Search for vulnerabilities
Vulnerability details: VCID-g7a8-wsd3-aaap
Vulnerability ID VCID-g7a8-wsd3-aaap
Aliases CVE-2013-2416
Summary CVE-2013-2416 Oracle JDK: unspecified vulnerability fixed in 7u21 (Deployment)
Status Published
Exploitability 2.0
Weighted Severity 9.0
Risk 10.0
Affected and Fixed Packages Package Details
Weaknesses (0)
There are no known CWE.
System Score Found at
rhas Critical https://access.redhat.com/errata/RHSA-2013:0757
rhas Critical https://access.redhat.com/errata/RHSA-2013:0822
epss 0.00589 https://api.first.org/data/v1/epss?cve=CVE-2013-2416
epss 0.00589 https://api.first.org/data/v1/epss?cve=CVE-2013-2416
epss 0.00589 https://api.first.org/data/v1/epss?cve=CVE-2013-2416
epss 0.00589 https://api.first.org/data/v1/epss?cve=CVE-2013-2416
epss 0.00611 https://api.first.org/data/v1/epss?cve=CVE-2013-2416
epss 0.00611 https://api.first.org/data/v1/epss?cve=CVE-2013-2416
epss 0.00611 https://api.first.org/data/v1/epss?cve=CVE-2013-2416
epss 0.00611 https://api.first.org/data/v1/epss?cve=CVE-2013-2416
epss 0.00611 https://api.first.org/data/v1/epss?cve=CVE-2013-2416
epss 0.00611 https://api.first.org/data/v1/epss?cve=CVE-2013-2416
epss 0.00611 https://api.first.org/data/v1/epss?cve=CVE-2013-2416
epss 0.00611 https://api.first.org/data/v1/epss?cve=CVE-2013-2416
epss 0.00611 https://api.first.org/data/v1/epss?cve=CVE-2013-2416
epss 0.00611 https://api.first.org/data/v1/epss?cve=CVE-2013-2416
epss 0.00611 https://api.first.org/data/v1/epss?cve=CVE-2013-2416
epss 0.37623 https://api.first.org/data/v1/epss?cve=CVE-2013-2416
epss 0.37623 https://api.first.org/data/v1/epss?cve=CVE-2013-2416
epss 0.37623 https://api.first.org/data/v1/epss?cve=CVE-2013-2416
epss 0.37623 https://api.first.org/data/v1/epss?cve=CVE-2013-2416
epss 0.37623 https://api.first.org/data/v1/epss?cve=CVE-2013-2416
epss 0.37623 https://api.first.org/data/v1/epss?cve=CVE-2013-2416
epss 0.37623 https://api.first.org/data/v1/epss?cve=CVE-2013-2416
epss 0.37623 https://api.first.org/data/v1/epss?cve=CVE-2013-2416
epss 0.37623 https://api.first.org/data/v1/epss?cve=CVE-2013-2416
epss 0.37623 https://api.first.org/data/v1/epss?cve=CVE-2013-2416
epss 0.37623 https://api.first.org/data/v1/epss?cve=CVE-2013-2416
epss 0.37623 https://api.first.org/data/v1/epss?cve=CVE-2013-2416
epss 0.37623 https://api.first.org/data/v1/epss?cve=CVE-2013-2416
epss 0.37623 https://api.first.org/data/v1/epss?cve=CVE-2013-2416
epss 0.46692 https://api.first.org/data/v1/epss?cve=CVE-2013-2416
epss 0.46692 https://api.first.org/data/v1/epss?cve=CVE-2013-2416
epss 0.46692 https://api.first.org/data/v1/epss?cve=CVE-2013-2416
epss 0.46692 https://api.first.org/data/v1/epss?cve=CVE-2013-2416
epss 0.46692 https://api.first.org/data/v1/epss?cve=CVE-2013-2416
epss 0.46692 https://api.first.org/data/v1/epss?cve=CVE-2013-2416
epss 0.46692 https://api.first.org/data/v1/epss?cve=CVE-2013-2416
epss 0.46692 https://api.first.org/data/v1/epss?cve=CVE-2013-2416
epss 0.46692 https://api.first.org/data/v1/epss?cve=CVE-2013-2416
epss 0.46692 https://api.first.org/data/v1/epss?cve=CVE-2013-2416
epss 0.46692 https://api.first.org/data/v1/epss?cve=CVE-2013-2416
epss 0.46692 https://api.first.org/data/v1/epss?cve=CVE-2013-2416
epss 0.46692 https://api.first.org/data/v1/epss?cve=CVE-2013-2416
epss 0.46692 https://api.first.org/data/v1/epss?cve=CVE-2013-2416
epss 0.46692 https://api.first.org/data/v1/epss?cve=CVE-2013-2416
epss 0.46692 https://api.first.org/data/v1/epss?cve=CVE-2013-2416
epss 0.46692 https://api.first.org/data/v1/epss?cve=CVE-2013-2416
epss 0.46692 https://api.first.org/data/v1/epss?cve=CVE-2013-2416
epss 0.65952 https://api.first.org/data/v1/epss?cve=CVE-2013-2416
epss 0.65952 https://api.first.org/data/v1/epss?cve=CVE-2013-2416
epss 0.65952 https://api.first.org/data/v1/epss?cve=CVE-2013-2416
epss 0.65952 https://api.first.org/data/v1/epss?cve=CVE-2013-2416
epss 0.65952 https://api.first.org/data/v1/epss?cve=CVE-2013-2416
epss 0.65952 https://api.first.org/data/v1/epss?cve=CVE-2013-2416
epss 0.65952 https://api.first.org/data/v1/epss?cve=CVE-2013-2416
epss 0.65952 https://api.first.org/data/v1/epss?cve=CVE-2013-2416
epss 0.65952 https://api.first.org/data/v1/epss?cve=CVE-2013-2416
epss 0.65952 https://api.first.org/data/v1/epss?cve=CVE-2013-2416
epss 0.65952 https://api.first.org/data/v1/epss?cve=CVE-2013-2416
epss 0.65952 https://api.first.org/data/v1/epss?cve=CVE-2013-2416
epss 0.65952 https://api.first.org/data/v1/epss?cve=CVE-2013-2416
epss 0.65952 https://api.first.org/data/v1/epss?cve=CVE-2013-2416
epss 0.65952 https://api.first.org/data/v1/epss?cve=CVE-2013-2416
epss 0.65952 https://api.first.org/data/v1/epss?cve=CVE-2013-2416
epss 0.65952 https://api.first.org/data/v1/epss?cve=CVE-2013-2416
epss 0.65952 https://api.first.org/data/v1/epss?cve=CVE-2013-2416
epss 0.72783 https://api.first.org/data/v1/epss?cve=CVE-2013-2416
rhbs medium https://bugzilla.redhat.com/show_bug.cgi?id=953266
cvssv2 4.3 https://nvd.nist.gov/vuln/detail/CVE-2013-2416
generic_textual Medium http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html
Reference id Reference type URL
http://rhn.redhat.com/errata/RHSA-2013-0757.html
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2416.json
https://api.first.org/data/v1/epss?cve=CVE-2013-2416
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16464
http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html
http://www.us-cert.gov/ncas/alerts/TA13-107A
953266 https://bugzilla.redhat.com/show_bug.cgi?id=953266
cpe:2.3:a:oracle:jdk:1.7.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.7.0:update1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update1:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.7.0:update10:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update10:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.7.0:update11:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update11:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.7.0:update13:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update13:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.7.0:update15:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update15:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.7.0:update2:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update2:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.7.0:update3:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update3:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.7.0:update4:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update4:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.7.0:update5:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update5:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.7.0:update6:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update6:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.7.0:update7:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update7:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.7.0:update9:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update9:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:*:update17:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:*:update17:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.7.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.7.0:update1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update1:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.7.0:update10:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update10:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.7.0:update11:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update11:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.7.0:update13:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update13:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.7.0:update15:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update15:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.7.0:update2:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update2:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.7.0:update3:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update3:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.7.0:update4:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update4:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.7.0:update5:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update5:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.7.0:update6:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update6:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.7.0:update7:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update7:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.7.0:update9:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update9:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:*:update17:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:*:update17:*:*:*:*:*:*
CVE-2013-2416 https://nvd.nist.gov/vuln/detail/CVE-2013-2416
GLSA-201401-30 https://security.gentoo.org/glsa/201401-30
RHSA-2013:0757 https://access.redhat.com/errata/RHSA-2013:0757
RHSA-2013:0822 https://access.redhat.com/errata/RHSA-2013:0822
Data source Exploit-DB
Date added April 18, 2013
Description Java Web Start Launcher ActiveX Control - Memory Corruption
Ransomware campaign use Unknown
Source publication date April 18, 2013
Exploit type dos
Platform windows
Source update date April 18, 2013
Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2013-2416
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Exploit Prediction Scoring System (EPSS)
Percentile 0.78088
EPSS Score 0.00589
Published At Dec. 17, 2024, midnight
Date Actor Action Source VulnerableCode Version
There are no relevant records.