Vulnerability Details : CVE-2013-5830
Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, JRockit R28.2.8 and earlier, JRockit R27.7.6 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries.
Products affected by CVE-2013-5830
- cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_eus:6.4:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_aus:6.4:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:jrockit:*:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.5.0:update11:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.7.0:update1:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.7.0:update2:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.7.0:update5:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.7.0:update6:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.7.0:update3:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.7.0:update4:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.7.0:update10:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.7.0:update11:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.7.0:update7:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.7.0:update9:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.7.0:update17:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.7.0:update13:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.7.0:update15:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.7.0:update25:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.7.0:update21:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.7.0:update11_b32:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.7.0:update10_b31:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.7.0:update25_b35:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.7.0:update25_b33:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.7.0:update17_b31:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.7.0:update21_b31:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.7.0:update17_b32:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.7.0:update40:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.7.0:update25_b34:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.5.0:-:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.5.0:update1:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.5.0:update10:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.5.0:update12:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.5.0:update13:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.5.0:update14:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.5.0:update15:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.5.0:update16:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.5.0:update17:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.5.0:update18:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.5.0:update19:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.5.0:update2:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.5.0:update3:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.5.0:update4:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.5.0:update5:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.5.0:update6:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.5.0:update7:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.5.0:update8:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.5.0:update9:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.6.0:-:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.6.0:update32:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.6.0:update31:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.6.0:update23:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.6.0:update22:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.6.0:update29:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.6.0:update33:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.6.0:update25:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.6.0:update24:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.6.0:update27:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.6.0:update43:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.6.0:update45:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.6.0:update51:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.6.0:update30:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.6.0:update34:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.6.0:update39:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.6.0:update41:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.6.0:update38:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.6.0:update37:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.6.0:update35:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.6.0:update26:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.5.0:update38:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.5.0:update36:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.5.0:update40:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.5.0:update41:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.5.0:update45:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.5.0:update51:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.6.0:update60:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.5.0:update39:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.6.0:update10:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.6.0:update1:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.6.0:update2:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.6.0:update3:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.6.0:update4:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.6.0:update11:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.6.0:update12:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.6.0:update13:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.6.0:update14:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.6.0:update5:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.6.0:update6:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.6.0:update7:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.5.0:update20:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.5.0:update21:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.5.0:update22:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.5.0:update23:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.5.0:update24:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.5.0:update25:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.5.0:update26:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.5.0:update27:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.5.0:update28:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.5.0:update29:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.5.0:update30:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.5.0:update31:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.5.0:update32:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.5.0:update33:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.5.0:update34:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.5.0:update35:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.6.0:update15:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.6.0:update16:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.6.0:update17:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.6.0:update18:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.6.0:update19:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.6.0:update20:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.6.0:update21:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.6.0:update8:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.6.0:update9:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.7.0:-:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.6.0:update32_b31:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.6.0:update32_b32:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.6.0:update33_b31:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.6.0:update33_b32:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.6.0:update33_b33:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.6.0:update34_b31:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.6.0:update34_b32:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.6.0:update35_b31:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.6.0:update35_b32:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.6.0:update37_b31:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.6.0:update37_b32:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.6.0:update38_b31:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.6.0:update43_b31:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.6.0:update51_b31:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.6.0:update51_b32:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.7.0:update1:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.7.0:update4:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.7.0:update5:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.7.0:update2:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.7.0:update3:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.7.0:update6:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.7.0:update7:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.7.0:update9:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.7.0:update10:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.7.0:update11:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.7.0:update17:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.7.0:update15:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.7.0:update13:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.7.0:update25:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.7.0:update21:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.7.0:update11_b32:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.7.0:update10_b31:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.7.0:update40:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.7.0:update25_b34:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.7.0:update9_b32:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.7.0:update21_b31:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.7.0:update17_b32:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.7.0:update25_b35:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.7.0:update25_b33:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.7.0:update17_b31:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.7.0:update9_b31:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.7.0:update7_b32:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.6.0:update45:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.6.0:update30:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.6.0:update33:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.6.0:update32:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.6.0:update24:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.6.0:update35:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.6.0:update25:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.6.0:update39:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.6.0:update51:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.6.0:update31:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.6.0:update22:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.6.0:update38:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.6.0:update37:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.6.0:update29:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.6.0:update27:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.6.0:update23:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.6.0:update41:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.6.0:update43:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.6.0:update34:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.6.0:update26:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.5.0:update38:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.5.0:update36:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.5.0:update40:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.5.0:update41:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.5.0:update45:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.5.0:update51:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.6.0:update60:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.5.0:update39:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.7.0:-:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.6.0:-:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.6.0:update1:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.6.0:update10:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.6.0:update11:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.6.0:update12:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.6.0:update13:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.6.0:update14:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.6.0:update15:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.6.0:update16:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.6.0:update17:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.6.0:update18:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.6.0:update19:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.6.0:update2:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.6.0:update20:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.6.0:update21:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.6.0:update3:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.6.0:update5:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.6.0:update4:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.6.0:update6:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.6.0:update7:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.6.0:update8:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.6.0:update9:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.5.0:update2:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.5.0:update3:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.5.0:update4:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.5.0:update5:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.5.0:update6:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.5.0:update7:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.5.0:update8:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.5.0:update9:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.5.0:update10:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.5.0:update11:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.5.0:update12:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.5.0:update13:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.5.0:update14:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.5.0:update15:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.5.0:update16:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.5.0:update17:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.5.0:update18:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.5.0:update19:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.5.0:update20:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.5.0:update21:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.5.0:update22:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.5.0:update23:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.5.0:update24:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.5.0:update25:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.5.0:update26:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.5.0:update27:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.5.0:update28:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.5.0:update29:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.5.0:update30:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.5.0:update31:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.5.0:update32:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.5.0:update33:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.5.0:update34:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.5.0:update35:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.5.0:-:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.5.0:update1:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:13.04:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:13.10:*:*:*:*:*:*:*
Threat overview for CVE-2013-5830
Top countries where our scanners detected CVE-2013-5830
Top open port discovered on systems with this issue
80
IPs affected by CVE-2013-5830 1,837
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2013-5830!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2013-5830
3.54%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 91 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2013-5830
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
10.0
|
HIGH | AV:N/AC:L/Au:N/C:C/I:C/A:C |
10.0
|
10.0
|
NIST |
References for CVE-2013-5830
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19096
Repository / Oval RepositoryBroken Link
-
http://rhn.redhat.com/errata/RHSA-2013-1793.html
RHSA-2013:1793 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
http://rhn.redhat.com/errata/RHSA-2013-1509.html
RHSA-2013:1509 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
http://marc.info/?l=bugtraq&m=138674031212883&w=2
'[security bulletin] HPSBUX02943 rev.1 - HP-UX Running Java6, Remote Unauthorized Access, Disclosure' - MARCIssue Tracking;Mailing List;Third Party Advisory
-
http://rhn.redhat.com/errata/RHSA-2013-1508.html
RHSA-2013:1508 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
http://rhn.redhat.com/errata/RHSA-2013-1507.html
RHSA-2013:1507 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
http://rhn.redhat.com/errata/RHSA-2013-1447.html
RHSA-2013:1447 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html
Oracle Critical Patch Update - October 2013Vendor Advisory
-
https://access.redhat.com/errata/RHSA-2014:0414
RHSA-2014:0414 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
https://bugzilla.redhat.com/show_bug.cgi?id=1019110
1019110 – (CVE-2013-5830) CVE-2013-5830 OpenJDK: checkPackageAccess missing security check (Libraries, 8017291)Issue Tracking;Third Party Advisory
-
http://support.apple.com/kb/HT5982
About the security content of Java for OS X 2013-005 and Mac OS X v10.6 Update 17 - Apple SupportThird Party Advisory
-
http://rhn.redhat.com/errata/RHSA-2013-1505.html
RHSA-2013:1505 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00013.html
[security-announce] SUSE-SU-2013:1677-1: important: Security update forBroken Link
-
http://marc.info/?l=bugtraq&m=138674073720143&w=2
'[security bulletin] HPSBUX02944 rev.1 - HP-UX Running Java7, Remote Unauthorized Access, Disclosure' - MARCIssue Tracking;Mailing List;Third Party Advisory
-
http://rhn.redhat.com/errata/RHSA-2013-1440.html
RHSA-2013:1440 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
http://lists.opensuse.org/opensuse-updates/2013-11/msg00023.html
openSUSE-SU-2013:1663-1: moderate: update for java-1_7_0-openjdkBroken Link
-
http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00010.html
[security-announce] SUSE-SU-2013:1666-1: important: Security update forBroken Link
-
http://rhn.redhat.com/errata/RHSA-2013-1451.html
RHSA-2013:1451 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
http://www-01.ibm.com/support/docview.wss?uid=swg21655201
IBM Security Bulletin: Multiple vulnerabilities in current releases of the IBM® SDK, Java™ Technology EditionThird Party Advisory
-
http://lists.apple.com/archives/security-announce/2013/Oct/msg00001.html
Apple - Lists.apple.comBroken Link;Mailing List
-
http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS13-025/index.html
Multiple Vulnerabilities in Cosminexus: Software Vulnerability Information: Software: HitachiThird Party Advisory
-
http://www.securityfocus.com/bid/63121
Oracle Java SE CVE-2013-5830 Remote Security VulnerabilityThird Party Advisory;VDB Entry
-
http://www.ubuntu.com/usn/USN-2089-1
USN-2089-1: OpenJDK 7 vulnerabilities | Ubuntu security noticesThird Party Advisory
-
http://www.ubuntu.com/usn/USN-2033-1
USN-2033-1: OpenJDK 6 vulnerabilities | Ubuntu security noticesThird Party Advisory
-
http://security.gentoo.org/glsa/glsa-201406-32.xml
IcedTea JDK: Multiple vulnerabilities (GLSA 201406-32) — Gentoo securityThird Party Advisory
Jump to