Search for vulnerabilities
Vulnerability details: VCID-88jm-tudm-c7b1
Vulnerability ID VCID-88jm-tudm-c7b1
Aliases CVE-2013-2465
Summary
Status Published
Exploitability 2.0
Weighted Severity 8.8
Risk 10.0
Affected and Fixed Packages Package Details
Weaknesses (0)
There are no known CWE.
System Score Found at
cvssv3.1 9.8 http://advisories.mageia.org/MGASA-2013-0185.html
ssvc Act http://advisories.mageia.org/MGASA-2013-0185.html
cvssv3.1 9.8 http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03898880
ssvc Act http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03898880
cvssv3.1 9.8 http://hg.openjdk.java.net/jdk7u/jdk7u-dev/jdk/rev/2a9c79db0040
ssvc Act http://hg.openjdk.java.net/jdk7u/jdk7u-dev/jdk/rev/2a9c79db0040
cvssv3.1 9.8 http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00026.html
ssvc Act http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00026.html
cvssv3.1 9.8 http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00027.html
ssvc Act http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00027.html
cvssv3.1 9.8 http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00028.html
ssvc Act http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00028.html
cvssv3.1 9.8 http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00029.html
ssvc Act http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00029.html
cvssv3.1 9.8 http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00031.html
ssvc Act http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00031.html
cvssv3.1 9.8 http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00000.html
ssvc Act http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00000.html
cvssv3.1 9.8 http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00003.html
ssvc Act http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00003.html
cvssv3.1 9.8 http://marc.info/?l=bugtraq&m=137545505800971&w=2
ssvc Act http://marc.info/?l=bugtraq&m=137545505800971&w=2
cvssv3.1 9.8 http://marc.info/?l=bugtraq&m=137545592101387&w=2
ssvc Act http://marc.info/?l=bugtraq&m=137545592101387&w=2
cvssv3.1 9.8 http://rhn.redhat.com/errata/RHSA-2013-0963.html
ssvc Act http://rhn.redhat.com/errata/RHSA-2013-0963.html
cvssv3.1 9.8 http://rhn.redhat.com/errata/RHSA-2013-1059.html
ssvc Act http://rhn.redhat.com/errata/RHSA-2013-1059.html
cvssv3.1 9.8 http://rhn.redhat.com/errata/RHSA-2013-1060.html
ssvc Act http://rhn.redhat.com/errata/RHSA-2013-1060.html
cvssv3.1 9.8 http://rhn.redhat.com/errata/RHSA-2013-1081.html
ssvc Act http://rhn.redhat.com/errata/RHSA-2013-1081.html
cvssv3.1 9.8 http://rhn.redhat.com/errata/RHSA-2013-1455.html
ssvc Act http://rhn.redhat.com/errata/RHSA-2013-1455.html
cvssv3.1 9.8 http://rhn.redhat.com/errata/RHSA-2013-1456.html
ssvc Act http://rhn.redhat.com/errata/RHSA-2013-1456.html
cvssv3.1 9.8 https://access.redhat.com/errata/RHSA-2014:0414
ssvc Act https://access.redhat.com/errata/RHSA-2014:0414
epss 0.9356 https://api.first.org/data/v1/epss?cve=CVE-2013-2465
epss 0.9356 https://api.first.org/data/v1/epss?cve=CVE-2013-2465
epss 0.9356 https://api.first.org/data/v1/epss?cve=CVE-2013-2465
epss 0.9356 https://api.first.org/data/v1/epss?cve=CVE-2013-2465
cvssv3.1 9.8 https://bugzilla.redhat.com/show_bug.cgi?id=975118
ssvc Act https://bugzilla.redhat.com/show_bug.cgi?id=975118
cvssv3.1 9.8 http://secunia.com/advisories/54154
ssvc Act http://secunia.com/advisories/54154
cvssv3.1 9.8 http://security.gentoo.org/glsa/glsa-201406-32.xml
ssvc Act http://security.gentoo.org/glsa/glsa-201406-32.xml
cvssv3.1 9.8 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17106
ssvc Act https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17106
cvssv3.1 9.8 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19074
ssvc Act https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19074
cvssv3.1 9.8 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19455
ssvc Act https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19455
cvssv3.1 9.8 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19703
ssvc Act https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19703
cvssv3.1 9.8 http://www-01.ibm.com/support/docview.wss?uid=swg21642336
ssvc Act http://www-01.ibm.com/support/docview.wss?uid=swg21642336
cvssv3.1 9.8 http://www.mandriva.com/security/advisories?name=MDVSA-2013:183
ssvc Act http://www.mandriva.com/security/advisories?name=MDVSA-2013:183
cvssv3.1 9.8 http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html
ssvc Act http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html
cvssv3.1 9.8 http://www.securityfocus.com/bid/60657
ssvc Act http://www.securityfocus.com/bid/60657
cvssv3.1 9.8 http://www.us-cert.gov/ncas/alerts/TA13-169A
ssvc Act http://www.us-cert.gov/ncas/alerts/TA13-169A
Reference id Reference type URL
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2465.json
https://api.first.org/data/v1/epss?cve=CVE-2013-2465
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1500
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2407
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2412
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2443
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2444
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2445
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2446
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2447
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2448
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2449
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2450
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2451
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2452
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2453
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2454
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2455
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2456
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2457
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2459
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2460
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2461
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2463
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2465
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2469
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2470
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2471
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2472
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2473
2a9c79db0040 http://hg.openjdk.java.net/jdk7u/jdk7u-dev/jdk/rev/2a9c79db0040
54154 http://secunia.com/advisories/54154
60657 http://www.securityfocus.com/bid/60657
advisories?name=MDVSA-2013:183 http://www.mandriva.com/security/advisories?name=MDVSA-2013:183
CVE-2013-2465;OSVDB-96269 Exploit https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/27705.rb
Document.jsp?objectID=c03898880 http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03898880
docview.wss?uid=swg21642336 http://www-01.ibm.com/support/docview.wss?uid=swg21642336
javacpujun2013-1899847.html http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html
?l=bugtraq&m=137545505800971&w=2 http://marc.info/?l=bugtraq&m=137545505800971&w=2
?l=bugtraq&m=137545592101387&w=2 http://marc.info/?l=bugtraq&m=137545592101387&w=2
MGASA-2013-0185.html http://advisories.mageia.org/MGASA-2013-0185.html
msg00031.html http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00031.html
oval%3Aorg.mitre.oval%3Adef%3A17106 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17106
oval%3Aorg.mitre.oval%3Adef%3A19074 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19074
oval%3Aorg.mitre.oval%3Adef%3A19455 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19455
oval%3Aorg.mitre.oval%3Adef%3A19703 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19703
RHSA-2013:0957 https://access.redhat.com/errata/RHSA-2013:0957
RHSA-2013:0958 https://access.redhat.com/errata/RHSA-2013:0958
RHSA-2013:0963 https://access.redhat.com/errata/RHSA-2013:0963
RHSA-2013-0963.html http://rhn.redhat.com/errata/RHSA-2013-0963.html
RHSA-2013:1014 https://access.redhat.com/errata/RHSA-2013:1014
RHSA-2013:1059 https://access.redhat.com/errata/RHSA-2013:1059
RHSA-2013:1060 https://access.redhat.com/errata/RHSA-2013:1060
RHSA-2013:1081 https://access.redhat.com/errata/RHSA-2013:1081
RHSA-2013:1455 https://access.redhat.com/errata/RHSA-2013:1455
RHSA-2013-1455.html http://rhn.redhat.com/errata/RHSA-2013-1455.html
RHSA-2013:1456 https://access.redhat.com/errata/RHSA-2013:1456
RHSA-2013-1456.html http://rhn.redhat.com/errata/RHSA-2013-1456.html
show_bug.cgi?id=975118 https://bugzilla.redhat.com/show_bug.cgi?id=975118
TA13-169A http://www.us-cert.gov/ncas/alerts/TA13-169A
USN-1907-1 https://usn.ubuntu.com/1907-1/
USN-1908-1 https://usn.ubuntu.com/1908-1/
Data source KEV
Date added March 28, 2022
Description Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE allows remote attackers to affect confidentiality, integrity, and availability via Unknown vectors related to 2D
Required action Apply updates per vendor instructions.
Due date April 18, 2022
Note
https://nvd.nist.gov/vuln/detail/CVE-2013-2465
Ransomware campaign use Known
Data source Metasploit
Description This module abuses an Invalid Array Indexing Vulnerability on the static function storeImageArray() function in order to cause a memory corruption and escape the Java Sandbox. The vulnerability affects Java version 7u21 and earlier. The module, which doesn't bypass click2play, has been tested successfully on Java 7u21 on Windows and Linux systems.
Note
Reliability:
  - unknown-reliability
Stability:
  - unknown-stability
SideEffects:
  - unknown-side-effects
Ransomware campaign use Unknown
Source publication date Aug. 12, 2013
Platform Java,Linux,Windows
Source URL https://github.com/rapid7/metasploit-framework/tree/master/modules/exploits/multi/browser/java_storeimagearray.rb
Data source Exploit-DB
Date added Aug. 19, 2013
Description Java - 'storeImageArray()' Invalid Array Indexing (Metasploit)
Ransomware campaign use Known
Source publication date Aug. 19, 2013
Exploit type remote
Platform multiple
Source update date Aug. 19, 2013
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at http://advisories.mageia.org/MGASA-2013-0185.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-10T19:00:39Z/ Found at http://advisories.mageia.org/MGASA-2013-0185.html
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03898880
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-10T19:00:39Z/ Found at http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03898880
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at http://hg.openjdk.java.net/jdk7u/jdk7u-dev/jdk/rev/2a9c79db0040
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-10T19:00:39Z/ Found at http://hg.openjdk.java.net/jdk7u/jdk7u-dev/jdk/rev/2a9c79db0040
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00026.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-10T19:00:39Z/ Found at http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00026.html
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00027.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-10T19:00:39Z/ Found at http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00027.html
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00028.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-10T19:00:39Z/ Found at http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00028.html
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00029.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-10T19:00:39Z/ Found at http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00029.html
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00031.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-10T19:00:39Z/ Found at http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00031.html
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00000.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-10T19:00:39Z/ Found at http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00000.html
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00003.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-10T19:00:39Z/ Found at http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00003.html
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at http://marc.info/?l=bugtraq&m=137545505800971&w=2
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-10T19:00:39Z/ Found at http://marc.info/?l=bugtraq&m=137545505800971&w=2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at http://marc.info/?l=bugtraq&m=137545592101387&w=2
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-10T19:00:39Z/ Found at http://marc.info/?l=bugtraq&m=137545592101387&w=2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at http://rhn.redhat.com/errata/RHSA-2013-0963.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-10T19:00:39Z/ Found at http://rhn.redhat.com/errata/RHSA-2013-0963.html
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at http://rhn.redhat.com/errata/RHSA-2013-1059.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-10T19:00:39Z/ Found at http://rhn.redhat.com/errata/RHSA-2013-1059.html
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at http://rhn.redhat.com/errata/RHSA-2013-1060.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-10T19:00:39Z/ Found at http://rhn.redhat.com/errata/RHSA-2013-1060.html
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at http://rhn.redhat.com/errata/RHSA-2013-1081.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-10T19:00:39Z/ Found at http://rhn.redhat.com/errata/RHSA-2013-1081.html
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at http://rhn.redhat.com/errata/RHSA-2013-1455.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-10T19:00:39Z/ Found at http://rhn.redhat.com/errata/RHSA-2013-1455.html
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at http://rhn.redhat.com/errata/RHSA-2013-1456.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-10T19:00:39Z/ Found at http://rhn.redhat.com/errata/RHSA-2013-1456.html
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://access.redhat.com/errata/RHSA-2014:0414
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-10T19:00:39Z/ Found at https://access.redhat.com/errata/RHSA-2014:0414
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://bugzilla.redhat.com/show_bug.cgi?id=975118
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-10T19:00:39Z/ Found at https://bugzilla.redhat.com/show_bug.cgi?id=975118
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at http://secunia.com/advisories/54154
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-10T19:00:39Z/ Found at http://secunia.com/advisories/54154
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at http://security.gentoo.org/glsa/glsa-201406-32.xml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-10T19:00:39Z/ Found at http://security.gentoo.org/glsa/glsa-201406-32.xml
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17106
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-10T19:00:39Z/ Found at https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17106
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19074
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-10T19:00:39Z/ Found at https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19074
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19455
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-10T19:00:39Z/ Found at https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19455
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19703
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-10T19:00:39Z/ Found at https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19703
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at http://www-01.ibm.com/support/docview.wss?uid=swg21642336
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-10T19:00:39Z/ Found at http://www-01.ibm.com/support/docview.wss?uid=swg21642336
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at http://www.mandriva.com/security/advisories?name=MDVSA-2013:183
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-10T19:00:39Z/ Found at http://www.mandriva.com/security/advisories?name=MDVSA-2013:183
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-10T19:00:39Z/ Found at http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at http://www.securityfocus.com/bid/60657
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-10T19:00:39Z/ Found at http://www.securityfocus.com/bid/60657
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at http://www.us-cert.gov/ncas/alerts/TA13-169A
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-10T19:00:39Z/ Found at http://www.us-cert.gov/ncas/alerts/TA13-169A
Exploit Prediction Scoring System (EPSS)
Percentile 0.99827
EPSS Score 0.9356
Published At Aug. 5, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2025-07-31T08:39:34.710833+00:00 Ubuntu USN Importer Import https://usn.ubuntu.com/1907-1/ 37.0.0