqjr-1kag
5
vulnerability VCID-6wcf-8jg2-2yex
6
vulnerability VCID-7dwd-t56z-nyga
7
vulnerability VCID-9b24-nsw7-yyfx
8
vulnerability VCID-9np5-mkt9-tke6
9
vulnerability VCID-ands-9hzf-1qgk
10
vulnerability VCID-cb52-8wmv-h3cp
11
vulnerability VCID-crjw-es17-qyhq
12
vulnerability VCID-eav9-k1cf-8uaq
13
vulnerability VCID-hb7c-tfkx-sfec
14
vulnerability VCID-j6nz-htn7-ubbr
15
vulnerability VCID-j9z8-5zpv-8bhy
16
vulnerability VCID-jsar-ckqj-67ew
17
vulnerability VCID-jt92-wb33-k3bs
18
vulnerability VCID-juub-pk4e-4bd5
19
vulnerability VCID-k22n-2xpj-augm
20
vulnerability VCID-mym5-f9ns-t3cn
21
vulnerability VCID-prza-8x9q-nfhc
22
vulnerability VCID-qb3m-qxb4-vydk
23
vulnerability VCID-skq8-j6yq-1bgq
24
vulnerability VCID-t42f-1uff-buer
25
vulnerability VCID-t6qx-k3n7-a7en
26
vulnerability VCID-t7b6-9vnd-6be1
27
vulnerability VCID-tkuc-9da4-vqdk
28
vulnerability VCID-tr2q-ye8m-8ke7
29
vulnerability VCID-trqz-42v7-3ues
30
vulnerability VCID-uaur-z1tw-v7gk
31
vulnerability VCID-w2fp-p4vj-q3ar
32
vulnerability VCID-wfkg-16pe-wba2
33
vulnerability VCID-zncv-7rwk-nket
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/java-1.6.0-ibm@1:1.6.0.13.0-1jpp.2%3Farch=el5_9
9
url pkg:rpm/redhat/java-1.6.0-ibm@1:1.6.0.13.0-1jpp.3?arch=el6_4
purl pkg:rpm/redhat/java-1.6.0-ibm@1:1.6.0.13.0-1jpp.3?arch=el6_4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-15qm-fyc8-f3da
1
vulnerability VCID-2g73-94ue-wbac
2
vulnerability VCID-3gv3-fegj-1qb4
3
vulnerability VCID-3zd7-1c2k-6bf6
4
vulnerability VCID-4hus-uqjr-1kag
5
vulnerability VCID-6wcf-8jg2-2yex
6
vulnerability VCID-7dwd-t56z-nyga
7
vulnerability VCID-9b24-nsw7-yyfx
8
vulnerability VCID-9np5-mkt9-tke6
9
vulnerability VCID-ands-9hzf-1qgk
10
vulnerability VCID-cb52-8wmv-h3cp
11
vulnerability VCID-crjw-es17-qyhq
12
vulnerability VCID-eav9-k1cf-8uaq
13
vulnerability VCID-hb7c-tfkx-sfec
14
vulnerability VCID-j6nz-htn7-ubbr
15
vulnerability VCID-j9z8-5zpv-8bhy
16
vulnerability VCID-jsar-ckqj-67ew
17
vulnerability VCID-jt92-wb33-k3bs
18
vulnerability VCID-juub-pk4e-4bd5
19
vulnerability VCID-k22n-2xpj-augm
20
vulnerability VCID-mym5-f9ns-t3cn
21
vulnerability VCID-prza-8x9q-nfhc
22
vulnerability VCID-qb3m-qxb4-vydk
23
vulnerability VCID-skq8-j6yq-1bgq
24
vulnerability VCID-t42f-1uff-buer
25
vulnerability VCID-t6qx-k3n7-a7en
26
vulnerability VCID-t7b6-9vnd-6be1
27
vulnerability VCID-tkuc-9da4-vqdk
28
vulnerability VCID-tr2q-ye8m-8ke7
29
vulnerability VCID-trqz-42v7-3ues
30
vulnerability VCID-uaur-z1tw-v7gk
31
vulnerability VCID-w2fp-p4vj-q3ar
32
vulnerability VCID-wfkg-16pe-wba2
33
vulnerability VCID-zncv-7rwk-nket
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/java-1.6.0-ibm@1:1.6.0.13.0-1jpp.3%3Farch=el6_4
10
url pkg:rpm/redhat/java-1.6.0-ibm@1:1.6.0.14.0-1jpp.1?arch=el5_9
purl pkg:rpm/redhat/java-1.6.0-ibm@1:1.6.0.14.0-1jpp.1?arch=el5_9
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-15qm-fyc8-f3da
1
vulnerability VCID-1m3h-7qcm-rbfb
2
vulnerability VCID-2fdb-zr4u-juga
3
vulnerability VCID-2fjq-fhwy-syav
4
vulnerability VCID-2fzv-2u6c-eyf8
5
vulnerability VCID-2g73-94ue-wbac
6
vulnerability VCID-2n55-tkzw-g7b9
7
vulnerability VCID-2uc7-aypy-jkde
8
vulnerability VCID-2udw-8wht-fbgt
9
vulnerability VCID-2uzz-8f2r-yke6
10
vulnerability VCID-3cf3-4nbu-8ugb
11
vulnerability VCID-3dse-wv2n-suhm
12
vulnerability VCID-3gv3-fegj-1qb4
13
vulnerability VCID-3kpz-hath-rkbu
14
vulnerability VCID-3pmx-vxa8-nbcb
15
vulnerability VCID-3ppf-bdas-6ug3
16
vulnerability VCID-3qa8-r3be-tba7
17
vulnerability VCID-3x9q-5e78-cuak
18
vulnerability VCID-3zd7-1c2k-6bf6
19
vulnerability VCID-4hus-uqjr-1kag
20
vulnerability VCID-4qsk-zyhg-a3dq
21
vulnerability VCID-5fdv-qzac-n7h4
22
vulnerability VCID-5wx8-nzpy-kfhg
23
vulnerability VCID-61yv-hp28-k3a6
24
vulnerability VCID-6mtv-ft8u-q3c6
25
vulnerability VCID-6wcf-8jg2-2yex
26
vulnerability VCID-76wu-nfc9-ebb5
27
vulnerability VCID-7cha-wvmq-jbbr
28
vulnerability VCID-7dwd-t56z-nyga
29
vulnerability VCID-7nfj-4kye-bqd1
30
vulnerability VCID-7pdn-vqkz-m3bf
31
vulnerability VCID-7w4t-zbpu-ryds
32
vulnerability VCID-8438-v2jh-tkhq
33
vulnerability VCID-8618-ufd4-ukb6
34
vulnerability VCID-8a83-3gjn-k3ge
35
vulnerability VCID-8h5u-kf61-nkbg
36
vulnerability VCID-8jtg-kntk-zuhp
37
vulnerability VCID-8nr2-vwxr-17bx
38
vulnerability VCID-8znu-znzw-bbe3
39
vulnerability VCID-91fb-xx5h-ukfx
40
vulnerability VCID-9b24-nsw7-yyfx
41
vulnerability VCID-9efe-yne6-pbct
42
vulnerability VCID-9hpn-u1y1-9bdf
43
vulnerability VCID-9np5-mkt9-tke6
44
vulnerability VCID-9y8q-cnzk-fyht
45
vulnerability VCID-a21v-fxys-5khy
46
vulnerability VCID-a6wc-3mp6-63ek
47
vulnerability VCID-a84m-x697-pqb9
48
vulnerability VCID-afac-ub77-k7c6
49
vulnerability VCID-amqp-krc8-mkc7
50
vulnerability VCID-ands-9hzf-1qgk
51
vulnerability VCID-ax8m-mt4a-efa7
52
vulnerability VCID-b1m6-r1bv-d7gr
53
vulnerability VCID-b7ae-xzrv-3qga
54
vulnerability VCID-bkf4-nqbw-13be
55
vulnerability VCID-bmqy-5rm7-pqhx
56
vulnerability VCID-c2yd-ygs1-1uaf
57
vulnerability VCID-c2zx-s8vs-fbgp
58
vulnerability VCID-c56h-7v77-57b7
59
vulnerability VCID-camp-gyaa-2qf4
60
vulnerability VCID-cg19-degh-gbck
61
vulnerability VCID-cpu9-mxb8-n3a2
62
vulnerability VCID-crjw-es17-qyhq
63
vulnerability VCID-dfgc-ykg1-wfcp
64
vulnerability VCID-dghq-cq9k-9kan
65
vulnerability VCID-dkkq-dwta-nudb
66
vulnerability VCID-dt9f-ns4h-judb
67
vulnerability VCID-dvjx-qaqk-fkhp
68
vulnerability VCID-dxv7-9y1b-pff7
69
vulnerability VCID-e1yx-dxa6-1bba
70
vulnerability VCID-e5f1-7dwg-vfdh
71
vulnerability VCID-eav9-k1cf-8uaq
72
vulnerability VCID-evb5-19yd-dyep
73
vulnerability VCID-f2zj-pup6-x3a3
74
vulnerability VCID-fc7q-fpp2-7yfy
75
vulnerability VCID-fejr-r95x-5bht
76
vulnerability VCID-fftg-8wp1-bqdy
77
vulnerability VCID-fkxb-595t-cbex
78
vulnerability VCID-ftff-7h3z-yyg5
79
vulnerability VCID-gtwk-yznb-s3ed
80
vulnerability VCID-h2bt-bykk-3fgt
81
vulnerability VCID-hb7c-tfkx-sfec
82
vulnerability VCID-hfru-xr8y-efcs
83
vulnerability VCID-hjsb-ex5e-8qfv
84
vulnerability VCID-j6nz-htn7-ubbr
85
vulnerability VCID-j9z8-5zpv-8bhy
86
vulnerability VCID-ja3a-fems-gufe
87
vulnerability VCID-jd4y-wwcw-u3hu
88
vulnerability VCID-je67-ppk3-qqf1
89
vulnerability VCID-jhn7-brer-9fbz
90
vulnerability VCID-jrxs-q15y-pudg
91
vulnerability VCID-jsar-ckqj-67ew
92
vulnerability VCID-jt92-wb33-k3bs
93
vulnerability VCID-juub-pk4e-4bd5
94
vulnerability VCID-jwhg-5nwu-yfb5
95
vulnerability VCID-jwpp-qr3e-ffgn
96
vulnerability VCID-k22n-2xpj-augm
97
vulnerability VCID-kct4-fj4c-7kgv
98
vulnerability VCID-ks2a-sb7b-6yb7
99
vulnerability VCID-ktxr-hy5c-23fz
100
vulnerability VCID-ku1m-f4yh-p7bc
101
vulnerability VCID-kwjd-3gb3-8udq
102
vulnerability VCID-kyt7-ky8c-6ydd
103
vulnerability VCID-m5sv-6fpk-2kfr
104
vulnerability VCID-mdmd-uc64-2uev
105
vulnerability VCID-mebk-ymrs-wkd2
106
vulnerability VCID-muqs-gqsv-wuev
107
vulnerability VCID-mym5-f9ns-t3cn
108
vulnerability VCID-nd4r-zsay-xycv
109
vulnerability VCID-nj59-1wrw-kbd1
110
vulnerability VCID-nyf1-5f2w-q3g1
111
vulnerability VCID-pf5g-cuwm-7bey
112
vulnerability VCID-prza-8x9q-nfhc
113
vulnerability VCID-pshs-rsdz-cufm
114
vulnerability VCID-pw38-hgrj-xua1
115
vulnerability VCID-q12q-umtv-pyb4
116
vulnerability VCID-qb3m-qxb4-vydk
117
vulnerability VCID-qkyd-ehgp-gkgs
118
vulnerability VCID-qn9t-vaqg-tkf8
119
vulnerability VCID-qr8g-acpq-pqfc
120
vulnerability VCID-qswt-y34k-5kc8
121
vulnerability VCID-qt82-aw67-tqhk
122
vulnerability VCID-r3tj-qpxn-dya5
123
vulnerability VCID-rfp8-t93a-2qa4
124
vulnerability VCID-rn74-ggyj-mkf3
125
vulnerability VCID-rtwm-wfwt-c3ez
126
vulnerability VCID-segq-g5me-tfds
127
vulnerability VCID-skq8-j6yq-1bgq
128
vulnerability VCID-sq82-bf47-4yae
129
vulnerability VCID-t42f-1uff-buer
130
vulnerability VCID-t6qx-k3n7-a7en
131
vulnerability VCID-t7b6-9vnd-6be1
132
vulnerability VCID-tft2-nbge-kya2
133
vulnerability VCID-tkuc-9da4-vqdk
134
vulnerability VCID-tr2q-ye8m-8ke7
135
vulnerability VCID-trqz-42v7-3ues
136
vulnerability VCID-tt7k-yzuf-9bc4
137
vulnerability VCID-twh8-87va-juf9
138
vulnerability VCID-uaur-z1tw-v7gk
139
vulnerability VCID-uud1-wmsy-r3fd
140
vulnerability VCID-v2e9-45y6-8qd4
141
vulnerability VCID-vqyx-33vq-fqdt
142
vulnerability VCID-vr7q-u9qz-hua5
143
vulnerability VCID-w2fp-p4vj-q3ar
144
vulnerability VCID-w4q6-336d-z3dh
145
vulnerability VCID-we8p-qdzs-wub4
146
vulnerability VCID-wfkg-16pe-wba2
147
vulnerability VCID-wq9n-kz7d-4ued
148
vulnerability VCID-wxtc-4524-pqb7
149
vulnerability VCID-x4b6-868b-gbbh
150
vulnerability VCID-x7ga-dhyt-9uhr
151
vulnerability VCID-xprc-hqhv-8fc9
152
vulnerability VCID-y21s-gezt-bfeq
153
vulnerability VCID-y93w-et8f-8bgr
154
vulnerability VCID-ykt4-n3sx-v3cd
155
vulnerability VCID-yvbv-c7hx-aqah
156
vulnerability VCID-ze38-fyef-wbcr
157
vulnerability VCID-zed9-s11h-f3bz
158
vulnerability VCID-zncv-7rwk-nket
159
vulnerability VCID-zp2x-b1fa-jqe3
160
vulnerability VCID-zvmd-6wrn-jkcr
161
vulnerability VCID-zzzw-t6t2-qqft
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/java-1.6.0-ibm@1:1.6.0.14.0-1jpp.1%3Farch=el5_9
11
url pkg:rpm/redhat/java-1.6.0-openjdk@1:1.6.0.0-1.36.1.11.9?arch=el5_9
purl pkg:rpm/redhat/java-1.6.0-openjdk@1:1.6.0.0-1.36.1.11.9?arch=el5_9
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6wcf-8jg2-2yex
1
vulnerability VCID-9np5-mkt9-tke6
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/java-1.6.0-openjdk@1:1.6.0.0-1.36.1.11.9%3Farch=el5_9
12
url pkg:rpm/redhat/java-1.6.0-openjdk@1:1.6.0.0-1.57.1.11.9?arch=el6_4
purl pkg:rpm/redhat/java-1.6.0-openjdk@1:1.6.0.0-1.57.1.11.9?arch=el6_4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6wcf-8jg2-2yex
1
vulnerability VCID-9np5-mkt9-tke6
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/java-1.6.0-openjdk@1:1.6.0.0-1.57.1.11.9%3Farch=el6_4
13
url pkg:rpm/redhat/java-1.6.0-sun@1:1.6.0.43-1jpp.1?arch=el5_9
purl pkg:rpm/redhat/java-1.6.0-sun@1:1.6.0.43-1jpp.1?arch=el5_9
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6wcf-8jg2-2yex
1
vulnerability VCID-9np5-mkt9-tke6
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/java-1.6.0-sun@1:1.6.0.43-1jpp.1%3Farch=el5_9
14
url pkg:rpm/redhat/java-1.6.0-sun@1:1.6.0.43-1jpp.1?arch=el6_4
purl pkg:rpm/redhat/java-1.6.0-sun@1:1.6.0.43-1jpp.1?arch=el6_4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6wcf-8jg2-2yex
1
vulnerability VCID-9np5-mkt9-tke6
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/java-1.6.0-sun@1:1.6.0.43-1jpp.1%3Farch=el6_4
15
url pkg:rpm/redhat/java-1.7.0-ibm@1:1.7.0.4.0-1jpp.2?arch=el5_9
purl pkg:rpm/redhat/java-1.7.0-ibm@1:1.7.0.4.0-1jpp.2?arch=el5_9
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-15qm-fyc8-f3da
1
vulnerability VCID-2g73-94ue-wbac
2
vulnerability VCID-3ehy-szsm-qqcd
3
vulnerability VCID-3gv3-fegj-1qb4
4
vulnerability VCID-3zd7-1c2k-6bf6
5
vulnerability VCID-4hus-uqjr-1kag
6
vulnerability VCID-6wcf-8jg2-2yex
7
vulnerability VCID-7dwd-t56z-nyga
8
vulnerability VCID-9b24-nsw7-yyfx
9
vulnerability VCID-9f18-fhez-5qba
10
vulnerability VCID-9np5-mkt9-tke6
11
vulnerability VCID-ands-9hzf-1qgk
12
vulnerability VCID-cb52-8wmv-h3cp
13
vulnerability VCID-cvuc-vk1m-p7eh
14
vulnerability VCID-eav9-k1cf-8uaq
15
vulnerability VCID-hb7c-tfkx-sfec
16
vulnerability VCID-j6nz-htn7-ubbr
17
vulnerability VCID-j9z8-5zpv-8bhy
18
vulnerability VCID-jsar-ckqj-67ew
19
vulnerability VCID-jt92-wb33-k3bs
20
vulnerability VCID-juub-pk4e-4bd5
21
vulnerability VCID-k22n-2xpj-augm
22
vulnerability VCID-mym5-f9ns-t3cn
23
vulnerability VCID-pg5w-ajf1-97fp
24
vulnerability VCID-prza-8x9q-nfhc
25
vulnerability VCID-qb3m-qxb4-vydk
26
vulnerability VCID-rp28-xxta-67gr
27
vulnerability VCID-skq8-j6yq-1bgq
28
vulnerability VCID-t42f-1uff-buer
29
vulnerability VCID-t6qx-k3n7-a7en
30
vulnerability VCID-t7b6-9vnd-6be1
31
vulnerability VCID-tkuc-9da4-vqdk
32
vulnerability VCID-tr2q-ye8m-8ke7
33
vulnerability VCID-trqz-42v7-3ues
34
vulnerability VCID-uaur-z1tw-v7gk
35
vulnerability VCID-vrm5-g1d9-ufey
36
vulnerability VCID-w2fp-p4vj-q3ar
37
vulnerability VCID-wfkg-16pe-wba2
38
vulnerability VCID-xjxt-uybu-27dt
39
vulnerability VCID-zncv-7rwk-nket
40
vulnerability VCID-zxe5-nrnq-e7fz
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/java-1.7.0-ibm@1:1.7.0.4.0-1jpp.2%3Farch=el5_9
16
url pkg:rpm/redhat/java-1.7.0-ibm@1:1.7.0.4.0-1jpp.2?arch=el6_4
purl pkg:rpm/redhat/java-1.7.0-ibm@1:1.7.0.4.0-1jpp.2?arch=el6_4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-15qm-fyc8-f3da
1
vulnerability VCID-2g73-94ue-wbac
2
vulnerability VCID-3ehy-szsm-qqcd
3
vulnerability VCID-3gv3-fegj-1qb4
4
vulnerability VCID-3zd7-1c2k-6bf6
5
vulnerability VCID-4hus-uqjr-1kag
6
vulnerability VCID-6wcf-8jg2-2yex
7
vulnerability VCID-7dwd-t56z-nyga
8
vulnerability VCID-9b24-nsw7-yyfx
9
vulnerability VCID-9f18-fhez-5qba
10
vulnerability VCID-9np5-mkt9-tke6
11
vulnerability VCID-ands-9hzf-1qgk
12
vulnerability VCID-cb52-8wmv-h3cp
13
vulnerability VCID-cvuc-vk1m-p7eh
14
vulnerability VCID-eav9-k1cf-8uaq
15
vulnerability VCID-hb7c-tfkx-sfec
16
vulnerability VCID-j6nz-htn7-ubbr
17
vulnerability VCID-j9z8-5zpv-8bhy
18
vulnerability VCID-jsar-ckqj-67ew
19
vulnerability VCID-jt92-wb33-k3bs
20
vulnerability VCID-juub-pk4e-4bd5
21
vulnerability VCID-k22n-2xpj-augm
22
vulnerability VCID-mym5-f9ns-t3cn
23
vulnerability VCID-pg5w-ajf1-97fp
24
vulnerability VCID-prza-8x9q-nfhc
25
vulnerability VCID-qb3m-qxb4-vydk
26
vulnerability VCID-rp28-xxta-67gr
27
vulnerability VCID-skq8-j6yq-1bgq
28
vulnerability VCID-t42f-1uff-buer
29
vulnerability VCID-t6qx-k3n7-a7en
30
vulnerability VCID-t7b6-9vnd-6be1
31
vulnerability VCID-tkuc-9da4-vqdk
32
vulnerability VCID-tr2q-ye8m-8ke7
33
vulnerability VCID-trqz-42v7-3ues
34
vulnerability VCID-uaur-z1tw-v7gk
35
vulnerability VCID-vrm5-g1d9-ufey
36
vulnerability VCID-w2fp-p4vj-q3ar
37
vulnerability VCID-wfkg-16pe-wba2
38
vulnerability VCID-xjxt-uybu-27dt
39
vulnerability VCID-zncv-7rwk-nket
40
vulnerability VCID-zxe5-nrnq-e7fz
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/java-1.7.0-ibm@1:1.7.0.4.0-1jpp.2%3Farch=el6_4
17
url pkg:rpm/redhat/java-1.7.0-openjdk@1:1.7.0.9-2.3.8.0?arch=el6_4
purl pkg:rpm/redhat/java-1.7.0-openjdk@1:1.7.0.9-2.3.8.0?arch=el6_4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6wcf-8jg2-2yex
1
vulnerability VCID-9np5-mkt9-tke6
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/java-1.7.0-openjdk@1:1.7.0.9-2.3.8.0%3Farch=el6_4
18
url pkg:rpm/redhat/java-1.7.0-openjdk@1:1.7.0.9-2.3.8.0?arch=el5_9
purl pkg:rpm/redhat/java-1.7.0-openjdk@1:1.7.0.9-2.3.8.0?arch=el5_9
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6wcf-8jg2-2yex
1
vulnerability VCID-9np5-mkt9-tke6
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/java-1.7.0-openjdk@1:1.7.0.9-2.3.8.0%3Farch=el5_9
19
url pkg:rpm/redhat/java-1.7.0-oracle@1:1.7.0.17-1jpp.1?arch=el6_4
purl pkg:rpm/redhat/java-1.7.0-oracle@1:1.7.0.17-1jpp.1?arch=el6_4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6wcf-8jg2-2yex
1
vulnerability VCID-9np5-mkt9-tke6
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/java-1.7.0-oracle@1:1.7.0.17-1jpp.1%3Farch=el6_4
20
url pkg:rpm/redhat/java-1.7.0-oracle@1:1.7.0.17-1jpp.1?arch=el5_9
purl pkg:rpm/redhat/java-1.7.0-oracle@1:1.7.0.17-1jpp.1?arch=el5_9
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6wcf-8jg2-2yex
1
vulnerability VCID-9np5-mkt9-tke6
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/java-1.7.0-oracle@1:1.7.0.17-1jpp.1%3Farch=el5_9
References
0
reference_url http://blog.fireeye.com/research/2013/02/yaj0-yet-another-java-zero-day-2.html
reference_id
reference_type
scores
url http://blog.fireeye.com/research/2013/02/yaj0-yet-another-java-zero-day-2.html
1
reference_url http://h20565.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c04117626-1
reference_id
reference_type
scores
url http://h20565.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c04117626-1
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00009.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00009.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00011.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00011.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00012.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00012.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00020.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00020.html
6
reference_url http://mail.openjdk.java.net/pipermail/distro-pkg-dev/2013-March/022145.html
reference_id
reference_type
scores
url http://mail.openjdk.java.net/pipermail/distro-pkg-dev/2013-March/022145.html
7
reference_url http://marc.info/?l=bugtraq&m=136439120408139&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=136439120408139&w=2
8
reference_url http://marc.info/?l=bugtraq&m=136570436423916&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=136570436423916&w=2
9
reference_url http://rhn.redhat.com/errata/RHSA-2013-0601.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2013-0601.html
10
reference_url http://rhn.redhat.com/errata/RHSA-2013-0603.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2013-0603.html
11
reference_url http://rhn.redhat.com/errata/RHSA-2013-0604.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2013-0604.html
12
reference_url http://rhn.redhat.com/errata/RHSA-2013-1455.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2013-1455.html
13
reference_url http://rhn.redhat.com/errata/RHSA-2013-1456.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2013-1456.html
14
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1493.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1493.json
15
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-1493
reference_id
reference_type
scores
0
value 0.92663
scoring_system epss
scoring_elements 0.99746
published_at 2026-04-02T12:55:00Z
1
value 0.92663
scoring_system epss
scoring_elements 0.99747
published_at 2026-04-04T12:55:00Z
2
value 0.92979
scoring_system epss
scoring_elements 0.99779
published_at 2026-04-13T12:55:00Z
3
value 0.92979
scoring_system epss
scoring_elements 0.9978
published_at 2026-04-16T12:55:00Z
4
value 0.92979
scoring_system epss
scoring_elements 0.99781
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-1493
16
reference_url http://security.gentoo.org/glsa/glsa-201406-32.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201406-32.xml
17
reference_url https://krebsonsecurity.com/2013/03/new-java-0-day-attack-echoes-bit9-breach/
reference_id
reference_type
scores
url https://krebsonsecurity.com/2013/03/new-java-0-day-attack-echoes-bit9-breach/
18
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19246
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19246
19
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19477
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19477
20
reference_url https://twitter.com/jduck1337/status/307629902574800897
reference_id
reference_type
scores
url https://twitter.com/jduck1337/status/307629902574800897
21
reference_url https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0088
reference_id
reference_type
scores
url https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0088
22
reference_url http://www.exploit-db.com/exploits/24904
reference_id
reference_type
scores
url http://www.exploit-db.com/exploits/24904
23
reference_url http://www.kb.cert.org/vuls/id/688246
reference_id
reference_type
scores
url http://www.kb.cert.org/vuls/id/688246
24
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2013:095
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2013:095
25
reference_url http://www.oracle.com/ocom/groups/public/%40otn/documents/webcontent/1915099.xml
reference_id
reference_type
scores
url http://www.oracle.com/ocom/groups/public/%40otn/documents/webcontent/1915099.xml
26
reference_url http://www.oracle.com/technetwork/topics/security/alert-cve-2013-1493-1915081.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/alert-cve-2013-1493-1915081.html
27
reference_url http://www.securityfocus.com/bid/58238
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/58238
28
reference_url http://www.securitytracker.com/id/1029803
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1029803
29
reference_url http://www.symantec.com/connect/blogs/latest-java-zero-day-shares-connections-bit9-security-incident
reference_id
reference_type
scores
url http://www.symantec.com/connect/blogs/latest-java-zero-day-shares-connections-bit9-security-incident
30
reference_url http://www.ubuntu.com/usn/USN-1755-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1755-2
31
reference_url http://www.us-cert.gov/ncas/alerts/TA13-064A
reference_id
reference_type
scores
url http://www.us-cert.gov/ncas/alerts/TA13-064A
32
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=917553
reference_id 917553
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=917553
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.5.0:update36:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.5.0:update36:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.5.0:update36:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.5.0:update38:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.5.0:update38:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.5.0:update38:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update22:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.6.0:update22:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update22:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update23:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.6.0:update23:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update23:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update24:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.6.0:update24:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update24:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update25:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.6.0:update25:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update25:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update26:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.6.0:update26:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update26:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update27:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.6.0:update27:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update27:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update29:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.6.0:update29:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update29:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update30:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.6.0:update30:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update30:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update31:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.6.0:update31:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update31:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update32:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.6.0:update32:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update32:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update33:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.6.0:update33:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update33:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update34:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.6.0:update34:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update34:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update35:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.6.0:update35:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update35:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update37:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.6.0:update37:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update37:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update38:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.6.0:update38:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update38:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update39:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.6.0:update39:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update39:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update1:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.7.0:update1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update1:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update10:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.7.0:update10:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update10:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update11:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.7.0:update11:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update11:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update13:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.7.0:update13:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update13:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update2:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.7.0:update2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update2:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update3:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.7.0:update3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update3:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update4:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.7.0:update4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update4:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update5:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.7.0:update5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update5:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update6:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.7.0:update6:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update6:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update7:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.7.0:update7:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update7:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update9:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.7.0:update9:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update9:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:*:update15:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:*:update15:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:*:update15:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:*:update40:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:*:update40:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:*:update40:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:*:update41:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:*:update41:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:*:update41:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.5.0:update36:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.5.0:update36:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.5.0:update36:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.5.0:update38:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.5.0:update38:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.5.0:update38:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update22:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.6.0:update22:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update22:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update23:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.6.0:update23:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update23:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update24:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.6.0:update24:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update24:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update25:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.6.0:update25:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update25:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update26:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.6.0:update26:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update26:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update27:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.6.0:update27:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update27:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update29:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.6.0:update29:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update29:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update30:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.6.0:update30:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update30:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update31:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.6.0:update31:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update31:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update32:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.6.0:update32:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update32:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update33:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.6.0:update33:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update33:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update34:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.6.0:update34:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update34:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update35:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.6.0:update35:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update35:*:*:*:*:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update37:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.6.0:update37:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update37:*:*:*:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update38:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.6.0:update38:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update38:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update39:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.6.0:update39:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update39:*:*:*:*:*:*
84
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:*:*:*:*:*:*:*
85
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update1:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.7.0:update1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update1:*:*:*:*:*:*
86
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update10:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.7.0:update10:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update10:*:*:*:*:*:*
87
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update11:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.7.0:update11:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update11:*:*:*:*:*:*
88
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update13:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.7.0:update13:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update13:*:*:*:*:*:*
89
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update2:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.7.0:update2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update2:*:*:*:*:*:*
90
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update3:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.7.0:update3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update3:*:*:*:*:*:*
91
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update4:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.7.0:update4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update4:*:*:*:*:*:*
92
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update5:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.7.0:update5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update5:*:*:*:*:*:*
93
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update6:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.7.0:update6:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update6:*:*:*:*:*:*
94
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update7:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.7.0:update7:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update7:*:*:*:*:*:*
95
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update9:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.7.0:update9:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update9:*:*:*:*:*:*
96
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:*:update15:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:*:update15:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:*:update15:*:*:*:*:*:*
97
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:*:update40:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:*:update40:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:*:update40:*:*:*:*:*:*
98
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:*:update41:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:*:update41:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:*:update41:*:*:*:*:*:*
99
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jdk:1.5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.5.0:*:*:*:*:*:*:*
100
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.5.0:update1:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jdk:1.5.0:update1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.5.0:update1:*:*:*:*:*:*
101
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.5.0:update10:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jdk:1.5.0:update10:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.5.0:update10:*:*:*:*:*:*
102
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.5.0:update11:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jdk:1.5.0:update11:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.5.0:update11:*:*:*:*:*:*
103
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.5.0:update11_b03:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jdk:1.5.0:update11_b03:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.5.0:update11_b03:*:*:*:*:*:*
104
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.5.0:update12:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jdk:1.5.0:update12:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.5.0:update12:*:*:*:*:*:*
105
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.5.0:update13:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jdk:1.5.0:update13:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.5.0:update13:*:*:*:*:*:*
106
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.5.0:update14:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jdk:1.5.0:update14:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.5.0:update14:*:*:*:*:*:*
107
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.5.0:update15:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jdk:1.5.0:update15:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.5.0:update15:*:*:*:*:*:*
108
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.5.0:update16:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jdk:1.5.0:update16:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.5.0:update16:*:*:*:*:*:*
109
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.5.0:update17:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jdk:1.5.0:update17:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.5.0:update17:*:*:*:*:*:*
110
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.5.0:update18:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jdk:1.5.0:update18:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.5.0:update18:*:*:*:*:*:*
111
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.5.0:update19:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jdk:1.5.0:update19:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.5.0:update19:*:*:*:*:*:*
112
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.5.0:update2:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jdk:1.5.0:update2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.5.0:update2:*:*:*:*:*:*
113
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.5.0:update20:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jdk:1.5.0:update20:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.5.0:update20:*:*:*:*:*:*
114
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.5.0:update21:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jdk:1.5.0:update21:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.5.0:update21:*:*:*:*:*:*
115
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.5.0:update22:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jdk:1.5.0:update22:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.5.0:update22:*:*:*:*:*:*
116
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.5.0:update23:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jdk:1.5.0:update23:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.5.0:update23:*:*:*:*:*:*
117
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.5.0:update24:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jdk:1.5.0:update24:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.5.0:update24:*:*:*:*:*:*
118
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.5.0:update25:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jdk:1.5.0:update25:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.5.0:update25:*:*:*:*:*:*
119
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.5.0:update26:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jdk:1.5.0:update26:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.5.0:update26:*:*:*:*:*:*
120
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.5.0:update27:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jdk:1.5.0:update27:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.5.0:update27:*:*:*:*:*:*
121
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.5.0:update28:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jdk:1.5.0:update28:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.5.0:update28:*:*:*:*:*:*
122
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.5.0:update29:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jdk:1.5.0:update29:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.5.0:update29:*:*:*:*:*:*
123
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.5.0:update3:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jdk:1.5.0:update3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.5.0:update3:*:*:*:*:*:*
124
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.5.0:update31:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jdk:1.5.0:update31:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.5.0:update31:*:*:*:*:*:*
125
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.5.0:update33:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jdk:1.5.0:update33:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.5.0:update33:*:*:*:*:*:*
126
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.5.0:update4:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jdk:1.5.0:update4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.5.0:update4:*:*:*:*:*:*
127
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.5.0:update5:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jdk:1.5.0:update5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.5.0:update5:*:*:*:*:*:*
128
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.5.0:update6:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jdk:1.5.0:update6:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.5.0:update6:*:*:*:*:*:*
129
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.5.0:update7:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jdk:1.5.0:update7:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.5.0:update7:*:*:*:*:*:*
130
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.5.0:update7_b03:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jdk:1.5.0:update7_b03:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.5.0:update7_b03:*:*:*:*:*:*
131
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.5.0:update8:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jdk:1.5.0:update8:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.5.0:update8:*:*:*:*:*:*
132
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.5.0:update9:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jdk:1.5.0:update9:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.5.0:update9:*:*:*:*:*:*
133
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jdk:1.6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:*:*:*:*:*:*:*
134
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update1:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jdk:1.6.0:update1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update1:*:*:*:*:*:*
135
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_10:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jdk:1.6.0:update_10:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_10:*:*:*:*:*:*
136
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_11:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jdk:1.6.0:update_11:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_11:*:*:*:*:*:*
137
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_12:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jdk:1.6.0:update_12:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_12:*:*:*:*:*:*
138
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_13:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jdk:1.6.0:update_13:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_13:*:*:*:*:*:*
139
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_14:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jdk:1.6.0:update_14:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_14:*:*:*:*:*:*
140
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_15:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jdk:1.6.0:update_15:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_15:*:*:*:*:*:*
141
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_16:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jdk:1.6.0:update_16:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_16:*:*:*:*:*:*
142
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_17:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jdk:1.6.0:update_17:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_17:*:*:*:*:*:*
143
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_18:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jdk:1.6.0:update_18:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_18:*:*:*:*:*:*
144
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_19:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jdk:1.6.0:update_19:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_19:*:*:*:*:*:*
145
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update1_b06:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jdk:1.6.0:update1_b06:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update1_b06:*:*:*:*:*:*
146
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update2:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jdk:1.6.0:update2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update2:*:*:*:*:*:*
147
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_20:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jdk:1.6.0:update_20:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_20:*:*:*:*:*:*
148
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_21:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jdk:1.6.0:update_21:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_21:*:*:*:*:*:*
149
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_3:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jdk:1.6.0:update_3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_3:*:*:*:*:*:*
150
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_4:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jdk:1.6.0:update_4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_4:*:*:*:*:*:*
151
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_5:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jdk:1.6.0:update_5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_5:*:*:*:*:*:*
152
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_6:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jdk:1.6.0:update_6:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_6:*:*:*:*:*:*
153
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_7:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jdk:1.6.0:update_7:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_7:*:*:*:*:*:*
154
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jre:1.5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.5.0:*:*:*:*:*:*:*
155
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.5.0:update1:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jre:1.5.0:update1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.5.0:update1:*:*:*:*:*:*
156
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.5.0:update10:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jre:1.5.0:update10:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.5.0:update10:*:*:*:*:*:*
157
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.5.0:update11:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jre:1.5.0:update11:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.5.0:update11:*:*:*:*:*:*
158
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.5.0:update12:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jre:1.5.0:update12:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.5.0:update12:*:*:*:*:*:*
159
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.5.0:update13:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jre:1.5.0:update13:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.5.0:update13:*:*:*:*:*:*
160
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.5.0:update14:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jre:1.5.0:update14:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.5.0:update14:*:*:*:*:*:*
161
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.5.0:update15:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jre:1.5.0:update15:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.5.0:update15:*:*:*:*:*:*
162
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.5.0:update16:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jre:1.5.0:update16:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.5.0:update16:*:*:*:*:*:*
163
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.5.0:update17:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jre:1.5.0:update17:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.5.0:update17:*:*:*:*:*:*
164
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.5.0:update18:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jre:1.5.0:update18:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.5.0:update18:*:*:*:*:*:*
165
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.5.0:update19:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jre:1.5.0:update19:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.5.0:update19:*:*:*:*:*:*
166
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.5.0:update2:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jre:1.5.0:update2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.5.0:update2:*:*:*:*:*:*
167
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.5.0:update20:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jre:1.5.0:update20:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.5.0:update20:*:*:*:*:*:*
168
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.5.0:update21:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jre:1.5.0:update21:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.5.0:update21:*:*:*:*:*:*
169
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.5.0:update22:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jre:1.5.0:update22:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.5.0:update22:*:*:*:*:*:*
170
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.5.0:update23:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jre:1.5.0:update23:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.5.0:update23:*:*:*:*:*:*
171
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.5.0:update24:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jre:1.5.0:update24:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.5.0:update24:*:*:*:*:*:*
172
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.5.0:update25:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jre:1.5.0:update25:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.5.0:update25:*:*:*:*:*:*
173
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.5.0:update26:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jre:1.5.0:update26:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.5.0:update26:*:*:*:*:*:*
174
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.5.0:update27:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jre:1.5.0:update27:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.5.0:update27:*:*:*:*:*:*
175
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.5.0:update28:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jre:1.5.0:update28:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.5.0:update28:*:*:*:*:*:*
176
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.5.0:update29:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jre:1.5.0:update29:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.5.0:update29:*:*:*:*:*:*
177
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.5.0:update3:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jre:1.5.0:update3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.5.0:update3:*:*:*:*:*:*
178
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.5.0:update31:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jre:1.5.0:update31:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.5.0:update31:*:*:*:*:*:*
179
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.5.0:update33:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jre:1.5.0:update33:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.5.0:update33:*:*:*:*:*:*
180
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.5.0:update4:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jre:1.5.0:update4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.5.0:update4:*:*:*:*:*:*
181
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.5.0:update5:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jre:1.5.0:update5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.5.0:update5:*:*:*:*:*:*
182
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.5.0:update6:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jre:1.5.0:update6:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.5.0:update6:*:*:*:*:*:*
183
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.5.0:update7:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jre:1.5.0:update7:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.5.0:update7:*:*:*:*:*:*
184
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.5.0:update8:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jre:1.5.0:update8:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.5.0:update8:*:*:*:*:*:*
185
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.5.0:update9:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jre:1.5.0:update9:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.5.0:update9:*:*:*:*:*:*
186
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jre:1.6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:*:*:*:*:*:*:*
187
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:*
188
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_10:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jre:1.6.0:update_10:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_10:*:*:*:*:*:*
189
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_11:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jre:1.6.0:update_11:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_11:*:*:*:*:*:*
190
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_12:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jre:1.6.0:update_12:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_12:*:*:*:*:*:*
191
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_13:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jre:1.6.0:update_13:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_13:*:*:*:*:*:*
192
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_14:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jre:1.6.0:update_14:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_14:*:*:*:*:*:*
193
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_15:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jre:1.6.0:update_15:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_15:*:*:*:*:*:*
194
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_16:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jre:1.6.0:update_16:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_16:*:*:*:*:*:*
195
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_17:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jre:1.6.0:update_17:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_17:*:*:*:*:*:*
196
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_18:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jre:1.6.0:update_18:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_18:*:*:*:*:*:*
197
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_19:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jre:1.6.0:update_19:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_19:*:*:*:*:*:*
198
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_2:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jre:1.6.0:update_2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_2:*:*:*:*:*:*
199
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_20:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jre:1.6.0:update_20:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_20:*:*:*:*:*:*
200
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_21:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jre:1.6.0:update_21:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_21:*:*:*:*:*:*
201
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_3:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jre:1.6.0:update_3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_3:*:*:*:*:*:*
202
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_4:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jre:1.6.0:update_4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_4:*:*:*:*:*:*
203
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_5:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jre:1.6.0:update_5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_5:*:*:*:*:*:*
204
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_6:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jre:1.6.0:update_6:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_6:*:*:*:*:*:*
205
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_7:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jre:1.6.0:update_7:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_7:*:*:*:*:*:*
206
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_9:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jre:1.6.0:update_9:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_9:*:*:*:*:*:*
207
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-1493
reference_id CVE-2013-1493
reference_type
scores
0
value 10.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2013-1493
208
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/remote/24904.rb
reference_id CVE-2013-1493;OSVDB-90737
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/remote/24904.rb
209
reference_url https://security.gentoo.org/glsa/201401-30
reference_id GLSA-201401-30
reference_type
scores
url https://security.gentoo.org/glsa/201401-30
210
reference_url https://security.gentoo.org/glsa/201406-32
reference_id GLSA-201406-32
reference_type
scores
url https://security.gentoo.org/glsa/201406-32
211
reference_url https://access.redhat.com/errata/RHSA-2013:0600
reference_id RHSA-2013:0600
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:0600
212
reference_url https://access.redhat.com/errata/RHSA-2013:0601
reference_id RHSA-2013:0601
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:0601
213
reference_url https://access.redhat.com/errata/RHSA-2013:0602
reference_id RHSA-2013:0602
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:0602
214
reference_url https://access.redhat.com/errata/RHSA-2013:0603
reference_id RHSA-2013:0603
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:0603
215
reference_url https://access.redhat.com/errata/RHSA-2013:0604
reference_id RHSA-2013:0604
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:0604
216
reference_url https://access.redhat.com/errata/RHSA-2013:0605
reference_id RHSA-2013:0605
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:0605
217
reference_url https://access.redhat.com/errata/RHSA-2013:0624
reference_id RHSA-2013:0624
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:0624
218
reference_url https://access.redhat.com/errata/RHSA-2013:0625
reference_id RHSA-2013:0625
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:0625
219
reference_url https://access.redhat.com/errata/RHSA-2013:0626
reference_id RHSA-2013:0626
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:0626
220
reference_url https://access.redhat.com/errata/RHSA-2013:1455
reference_id RHSA-2013:1455
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1455
221
reference_url https://access.redhat.com/errata/RHSA-2013:1456
reference_id RHSA-2013:1456
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1456
222
reference_url https://usn.ubuntu.com/1755-1/
reference_id USN-1755-1
reference_type
scores
url https://usn.ubuntu.com/1755-1/
223
reference_url https://usn.ubuntu.com/1755-2/
reference_id USN-1755-2
reference_type
scores
url https://usn.ubuntu.com/1755-2/
Weaknesses
0
cwe_id 119
name Improper Restriction of Operations within the Bounds of a Memory Buffer
description The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Exploits
0
date_added 2013-03-29
description Java CMM - Remote Code Execution (Metasploit)
required_action null
due_date null
notes null
known_ransomware_campaign_use true
source_date_published 2013-03-29
exploit_type remote
platform windows
source_date_updated 2013-03-29
data_source Exploit-DB
source_url
1
date_added null
description
This module abuses the Color Management classes from a Java Applet to run
          arbitrary Java code outside of the sandbox as exploited in the wild in February
          and March of 2013. The vulnerability affects Java version 7u15 and earlier and 6u41
          and earlier and has been tested successfully on Windows XP SP3 and Windows 7 SP1
          systems. This exploit doesn't bypass click-to-play, so the user must accept the java
          warning in order to run the malicious applet.
required_action null
due_date null
notes
Reliability:
  - unknown-reliability
Stability:
  - unknown-stability
SideEffects:
  - unknown-side-effects
known_ransomware_campaign_use false
source_date_published 2013-03-01
exploit_type null
platform Java,Windows
source_date_updated null
data_source Metasploit
source_url https://github.com/rapid7/metasploit-framework/tree/master/modules/exploits/windows/browser/java_cmm.rb
Severity_range_score10.0 - 10.0
Exploitability2.0
Weighted_severity9.0
Risk_score10.0
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-6wcf-8jg2-2yex