Search for vulnerabilities
Vulnerability details: VCID-yspy-qwj8-aaag
Vulnerability ID VCID-yspy-qwj8-aaag
Aliases CVE-2012-0497
Summary CVE-2012-0497 OpenJDK: insufficient checking of the graphics rendering object (2D, 7112642)
Status Published
Exploitability 0.5
Weighted Severity 9.0
Risk 4.5
Affected and Fixed Packages Package Details
Weaknesses (0)
There are no known CWE.
System Score Found at
generic_textual MODERATE http://marc.info/?l=bugtraq&m=134254866602253&w=2
generic_textual MODERATE http://marc.info/?l=bugtraq&m=134254957702612&w=2
rhas Critical https://access.redhat.com/errata/RHSA-2012:0135
rhas Important https://access.redhat.com/errata/RHSA-2012:0322
rhas Critical https://access.redhat.com/errata/RHSA-2012:0514
rhas Low https://access.redhat.com/errata/RHSA-2013:1455
epss 0.02216 https://api.first.org/data/v1/epss?cve=CVE-2012-0497
epss 0.02216 https://api.first.org/data/v1/epss?cve=CVE-2012-0497
epss 0.02216 https://api.first.org/data/v1/epss?cve=CVE-2012-0497
epss 0.02216 https://api.first.org/data/v1/epss?cve=CVE-2012-0497
epss 0.02216 https://api.first.org/data/v1/epss?cve=CVE-2012-0497
epss 0.02216 https://api.first.org/data/v1/epss?cve=CVE-2012-0497
epss 0.02216 https://api.first.org/data/v1/epss?cve=CVE-2012-0497
epss 0.02216 https://api.first.org/data/v1/epss?cve=CVE-2012-0497
epss 0.02216 https://api.first.org/data/v1/epss?cve=CVE-2012-0497
epss 0.02216 https://api.first.org/data/v1/epss?cve=CVE-2012-0497
epss 0.02216 https://api.first.org/data/v1/epss?cve=CVE-2012-0497
epss 0.02342 https://api.first.org/data/v1/epss?cve=CVE-2012-0497
epss 0.02342 https://api.first.org/data/v1/epss?cve=CVE-2012-0497
epss 0.02342 https://api.first.org/data/v1/epss?cve=CVE-2012-0497
epss 0.02342 https://api.first.org/data/v1/epss?cve=CVE-2012-0497
epss 0.0494 https://api.first.org/data/v1/epss?cve=CVE-2012-0497
epss 0.0494 https://api.first.org/data/v1/epss?cve=CVE-2012-0497
epss 0.0494 https://api.first.org/data/v1/epss?cve=CVE-2012-0497
epss 0.0494 https://api.first.org/data/v1/epss?cve=CVE-2012-0497
epss 0.0494 https://api.first.org/data/v1/epss?cve=CVE-2012-0497
epss 0.0494 https://api.first.org/data/v1/epss?cve=CVE-2012-0497
epss 0.0494 https://api.first.org/data/v1/epss?cve=CVE-2012-0497
epss 0.0494 https://api.first.org/data/v1/epss?cve=CVE-2012-0497
epss 0.0494 https://api.first.org/data/v1/epss?cve=CVE-2012-0497
epss 0.0494 https://api.first.org/data/v1/epss?cve=CVE-2012-0497
epss 0.0494 https://api.first.org/data/v1/epss?cve=CVE-2012-0497
epss 0.0494 https://api.first.org/data/v1/epss?cve=CVE-2012-0497
epss 0.0494 https://api.first.org/data/v1/epss?cve=CVE-2012-0497
epss 0.0494 https://api.first.org/data/v1/epss?cve=CVE-2012-0497
epss 0.0494 https://api.first.org/data/v1/epss?cve=CVE-2012-0497
epss 0.0494 https://api.first.org/data/v1/epss?cve=CVE-2012-0497
epss 0.0494 https://api.first.org/data/v1/epss?cve=CVE-2012-0497
epss 0.0494 https://api.first.org/data/v1/epss?cve=CVE-2012-0497
epss 0.0494 https://api.first.org/data/v1/epss?cve=CVE-2012-0497
epss 0.0494 https://api.first.org/data/v1/epss?cve=CVE-2012-0497
epss 0.0494 https://api.first.org/data/v1/epss?cve=CVE-2012-0497
epss 0.0494 https://api.first.org/data/v1/epss?cve=CVE-2012-0497
epss 0.0494 https://api.first.org/data/v1/epss?cve=CVE-2012-0497
epss 0.0494 https://api.first.org/data/v1/epss?cve=CVE-2012-0497
epss 0.0494 https://api.first.org/data/v1/epss?cve=CVE-2012-0497
epss 0.0494 https://api.first.org/data/v1/epss?cve=CVE-2012-0497
epss 0.0494 https://api.first.org/data/v1/epss?cve=CVE-2012-0497
epss 0.0494 https://api.first.org/data/v1/epss?cve=CVE-2012-0497
epss 0.0494 https://api.first.org/data/v1/epss?cve=CVE-2012-0497
epss 0.0494 https://api.first.org/data/v1/epss?cve=CVE-2012-0497
epss 0.0494 https://api.first.org/data/v1/epss?cve=CVE-2012-0497
epss 0.0494 https://api.first.org/data/v1/epss?cve=CVE-2012-0497
epss 0.0494 https://api.first.org/data/v1/epss?cve=CVE-2012-0497
epss 0.0494 https://api.first.org/data/v1/epss?cve=CVE-2012-0497
epss 0.0494 https://api.first.org/data/v1/epss?cve=CVE-2012-0497
epss 0.0494 https://api.first.org/data/v1/epss?cve=CVE-2012-0497
epss 0.0494 https://api.first.org/data/v1/epss?cve=CVE-2012-0497
epss 0.0494 https://api.first.org/data/v1/epss?cve=CVE-2012-0497
epss 0.0494 https://api.first.org/data/v1/epss?cve=CVE-2012-0497
epss 0.0494 https://api.first.org/data/v1/epss?cve=CVE-2012-0497
epss 0.0494 https://api.first.org/data/v1/epss?cve=CVE-2012-0497
epss 0.0494 https://api.first.org/data/v1/epss?cve=CVE-2012-0497
epss 0.0494 https://api.first.org/data/v1/epss?cve=CVE-2012-0497
epss 0.0494 https://api.first.org/data/v1/epss?cve=CVE-2012-0497
epss 0.0494 https://api.first.org/data/v1/epss?cve=CVE-2012-0497
epss 0.0494 https://api.first.org/data/v1/epss?cve=CVE-2012-0497
epss 0.0494 https://api.first.org/data/v1/epss?cve=CVE-2012-0497
epss 0.0494 https://api.first.org/data/v1/epss?cve=CVE-2012-0497
epss 0.0494 https://api.first.org/data/v1/epss?cve=CVE-2012-0497
epss 0.0494 https://api.first.org/data/v1/epss?cve=CVE-2012-0497
epss 0.0494 https://api.first.org/data/v1/epss?cve=CVE-2012-0497
epss 0.0494 https://api.first.org/data/v1/epss?cve=CVE-2012-0497
epss 0.0494 https://api.first.org/data/v1/epss?cve=CVE-2012-0497
epss 0.0494 https://api.first.org/data/v1/epss?cve=CVE-2012-0497
epss 0.0494 https://api.first.org/data/v1/epss?cve=CVE-2012-0497
epss 0.0494 https://api.first.org/data/v1/epss?cve=CVE-2012-0497
epss 0.0494 https://api.first.org/data/v1/epss?cve=CVE-2012-0497
epss 0.0494 https://api.first.org/data/v1/epss?cve=CVE-2012-0497
epss 0.0494 https://api.first.org/data/v1/epss?cve=CVE-2012-0497
epss 0.07705 https://api.first.org/data/v1/epss?cve=CVE-2012-0497
rhbs urgent https://bugzilla.redhat.com/show_bug.cgi?id=789301
generic_textual HIGH http://security.gentoo.org/glsa/glsa-201406-32.xml
cvssv2 10.0 https://nvd.nist.gov/vuln/detail/CVE-2012-0497
Reference id Reference type URL
http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00010.html
http://marc.info/?l=bugtraq&m=133364885411663&w=2
http://marc.info/?l=bugtraq&m=133847939902305&w=2
http://marc.info/?l=bugtraq&m=134254866602253&w=2
http://marc.info/?l=bugtraq&m=134254957702612&w=2
http://rhn.redhat.com/errata/RHSA-2012-0514.html
http://rhn.redhat.com/errata/RHSA-2013-1455.html
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0497.json
https://api.first.org/data/v1/epss?cve=CVE-2012-0497
http://secunia.com/advisories/48074
http://secunia.com/advisories/48589
http://secunia.com/advisories/48950
http://security.gentoo.org/glsa/glsa-201406-32.xml
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14772
http://www.debian.org/security/2012/dsa-2420
http://www.mandriva.com/security/advisories?name=MDVSA-2013:150
http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html
http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html
http://www.securityfocus.com/bid/52009
789301 https://bugzilla.redhat.com/show_bug.cgi?id=789301
cpe:2.3:a:oracle:jre:1.6.0:update22:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update22:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.6.0:update23:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update23:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.6.0:update24:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update24:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.6.0:update25:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update25:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.6.0:update26:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update26:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.6.0:update27:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update27:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.6.0:update29:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update29:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.7.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.7.0:update1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update1:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:*:update2:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:*:update2:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:*:update30:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:*:update30:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.6.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:*:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.6.0:update_10:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_10:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.6.0:update_11:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_11:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.6.0:update_12:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_12:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.6.0:update_13:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_13:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.6.0:update_14:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_14:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.6.0:update_15:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_15:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.6.0:update_16:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_16:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.6.0:update_17:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_17:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.6.0:update_18:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_18:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.6.0:update_19:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_19:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.6.0:update_2:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_2:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.6.0:update_20:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_20:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.6.0:update_21:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_21:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.6.0:update_3:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_3:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.6.0:update_4:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_4:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.6.0:update_5:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_5:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.6.0:update_6:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_6:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.6.0:update_7:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_7:*:*:*:*:*:*
CVE-2012-0497 https://nvd.nist.gov/vuln/detail/CVE-2012-0497
GLSA-201401-30 https://security.gentoo.org/glsa/201401-30
GLSA-201406-32 https://security.gentoo.org/glsa/201406-32
RHSA-2012:0135 https://access.redhat.com/errata/RHSA-2012:0135
RHSA-2012:0322 https://access.redhat.com/errata/RHSA-2012:0322
RHSA-2012:0514 https://access.redhat.com/errata/RHSA-2012:0514
RHSA-2013:1455 https://access.redhat.com/errata/RHSA-2013:1455
USN-1373-1 https://usn.ubuntu.com/1373-1/
USN-1373-2 https://usn.ubuntu.com/1373-2/
No exploits are available.
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C Found at https://nvd.nist.gov/vuln/detail/CVE-2012-0497
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Exploit Prediction Scoring System (EPSS)
Percentile 0.89767
EPSS Score 0.02216
Published At Nov. 1, 2024, midnight
Date Actor Action Source VulnerableCode Version
There are no relevant records.