Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Serviceability. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to "insufficient access checks" in the tracing component.
Published 2013-06-18 22:55:03
Updated 2017-09-19 01:36:22
Source Oracle
View at NVD,   CVE.org

Products affected by CVE-2013-2460

Threat overview for CVE-2013-2460

Top countries where our scanners detected CVE-2013-2460
Top open port discovered on systems with this issue 80
IPs affected by CVE-2013-2460 78
Threat actors abusing to this issue? Yes
Find out if you* are affected by CVE-2013-2460!
*Directly or indirectly through your vendors, service providers and 3rd parties. Powered by attack surface intelligence from SecurityScorecard.

Exploit prediction scoring system (EPSS) score for CVE-2013-2460

97.11%
Probability of exploitation activity in the next 30 days EPSS Score History
~ 100 %
Percentile, the proportion of vulnerabilities that are scored at or less

Metasploit modules for CVE-2013-2460

  • Java Applet ProviderSkeleton Insecure Invoke Method
    Disclosure Date: 2013-06-18
    First seen: 2020-04-26
    exploit/multi/browser/java_jre17_provider_skeleton
    This module abuses the insecure invoke() method of the ProviderSkeleton class that allows to call arbitrary static methods with user supplied arguments. The vulnerability affects Java version 7u21 and earlier. Authors: - Adam Gowdiak - Matthias Kaiser

CVSS scores for CVE-2013-2460

Base Score Base Severity CVSS Vector Exploitability Score Impact Score Score Source First Seen
9.3
HIGH AV:N/AC:M/Au:N/C:C/I:C/A:C
8.6
10.0
NIST

References for CVE-2013-2460

Jump to
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!