Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7 and 6 Update 27 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Scripting.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
History
21 Nov 2024, 01:30
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00049.html - Mailing List, Third Party Advisory | |
References | () http://marc.info/?l=bugtraq&m=132750579901589&w=2 - Mailing List | |
References | () http://marc.info/?l=bugtraq&m=134254866602253&w=2 - Mailing List | |
References | () http://marc.info/?l=bugtraq&m=134254957702612&w=2 - Mailing List | |
References | () http://rhn.redhat.com/errata/RHSA-2013-1455.html - Third Party Advisory | |
References | () http://secunia.com/advisories/48308 - Broken Link | |
References | () http://security.gentoo.org/glsa/glsa-201406-32.xml - Third Party Advisory | |
References | () http://www.ibm.com/developerworks/java/jdk/alerts/ - Product | |
References | () http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html - Patch, Vendor Advisory | |
References | () http://www.redhat.com/support/errata/RHSA-2011-1384.html - Broken Link | |
References | () http://www.securityfocus.com/bid/50218 - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://www.securitytracker.com/id?1026215 - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://www.ubuntu.com/usn/USN-1263-1 - Third Party Advisory | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/70849 - Third Party Advisory, VDB Entry | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13947 - Broken Link |
24 Jul 2024, 14:29
Type | Values Removed | Values Added |
---|---|---|
First Time |
Oracle
Oracle jre Redhat Canonical ubuntu Linux Suse linux Enterprise Server Canonical Suse linux Enterprise Java Suse Redhat satellite With Embedded Oracle Oracle jdk |
|
CVSS |
v2 : v3 : |
v2 : 10.0
v3 : 9.8 |
References | () http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00049.html - Mailing List, Third Party Advisory | |
References | () http://marc.info/?l=bugtraq&m=132750579901589&w=2 - Mailing List | |
References | () http://marc.info/?l=bugtraq&m=134254866602253&w=2 - Mailing List | |
References | () http://marc.info/?l=bugtraq&m=134254957702612&w=2 - Mailing List | |
References | () http://rhn.redhat.com/errata/RHSA-2013-1455.html - Third Party Advisory | |
References | () http://secunia.com/advisories/48308 - Broken Link | |
References | () http://security.gentoo.org/glsa/glsa-201406-32.xml - Third Party Advisory | |
References | () http://www.ibm.com/developerworks/java/jdk/alerts/ - Product | |
References | () http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html - Patch, Vendor Advisory | |
References | () http://www.redhat.com/support/errata/RHSA-2011-1384.html - Broken Link | |
References | () http://www.securityfocus.com/bid/50218 - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://www.securitytracker.com/id?1026215 - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://www.ubuntu.com/usn/USN-1263-1 - Third Party Advisory | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/70849 - Third Party Advisory, VDB Entry | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13947 - Broken Link | |
CPE | cpe:2.3:a:sun:jre:1.6.0:update_24:*:*:*:*:*:* cpe:2.3:a:sun:jdk:1.6.0:update2:*:*:*:*:*:* cpe:2.3:a:sun:jre:1.6.0:update_2:*:*:*:*:*:* cpe:2.3:a:sun:jre:1.6.0:update_21:*:*:*:*:*:* cpe:2.3:a:sun:jdk:1.6.0:update_19:*:*:*:*:*:* cpe:2.3:a:sun:jdk:1.6.0:update_5:*:*:*:*:*:* cpe:2.3:a:sun:jdk:1.6.0:update_3:*:*:*:*:*:* cpe:2.3:a:sun:jdk:1.6.0:update1:*:*:*:*:*:* cpe:2.3:a:sun:jre:1.6.0:update_5:*:*:*:*:*:* cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:* cpe:2.3:a:sun:jre:1.6.0:update_19:*:*:*:*:*:* cpe:2.3:a:sun:jre:1.6.0:update_6:*:*:*:*:*:* cpe:2.3:a:sun:jre:1.6.0:update_3:*:*:*:*:*:* cpe:2.3:a:sun:jre:1.6.0:update_25:*:*:*:*:*:* cpe:2.3:a:sun:jre:1.6.0:update_15:*:*:*:*:*:* cpe:2.3:a:sun:jdk:1.6.0:update_15:*:*:*:*:*:* cpe:2.3:a:sun:jre:1.6.0:update_7:*:*:*:*:*:* cpe:2.3:a:sun:jdk:1.6.0:update_12:*:*:*:*:*:* cpe:2.3:a:sun:jdk:1.6.0:update_6:*:*:*:*:*:* cpe:2.3:a:sun:jre:1.7.0:*:*:*:*:*:*:* cpe:2.3:a:sun:jre:1.6.0:update_14:*:*:*:*:*:* cpe:2.3:a:sun:jre:1.6.0:update_22:*:*:*:*:*:* cpe:2.3:a:sun:jdk:1.6.0:update_13:*:*:*:*:*:* cpe:2.3:a:sun:jdk:*:update_27:*:*:*:*:*:* cpe:2.3:a:sun:jre:1.6.0:update_13:*:*:*:*:*:* cpe:2.3:a:sun:jdk:1.6.0:update_24:*:*:*:*:*:* cpe:2.3:a:sun:jre:1.6.0:update_26:*:*:*:*:*:* cpe:2.3:a:sun:jdk:1.6.0:update_17:*:*:*:*:*:* cpe:2.3:a:sun:jdk:1.6.0:update_20:*:*:*:*:*:* cpe:2.3:a:sun:jdk:1.6.0:update_21:*:*:*:*:*:* cpe:2.3:a:sun:jdk:1.6.0:update_18:*:*:*:*:*:* cpe:2.3:a:sun:jdk:1.6.0:update_23:*:*:*:*:*:* cpe:2.3:a:sun:jre:1.6.0:update_18:*:*:*:*:*:* cpe:2.3:a:sun:jre:1.6.0:update_12:*:*:*:*:*:* cpe:2.3:a:sun:jre:1.6.0:update_11:*:*:*:*:*:* cpe:2.3:a:sun:jdk:1.6.0:update_26:*:*:*:*:*:* cpe:2.3:a:sun:jre:1.6.0:update_20:*:*:*:*:*:* cpe:2.3:a:sun:jre:1.6.0:update_4:*:*:*:*:*:* cpe:2.3:a:sun:jdk:1.6.0:update_11:*:*:*:*:*:* cpe:2.3:a:sun:jdk:1.6.0:update_7:*:*:*:*:*:* cpe:2.3:a:sun:jre:*:update_27:*:*:*:*:*:* cpe:2.3:a:sun:jre:1.6.0:update_23:*:*:*:*:*:* cpe:2.3:a:sun:jre:1.6.0:*:*:*:*:*:*:* cpe:2.3:a:sun:jdk:1.6.0:*:*:*:*:*:*:* cpe:2.3:a:sun:jdk:1.6.0:update_10:*:*:*:*:*:* cpe:2.3:a:sun:jre:1.6.0:update_16:*:*:*:*:*:* cpe:2.3:a:sun:jdk:1.6.0:update_16:*:*:*:*:*:* cpe:2.3:a:sun:jre:1.6.0:update_17:*:*:*:*:*:* cpe:2.3:a:sun:jdk:1.6.0:update_25:*:*:*:*:*:* cpe:2.3:a:sun:jdk:1.7.0:*:*:*:*:*:*:* cpe:2.3:a:sun:jdk:1.6.0:update_22:*:*:*:*:*:* cpe:2.3:a:sun:jdk:1.6.0:update_14:*:*:*:*:*:* cpe:2.3:a:sun:jdk:1.6.0:update_4:*:*:*:*:*:* |
cpe:2.3:a:oracle:jre:1.6.0:update22:*:*:*:*:*:* cpe:2.3:a:oracle:jre:1.7.0:update7:*:*:*:*:*:* cpe:2.3:a:oracle:jre:*:*:*:*:*:*:*:* cpe:2.3:a:oracle:jdk:1.7.0:update15:*:*:*:*:*:* cpe:2.3:a:oracle:jre:1.6.0:update1:*:*:*:*:*:* cpe:2.3:a:oracle:jdk:1.7.0:-:*:*:*:*:*:* cpe:2.3:a:oracle:jdk:*:*:*:*:*:*:*:* cpe:2.3:a:oracle:jre:1.7.0:update17_b31:*:*:*:*:*:* cpe:2.3:a:oracle:jdk:1.6.0:update18:*:*:*:*:*:* cpe:2.3:a:oracle:jre:1.6.0:update12:*:*:*:*:*:* cpe:2.3:a:oracle:jdk:1.6.0:update20:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise_java:10:sp4:*:*:*:*:*:* cpe:2.3:a:oracle:jdk:1.6.0:update17:*:*:*:*:*:* cpe:2.3:a:oracle:jdk:1.7.0:update9_b31:*:*:*:*:*:* cpe:2.3:a:oracle:jre:1.7.0:update4:*:*:*:*:*:* cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:* cpe:2.3:a:oracle:jdk:1.7.0:update10:*:*:*:*:*:* cpe:2.3:a:oracle:jre:1.6.0:update26:*:*:*:*:*:* cpe:2.3:a:oracle:jre:1.6.0:update15:*:*:*:*:*:* cpe:2.3:a:oracle:jre:1.7.0:update13:*:*:*:*:*:* cpe:2.3:a:oracle:jre:1.7.0:update9:*:*:*:*:*:* cpe:2.3:a:oracle:jdk:1.6.0:update23:*:*:*:*:*:* cpe:2.3:a:oracle:jre:1.7.0:update10:*:*:*:*:*:* cpe:2.3:a:oracle:jdk:1.6.0:update10:*:*:*:*:*:* cpe:2.3:a:oracle:jdk:1.7.0:update1:*:*:*:*:*:* cpe:2.3:a:oracle:jre:1.6.0:update17:*:*:*:*:*:* cpe:2.3:a:oracle:jdk:1.6.0:update13:*:*:*:*:*:* cpe:2.3:a:oracle:jdk:1.7.0:update17:*:*:*:*:*:* cpe:2.3:a:oracle:jre:1.6.0:update11:*:*:*:*:*:* cpe:2.3:a:oracle:jre:1.6.0:update3:*:*:*:*:*:* cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:* cpe:2.3:a:oracle:jdk:1.7.0:update4:*:*:*:*:*:* cpe:2.3:a:oracle:jre:1.6.0:update9:*:*:*:*:*:* cpe:2.3:a:oracle:jre:1.7.0:update25_b33:*:*:*:*:*:* cpe:2.3:a:oracle:jdk:1.6.0:update22:*:*:*:*:*:* cpe:2.3:a:oracle:jre:1.7.0:update3:*:*:*:*:*:* cpe:2.3:a:oracle:jdk:1.7.0:update2:*:*:*:*:*:* cpe:2.3:a:oracle:jdk:1.6.0:update11:*:*:*:*:*:* cpe:2.3:a:oracle:jre:1.7.0:update1:*:*:*:*:*:* cpe:2.3:a:oracle:jdk:1.7.0:update9_b32:*:*:*:*:*:* cpe:2.3:a:oracle:jre:1.7.0:update17:*:*:*:*:*:* cpe:2.3:a:oracle:jdk:1.6.0:update25:*:*:*:*:*:* cpe:2.3:a:oracle:jdk:1.7.0:update11:*:*:*:*:*:* cpe:2.3:a:oracle:jre:1.7.0:update17_b32:*:*:*:*:*:* cpe:2.3:a:oracle:jre:1.6.0:update20:*:*:*:*:*:* cpe:2.3:a:oracle:jre:1.7.0:update21_b31:*:*:*:*:*:* cpe:2.3:a:oracle:jre:1.6.0:update6:*:*:*:*:*:* cpe:2.3:a:oracle:jdk:1.6.0:update14:*:*:*:*:*:* cpe:2.3:a:oracle:jdk:1.7.0:update13:*:*:*:*:*:* cpe:2.3:a:oracle:jre:1.6.0:update5:*:*:*:*:*:* cpe:2.3:a:oracle:jdk:1.7.0:update6:*:*:*:*:*:* cpe:2.3:a:oracle:jre:1.6.0:update18:*:*:*:*:*:* cpe:2.3:a:oracle:jre:1.7.0:update10_b31:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:-:*:*:* cpe:2.3:a:oracle:jre:1.6.0:update13:*:*:*:*:*:* cpe:2.3:a:oracle:jdk:1.6.0:update19:*:*:*:*:*:* cpe:2.3:a:oracle:jdk:1.7.0:update7_b32:*:*:*:*:*:* cpe:2.3:a:oracle:jre:1.6.0:update19:*:*:*:*:*:* cpe:2.3:a:oracle:jdk:1.6.0:update1:*:*:*:*:*:* cpe:2.3:a:oracle:jdk:1.6.0:update12:*:*:*:*:*:* cpe:2.3:a:oracle:jdk:1.7.0:update7:*:*:*:*:*:* cpe:2.3:a:oracle:jre:1.6.0:update16:*:*:*:*:*:* cpe:2.3:a:oracle:jre:1.7.0:update25_b34:*:*:*:*:*:* cpe:2.3:a:oracle:jre:1.7.0:update7_b32:*:*:*:*:*:* cpe:2.3:a:oracle:jre:1.6.0:update24:*:*:*:*:*:* cpe:2.3:a:oracle:jre:1.6.0:update23:*:*:*:*:*:* cpe:2.3:a:oracle:jre:1.6.0:-:*:*:*:*:*:* cpe:2.3:a:oracle:jre:1.6.0:update21:*:*:*:*:*:* cpe:2.3:a:oracle:jdk:1.7.0:update21:*:*:*:*:*:* cpe:2.3:a:oracle:jdk:1.6.0:update15:*:*:*:*:*:* cpe:2.3:a:redhat:satellite_with_embedded_oracle:5.4:*:*:*:*:*:*:* cpe:2.3:o:canonical:ubuntu_linux:11.04:*:*:*:*:*:*:* cpe:2.3:a:oracle:jre:1.7.0:update21:*:*:*:*:*:* cpe:2.3:a:oracle:jdk:1.7.0:update9:*:*:*:*:*:* cpe:2.3:a:oracle:jdk:1.6.0:update26:*:*:*:*:*:* cpe:2.3:a:oracle:jre:1.7.0:-:*:*:*:*:*:* cpe:2.3:a:oracle:jre:1.7.0:update15:*:*:*:*:*:* cpe:2.3:a:oracle:jdk:1.6.0:update2:*:*:*:*:*:* cpe:2.3:a:oracle:jre:1.6.0:update4:*:*:*:*:*:* cpe:2.3:a:oracle:jdk:1.6.0:-:*:*:*:*:*:* cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:* cpe:2.3:a:oracle:jdk:1.7.0:update3:*:*:*:*:*:* cpe:2.3:a:oracle:jre:1.6.0:update7:*:*:*:*:*:* cpe:2.3:a:oracle:jre:1.6.0:update14:*:*:*:*:*:* cpe:2.3:a:oracle:jre:1.7.0:update25:*:*:*:*:*:* cpe:2.3:a:oracle:jre:1.7.0:update11:*:*:*:*:*:* cpe:2.3:a:oracle:jdk:1.7.0:update5:*:*:*:*:*:* cpe:2.3:a:oracle:jre:1.6.0:update2:*:*:*:*:*:* cpe:2.3:a:oracle:jdk:1.6.0:update21:*:*:*:*:*:* cpe:2.3:a:oracle:jdk:1.7.0:update25:*:*:*:*:*:* cpe:2.3:a:oracle:jre:1.6.0:update25:*:*:*:*:*:* cpe:2.3:a:oracle:jdk:1.6.0:update24:*:*:*:*:*:* cpe:2.3:a:oracle:jre:1.7.0:update2:*:*:*:*:*:* cpe:2.3:a:oracle:jre:1.6.0:update8:*:*:*:*:*:* cpe:2.3:a:oracle:jre:1.7.0:update25_b35:*:*:*:*:*:* cpe:2.3:a:oracle:jdk:1.6.0:update16:*:*:*:*:*:* cpe:2.3:a:oracle:jre:1.7.0:update6:*:*:*:*:*:* cpe:2.3:a:oracle:jre:1.7.0:update5:*:*:*:*:*:* |
Information
Published : 2011-10-19 21:55
Updated : 2024-11-21 01:30
NVD link : CVE-2011-3544
Mitre link : CVE-2011-3544
CVE.ORG link : CVE-2011-3544
JSON object : View
Products Affected
suse
- linux_enterprise_server
- linux_enterprise_java
oracle
- jre
- jdk
canonical
- ubuntu_linux
redhat
- satellite_with_embedded_oracle
CWE