Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-x7ga-dhyt-9uhr
SummaryJDK: Unspecified security fixes (July 2013)
Aliases
0
alias CVE-2013-3011
Fixed_packages
Affected_packages
0
url pkg:rpm/redhat/java-1.5.0-ibm@1:1.5.0.16.3-1jpp.1?arch=el5_9
purl pkg:rpm/redhat/java-1.5.0-ibm@1:1.5.0.16.3-1jpp.1?arch=el5_9
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1m3h-7qcm-rbfb
1
vulnerability VCID-3dse-wv2n-suhm
2
vulnerability VCID-3kpz-hath-rkbu
3
vulnerability VCID-3pmx-vxa8-nbcb
4
vulnerability VCID-7nfj-4kye-bqd1
5
vulnerability VCID-7pdn-vqkz-m3bf
6
vulnerability VCID-7w4t-zbpu-ryds
7
vulnerability VCID-8nr2-vwxr-17bx
8
vulnerability VCID-9y8q-cnzk-fyht
9
vulnerability VCID-a6wc-3mp6-63ek
10
vulnerability VCID-a84m-x697-pqb9
11
vulnerability VCID-amqp-krc8-mkc7
12
vulnerability VCID-c2yd-ygs1-1uaf
13
vulnerability VCID-dghq-cq9k-9kan
14
vulnerability VCID-fkxb-595t-cbex
15
vulnerability VCID-jwpp-qr3e-ffgn
16
vulnerability VCID-ks2a-sb7b-6yb7
17
vulnerability VCID-kwjd-3gb3-8udq
18
vulnerability VCID-qkyd-ehgp-gkgs
19
vulnerability VCID-rfp8-t93a-2qa4
20
vulnerability VCID-rn74-ggyj-mkf3
21
vulnerability VCID-sq82-bf47-4yae
22
vulnerability VCID-twh8-87va-juf9
23
vulnerability VCID-x7ga-dhyt-9uhr
24
vulnerability VCID-zp2x-b1fa-jqe3
25
vulnerability VCID-zvmd-6wrn-jkcr
26
vulnerability VCID-zzzw-t6t2-qqft
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/java-1.5.0-ibm@1:1.5.0.16.3-1jpp.1%3Farch=el5_9
1
url pkg:rpm/redhat/java-1.5.0-ibm@1:1.5.0.16.3-1jpp.1?arch=el6_4
purl pkg:rpm/redhat/java-1.5.0-ibm@1:1.5.0.16.3-1jpp.1?arch=el6_4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1m3h-7qcm-rbfb
1
vulnerability VCID-3dse-wv2n-suhm
2
vulnerability VCID-3kpz-hath-rkbu
3
vulnerability VCID-3pmx-vxa8-nbcb
4
vulnerability VCID-7nfj-4kye-bqd1
5
vulnerability VCID-7pdn-vqkz-m3bf
6
vulnerability VCID-7w4t-zbpu-ryds
7
vulnerability VCID-8nr2-vwxr-17bx
8
vulnerability VCID-9y8q-cnzk-fyht
9
vulnerability VCID-a6wc-3mp6-63ek
10
vulnerability VCID-a84m-x697-pqb9
11
vulnerability VCID-amqp-krc8-mkc7
12
vulnerability VCID-c2yd-ygs1-1uaf
13
vulnerability VCID-dghq-cq9k-9kan
14
vulnerability VCID-fkxb-595t-cbex
15
vulnerability VCID-jwpp-qr3e-ffgn
16
vulnerability VCID-ks2a-sb7b-6yb7
17
vulnerability VCID-kwjd-3gb3-8udq
18
vulnerability VCID-qkyd-ehgp-gkgs
19
vulnerability VCID-rfp8-t93a-2qa4
20
vulnerability VCID-rn74-ggyj-mkf3
21
vulnerability VCID-sq82-bf47-4yae
22
vulnerability VCID-twh8-87va-juf9
23
vulnerability VCID-x7ga-dhyt-9uhr
24
vulnerability VCID-zp2x-b1fa-jqe3
25
vulnerability VCID-zvmd-6wrn-jkcr
26
vulnerability VCID-zzzw-t6t2-qqft
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/java-1.5.0-ibm@1:1.5.0.16.3-1jpp.1%3Farch=el6_4
2
url pkg:rpm/redhat/java-1.6.0-ibm@1:1.6.0.14.0-1jpp.1?arch=el5_9
purl pkg:rpm/redhat/java-1.6.0-ibm@1:1.6.0.14.0-1jpp.1?arch=el5_9
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-15qm-fyc8-f3da
1
vulnerability VCID-1m3h-7qcm-rbfb
2
vulnerability VCID-2fdb-zr4u-juga
3
vulnerability VCID-2fjq-fhwy-syav
4
vulnerability VCID-2fzv-2u6c-eyf8
5
vulnerability VCID-2g73-94ue-wbac
6
vulnerability VCID-2n55-tkzw-g7b9
7
vulnerability VCID-2uc7-aypy-jkde
8
vulnerability VCID-2udw-8wht-fbgt
9
vulnerability VCID-2uzz-8f2r-yke6
10
vulnerability VCID-3cf3-4nbu-8ugb
11
vulnerability VCID-3dse-wv2n-suhm
12
vulnerability VCID-3gv3-fegj-1qb4
13
vulnerability VCID-3kpz-hath-rkbu
14
vulnerability VCID-3pmx-vxa8-nbcb
15
vulnerability VCID-3ppf-bdas-6ug3
16
vulnerability VCID-3qa8-r3be-tba7
17
vulnerability VCID-3x9q-5e78-cuak
18
vulnerability VCID-3zd7-1c2k-6bf6
19
vulnerability VCID-4hus-uqjr-1kag
20
vulnerability VCID-4qsk-zyhg-a3dq
21
vulnerability VCID-5fdv-qzac-n7h4
22
vulnerability VCID-5wx8-nzpy-kfhg
23
vulnerability VCID-61yv-hp28-k3a6
24
vulnerability VCID-6mtv-ft8u-q3c6
25
vulnerability VCID-6wcf-8jg2-2yex
26
vulnerability VCID-76wu-nfc9-ebb5
27
vulnerability VCID-7cha-wvmq-jbbr
28
vulnerability VCID-7dwd-t56z-nyga
29
vulnerability VCID-7nfj-4kye-bqd1
30
vulnerability VCID-7pdn-vqkz-m3bf
31
vulnerability VCID-7w4t-zbpu-ryds
32
vulnerability VCID-8438-v2jh-tkhq
33
vulnerability VCID-8618-ufd4-ukb6
34
vulnerability VCID-8a83-3gjn-k3ge
35
vulnerability VCID-8h5u-kf61-nkbg
36
vulnerability VCID-8jtg-kntk-zuhp
37
vulnerability VCID-8nr2-vwxr-17bx
38
vulnerability VCID-8znu-znzw-bbe3
39
vulnerability VCID-91fb-xx5h-ukfx
40
vulnerability VCID-9b24-nsw7-yyfx
41
vulnerability VCID-9efe-yne6-pbct
42
vulnerability VCID-9hpn-u1y1-9bdf
43
vulnerability VCID-9np5-mkt9-tke6
44
vulnerability VCID-9y8q-cnzk-fyht
45
vulnerability VCID-a21v-fxys-5khy
46
vulnerability VCID-a6wc-3mp6-63ek
47
vulnerability VCID-a84m-x697-pqb9
48
vulnerability VCID-afac-ub77-k7c6
49
vulnerability VCID-amqp-krc8-mkc7
50
vulnerability VCID-ands-9hzf-1qgk
51
vulnerability VCID-ax8m-mt4a-efa7
52
vulnerability VCID-b1m6-r1bv-d7gr
53
vulnerability VCID-b7ae-xzrv-3qga
54
vulnerability VCID-bkf4-nqbw-13be
55
vulnerability VCID-bmqy-5rm7-pqhx
56
vulnerability VCID-c2yd-ygs1-1uaf
57
vulnerability VCID-c2zx-s8vs-fbgp
58
vulnerability VCID-c56h-7v77-57b7
59
vulnerability VCID-camp-gyaa-2qf4
60
vulnerability VCID-cg19-degh-gbck
61
vulnerability VCID-cpu9-mxb8-n3a2
62
vulnerability VCID-crjw-es17-qyhq
63
vulnerability VCID-dfgc-ykg1-wfcp
64
vulnerability VCID-dghq-cq9k-9kan
65
vulnerability VCID-dkkq-dwta-nudb
66
vulnerability VCID-dt9f-ns4h-judb
67
vulnerability VCID-dvjx-qaqk-fkhp
68
vulnerability VCID-dxv7-9y1b-pff7
69
vulnerability VCID-e1yx-dxa6-1bba
70
vulnerability VCID-e5f1-7dwg-vfdh
71
vulnerability VCID-eav9-k1cf-8uaq
72
vulnerability VCID-evb5-19yd-dyep
73
vulnerability VCID-f2zj-pup6-x3a3
74
vulnerability VCID-fc7q-fpp2-7yfy
75
vulnerability VCID-fejr-r95x-5bht
76
vulnerability VCID-fftg-8wp1-bqdy
77
vulnerability VCID-fkxb-595t-cbex
78
vulnerability VCID-ftff-7h3z-yyg5
79
vulnerability VCID-gtwk-yznb-s3ed
80
vulnerability VCID-h2bt-bykk-3fgt
81
vulnerability VCID-hb7c-tfkx-sfec
82
vulnerability VCID-hfru-xr8y-efcs
83
vulnerability VCID-hjsb-ex5e-8qfv
84
vulnerability VCID-j6nz-htn7-ubbr
85
vulnerability VCID-j9z8-5zpv-8bhy
86
vulnerability VCID-ja3a-fems-gufe
87
vulnerability VCID-jd4y-wwcw-u3hu
88
vulnerability VCID-je67-ppk3-qqf1
89
vulnerability VCID-jhn7-brer-9fbz
90
vulnerability VCID-jrxs-q15y-pudg
91
vulnerability VCID-jsar-ckqj-67ew
92
vulnerability VCID-jt92-wb33-k3bs
93
vulnerability VCID-juub-pk4e-4bd5
94
vulnerability VCID-jwhg-5nwu-yfb5
95
vulnerability VCID-jwpp-qr3e-ffgn
96
vulnerability VCID-k22n-2xpj-augm
97
vulnerability VCID-kct4-fj4c-7kgv
98
vulnerability VCID-ks2a-sb7b-6yb7
99
vulnerability VCID-ktxr-hy5c-23fz
100
vulnerability VCID-ku1m-f4yh-p7bc
101
vulnerability VCID-kwjd-3gb3-8udq
102
vulnerability VCID-kyt7-ky8c-6ydd
103
vulnerability VCID-m5sv-6fpk-2kfr
104
vulnerability VCID-mdmd-uc64-2uev
105
vulnerability VCID-mebk-ymrs-wkd2
106
vulnerability VCID-muqs-gqsv-wuev
107
vulnerability VCID-mym5-f9ns-t3cn
108
vulnerability VCID-nd4r-zsay-xycv
109
vulnerability VCID-nj59-1wrw-kbd1
110
vulnerability VCID-nyf1-5f2w-q3g1
111
vulnerability VCID-pf5g-cuwm-7bey
112
vulnerability VCID-prza-8x9q-nfhc
113
vulnerability VCID-pshs-rsdz-cufm
114
vulnerability VCID-pw38-hgrj-xua1
115
vulnerability VCID-q12q-umtv-pyb4
116
vulnerability VCID-qb3m-qxb4-vydk
117
vulnerability VCID-qkyd-ehgp-gkgs
118
vulnerability VCID-qn9t-vaqg-tkf8
119
vulnerability VCID-qr8g-acpq-pqfc
120
vulnerability VCID-qswt-y34k-5kc8
121
vulnerability VCID-qt82-aw67-tqhk
122
vulnerability VCID-r3tj-qpxn-dya5
123
vulnerability VCID-rfp8-t93a-2qa4
124
vulnerability VCID-rn74-ggyj-mkf3
125
vulnerability VCID-rtwm-wfwt-c3ez
126
vulnerability VCID-segq-g5me-tfds
127
vulnerability VCID-skq8-j6yq-1bgq
128
vulnerability VCID-sq82-bf47-4yae
129
vulnerability VCID-t42f-1uff-buer
130
vulnerability VCID-t6qx-k3n7-a7en
131
vulnerability VCID-t7b6-9vnd-6be1
132
vulnerability VCID-tft2-nbge-kya2
133
vulnerability VCID-tkuc-9da4-vqdk
134
vulnerability VCID-tr2q-ye8m-8ke7
135
vulnerability VCID-trqz-42v7-3ues
136
vulnerability VCID-tt7k-yzuf-9bc4
137
vulnerability VCID-twh8-87va-juf9
138
vulnerability VCID-uaur-z1tw-v7gk
139
vulnerability VCID-uud1-wmsy-r3fd
140
vulnerability VCID-v2e9-45y6-8qd4
141
vulnerability VCID-vqyx-33vq-fqdt
142
vulnerability VCID-vr7q-u9qz-hua5
143
vulnerability VCID-w2fp-p4vj-q3ar
144
vulnerability VCID-w4q6-336d-z3dh
145
vulnerability VCID-we8p-qdzs-wub4
146
vulnerability VCID-wfkg-16pe-wba2
147
vulnerability VCID-wq9n-kz7d-4ued
148
vulnerability VCID-wxtc-4524-pqb7
149
vulnerability VCID-x4b6-868b-gbbh
150
vulnerability VCID-x7ga-dhyt-9uhr
151
vulnerability VCID-xprc-hqhv-8fc9
152
vulnerability VCID-y21s-gezt-bfeq
153
vulnerability VCID-y93w-et8f-8bgr
154
vulnerability VCID-ykt4-n3sx-v3cd
155
vulnerability VCID-yvbv-c7hx-aqah
156
vulnerability VCID-ze38-fyef-wbcr
157
vulnerability VCID-zed9-s11h-f3bz
158
vulnerability VCID-zncv-7rwk-nket
159
vulnerability VCID-zp2x-b1fa-jqe3
160
vulnerability VCID-zvmd-6wrn-jkcr
161
vulnerability VCID-zzzw-t6t2-qqft
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/java-1.6.0-ibm@1:1.6.0.14.0-1jpp.1%3Farch=el5_9
3
url pkg:rpm/redhat/java-1.6.0-ibm@1:1.6.0.14.0-1jpp.1?arch=el6_4
purl pkg:rpm/redhat/java-1.6.0-ibm@1:1.6.0.14.0-1jpp.1?arch=el6_4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1m3h-7qcm-rbfb
1
vulnerability VCID-3dse-wv2n-suhm
2
vulnerability VCID-3kpz-hath-rkbu
3
vulnerability VCID-3pmx-vxa8-nbcb
4
vulnerability VCID-3ppf-bdas-6ug3
5
vulnerability VCID-3qa8-r3be-tba7
6
vulnerability VCID-4qsk-zyhg-a3dq
7
vulnerability VCID-7nfj-4kye-bqd1
8
vulnerability VCID-7pdn-vqkz-m3bf
9
vulnerability VCID-7w4t-zbpu-ryds
10
vulnerability VCID-8nr2-vwxr-17bx
11
vulnerability VCID-9y8q-cnzk-fyht
12
vulnerability VCID-a6wc-3mp6-63ek
13
vulnerability VCID-a84m-x697-pqb9
14
vulnerability VCID-amqp-krc8-mkc7
15
vulnerability VCID-c2yd-ygs1-1uaf
16
vulnerability VCID-dghq-cq9k-9kan
17
vulnerability VCID-fkxb-595t-cbex
18
vulnerability VCID-ja3a-fems-gufe
19
vulnerability VCID-jwpp-qr3e-ffgn
20
vulnerability VCID-ks2a-sb7b-6yb7
21
vulnerability VCID-kwjd-3gb3-8udq
22
vulnerability VCID-kyt7-ky8c-6ydd
23
vulnerability VCID-qkyd-ehgp-gkgs
24
vulnerability VCID-qr8g-acpq-pqfc
25
vulnerability VCID-rfp8-t93a-2qa4
26
vulnerability VCID-rn74-ggyj-mkf3
27
vulnerability VCID-sq82-bf47-4yae
28
vulnerability VCID-twh8-87va-juf9
29
vulnerability VCID-vr7q-u9qz-hua5
30
vulnerability VCID-x7ga-dhyt-9uhr
31
vulnerability VCID-xprc-hqhv-8fc9
32
vulnerability VCID-zp2x-b1fa-jqe3
33
vulnerability VCID-zvmd-6wrn-jkcr
34
vulnerability VCID-zzzw-t6t2-qqft
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/java-1.6.0-ibm@1:1.6.0.14.0-1jpp.1%3Farch=el6_4
4
url pkg:rpm/redhat/java-1.7.0-ibm@1:1.7.0.5.0-1jpp.2?arch=el5_9
purl pkg:rpm/redhat/java-1.7.0-ibm@1:1.7.0.5.0-1jpp.2?arch=el5_9
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3dse-wv2n-suhm
1
vulnerability VCID-3kpz-hath-rkbu
2
vulnerability VCID-3pmx-vxa8-nbcb
3
vulnerability VCID-3ppf-bdas-6ug3
4
vulnerability VCID-3qa8-r3be-tba7
5
vulnerability VCID-4qsk-zyhg-a3dq
6
vulnerability VCID-7nfj-4kye-bqd1
7
vulnerability VCID-7pdn-vqkz-m3bf
8
vulnerability VCID-7w4t-zbpu-ryds
9
vulnerability VCID-88ty-ugc5-tkb9
10
vulnerability VCID-8nr2-vwxr-17bx
11
vulnerability VCID-9jb5-5728-ruhw
12
vulnerability VCID-9y8q-cnzk-fyht
13
vulnerability VCID-a6wc-3mp6-63ek
14
vulnerability VCID-a7qr-dzhg-qbbq
15
vulnerability VCID-a84m-x697-pqb9
16
vulnerability VCID-amqp-krc8-mkc7
17
vulnerability VCID-bqxe-tpzn-dygb
18
vulnerability VCID-c2yd-ygs1-1uaf
19
vulnerability VCID-dghq-cq9k-9kan
20
vulnerability VCID-e62d-ya99-9ucv
21
vulnerability VCID-fkxb-595t-cbex
22
vulnerability VCID-ja3a-fems-gufe
23
vulnerability VCID-jwpp-qr3e-ffgn
24
vulnerability VCID-ks2a-sb7b-6yb7
25
vulnerability VCID-kwjd-3gb3-8udq
26
vulnerability VCID-kyt7-ky8c-6ydd
27
vulnerability VCID-pdxk-dt2y-d3at
28
vulnerability VCID-qkyd-ehgp-gkgs
29
vulnerability VCID-qr8g-acpq-pqfc
30
vulnerability VCID-rfp8-t93a-2qa4
31
vulnerability VCID-rn74-ggyj-mkf3
32
vulnerability VCID-skvx-a4ep-sufh
33
vulnerability VCID-twh8-87va-juf9
34
vulnerability VCID-vjya-1h5w-j7as
35
vulnerability VCID-vr7q-u9qz-hua5
36
vulnerability VCID-x7ga-dhyt-9uhr
37
vulnerability VCID-xksx-3w4p-zkdz
38
vulnerability VCID-xprc-hqhv-8fc9
39
vulnerability VCID-y8v6-uwhu-kygb
40
vulnerability VCID-zp2x-b1fa-jqe3
41
vulnerability VCID-zvmd-6wrn-jkcr
42
vulnerability VCID-zzzw-t6t2-qqft
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/java-1.7.0-ibm@1:1.7.0.5.0-1jpp.2%3Farch=el5_9
5
url pkg:rpm/redhat/java-1.7.0-ibm@1:1.7.0.5.0-1jpp.2?arch=el6_4
purl pkg:rpm/redhat/java-1.7.0-ibm@1:1.7.0.5.0-1jpp.2?arch=el6_4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3dse-wv2n-suhm
1
vulnerability VCID-3kpz-hath-rkbu
2
vulnerability VCID-3pmx-vxa8-nbcb
3
vulnerability VCID-3ppf-bdas-6ug3
4
vulnerability VCID-3qa8-r3be-tba7
5
vulnerability VCID-4qsk-zyhg-a3dq
6
vulnerability VCID-7nfj-4kye-bqd1
7
vulnerability VCID-7pdn-vqkz-m3bf
8
vulnerability VCID-7w4t-zbpu-ryds
9
vulnerability VCID-88ty-ugc5-tkb9
10
vulnerability VCID-8nr2-vwxr-17bx
11
vulnerability VCID-9jb5-5728-ruhw
12
vulnerability VCID-9y8q-cnzk-fyht
13
vulnerability VCID-a6wc-3mp6-63ek
14
vulnerability VCID-a7qr-dzhg-qbbq
15
vulnerability VCID-a84m-x697-pqb9
16
vulnerability VCID-amqp-krc8-mkc7
17
vulnerability VCID-bqxe-tpzn-dygb
18
vulnerability VCID-c2yd-ygs1-1uaf
19
vulnerability VCID-dghq-cq9k-9kan
20
vulnerability VCID-e62d-ya99-9ucv
21
vulnerability VCID-fkxb-595t-cbex
22
vulnerability VCID-ja3a-fems-gufe
23
vulnerability VCID-jwpp-qr3e-ffgn
24
vulnerability VCID-ks2a-sb7b-6yb7
25
vulnerability VCID-kwjd-3gb3-8udq
26
vulnerability VCID-kyt7-ky8c-6ydd
27
vulnerability VCID-pdxk-dt2y-d3at
28
vulnerability VCID-qkyd-ehgp-gkgs
29
vulnerability VCID-qr8g-acpq-pqfc
30
vulnerability VCID-rfp8-t93a-2qa4
31
vulnerability VCID-rn74-ggyj-mkf3
32
vulnerability VCID-skvx-a4ep-sufh
33
vulnerability VCID-twh8-87va-juf9
34
vulnerability VCID-vjya-1h5w-j7as
35
vulnerability VCID-vr7q-u9qz-hua5
36
vulnerability VCID-x7ga-dhyt-9uhr
37
vulnerability VCID-xksx-3w4p-zkdz
38
vulnerability VCID-xprc-hqhv-8fc9
39
vulnerability VCID-y8v6-uwhu-kygb
40
vulnerability VCID-zp2x-b1fa-jqe3
41
vulnerability VCID-zvmd-6wrn-jkcr
42
vulnerability VCID-zzzw-t6t2-qqft
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/java-1.7.0-ibm@1:1.7.0.5.0-1jpp.2%3Farch=el6_4
References
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00026.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00026.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00027.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00027.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00028.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00028.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00029.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00029.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00031.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00031.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00000.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00003.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00003.html
7
reference_url http://rhn.redhat.com/errata/RHSA-2013-1059.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2013-1059.html
8
reference_url http://rhn.redhat.com/errata/RHSA-2013-1060.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2013-1060.html
9
reference_url http://rhn.redhat.com/errata/RHSA-2013-1081.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2013-1081.html
10
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-3011.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-3011.json
11
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-3011
reference_id
reference_type
scores
0
value 0.0745
scoring_system epss
scoring_elements 0.91763
published_at 2026-04-13T12:55:00Z
1
value 0.0745
scoring_system epss
scoring_elements 0.91721
published_at 2026-04-01T12:55:00Z
2
value 0.0745
scoring_system epss
scoring_elements 0.91729
published_at 2026-04-02T12:55:00Z
3
value 0.0745
scoring_system epss
scoring_elements 0.91735
published_at 2026-04-04T12:55:00Z
4
value 0.0745
scoring_system epss
scoring_elements 0.91742
published_at 2026-04-07T12:55:00Z
5
value 0.0745
scoring_system epss
scoring_elements 0.91754
published_at 2026-04-08T12:55:00Z
6
value 0.0745
scoring_system epss
scoring_elements 0.91762
published_at 2026-04-09T12:55:00Z
7
value 0.0745
scoring_system epss
scoring_elements 0.91765
published_at 2026-04-11T12:55:00Z
8
value 0.0745
scoring_system epss
scoring_elements 0.91767
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-3011
12
reference_url http://secunia.com/advisories/54154
reference_id
reference_type
scores
url http://secunia.com/advisories/54154
13
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/84152
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/84152
14
reference_url http://www-01.ibm.com/support/docview.wss?uid=swg1IV44793
reference_id
reference_type
scores
url http://www-01.ibm.com/support/docview.wss?uid=swg1IV44793
15
reference_url http://www-01.ibm.com/support/docview.wss?uid=swg1IV44795
reference_id
reference_type
scores
url http://www-01.ibm.com/support/docview.wss?uid=swg1IV44795
16
reference_url http://www-01.ibm.com/support/docview.wss?uid=swg1PM91729
reference_id
reference_type
scores
url http://www-01.ibm.com/support/docview.wss?uid=swg1PM91729
17
reference_url http://www-01.ibm.com/support/docview.wss?uid=swg21642336
reference_id
reference_type
scores
url http://www-01.ibm.com/support/docview.wss?uid=swg21642336
18
reference_url http://www-01.ibm.com/support/docview.wss?uid=swg21644197
reference_id
reference_type
scores
url http://www-01.ibm.com/support/docview.wss?uid=swg21644197
19
reference_url http://www.ibm.com/developerworks/java/jdk/alerts/#IBM_Security_Update_July_2013
reference_id
reference_type
scores
url http://www.ibm.com/developerworks/java/jdk/alerts/#IBM_Security_Update_July_2013
20
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=985501
reference_id 985501
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=985501
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:1.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:java:1.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:1.4.2:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:1.4.2.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:java:1.4.2.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:1.4.2.13:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:1.4.2.13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:java:1.4.2.13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:1.4.2.13.1:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:1.4.2.13.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:java:1.4.2.13.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:1.4.2.13.10:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:1.4.2.13.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:java:1.4.2.13.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:1.4.2.13.11:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:1.4.2.13.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:java:1.4.2.13.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:1.4.2.13.12:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:1.4.2.13.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:java:1.4.2.13.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:1.4.2.13.13:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:1.4.2.13.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:java:1.4.2.13.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:1.4.2.13.14:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:1.4.2.13.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:java:1.4.2.13.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:1.4.2.13.15:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:1.4.2.13.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:java:1.4.2.13.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:1.4.2.13.16:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:1.4.2.13.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:java:1.4.2.13.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:1.4.2.13.17:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:1.4.2.13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:java:1.4.2.13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:1.4.2.13.2:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:1.4.2.13.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:java:1.4.2.13.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:1.4.2.13.3:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:1.4.2.13.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:java:1.4.2.13.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:1.4.2.13.4:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:1.4.2.13.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:java:1.4.2.13.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:1.4.2.13.5:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:1.4.2.13.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:java:1.4.2.13.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:1.4.2.13.6:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:1.4.2.13.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:java:1.4.2.13.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:1.4.2.13.7:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:1.4.2.13.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:java:1.4.2.13.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:1.4.2.13.8:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:1.4.2.13.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:java:1.4.2.13.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:1.4.2.13.9:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:java:5.0.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.0.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.11.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:java:5.0.11.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.11.0:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.11.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:java:5.0.11.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.11.1:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.11.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:java:5.0.11.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.11.2:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.12.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:java:5.0.12.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.12.0:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.12.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:java:5.0.12.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.12.1:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.12.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:java:5.0.12.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.12.2:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.12.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:java:5.0.12.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.12.3:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.12.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:java:5.0.12.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.12.4:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.12.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:java:5.0.12.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.12.5:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.13.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:java:5.0.13.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.13.0:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.14.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:java:5.0.14.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.14.0:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.15.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:java:5.0.15.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.15.0:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.16.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:java:5.0.16.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.16.0:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.16.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:java:5.0.16.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.16.1:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.16.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:java:5.0.16.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.16.2:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:java:6.0.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.0.0:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:java:6.0.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.1.0:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:java:6.0.10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.10.0:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.10.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:java:6.0.10.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.10.1:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.11.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:java:6.0.11.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.11.0:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.12.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:java:6.0.12.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.12.0:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.13.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:java:6.0.13.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.13.0:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:java:6.0.13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.13.1:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:java:6.0.13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.13.2:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:java:6.0.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.2.0:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:java:6.0.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.3.0:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:java:6.0.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.4.0:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:java:6.0.5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.5.0:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:java:6.0.6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.6.0:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:java:6.0.7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.7.0:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:java:6.0.8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.8.0:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:java:6.0.8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.8.1:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:java:6.0.9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.9.0:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.9.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:java:6.0.9.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.9.1:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.9.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:java:6.0.9.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.9.2:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:7.0.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:java:7.0.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:7.0.0.0:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:7.0.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:java:7.0.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:7.0.1.0:*:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:7.0.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:java:7.0.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:7.0.2.0:*:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:7.0.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:java:7.0.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:7.0.3.0:*:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:7.0.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:java:7.0.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:7.0.4.0:*:*:*:*:*:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:7.0.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:java:7.0.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:7.0.4.1:*:*:*:*:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:7.0.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:java:7.0.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:7.0.4.2:*:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-3011
reference_id CVE-2013-3011
reference_type
scores
0
value 9.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2013-3011
84
reference_url https://access.redhat.com/errata/RHSA-2013:1059
reference_id RHSA-2013:1059
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1059
85
reference_url https://access.redhat.com/errata/RHSA-2013:1060
reference_id RHSA-2013:1060
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1060
86
reference_url https://access.redhat.com/errata/RHSA-2013:1081
reference_id RHSA-2013:1081
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1081
Weaknesses
Exploits
Severity_range_score9.3 - 9.3
Exploitability0.5
Weighted_severity8.4
Risk_score4.2
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-x7ga-dhyt-9uhr