CVE-2012-5084

Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, 5.0 Update 36 and earlier, and 1.4.2_38 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Swing.
References
Link Resource
http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00016.html
http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00023.html
http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00010.html
http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00011.html
http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00022.html
http://marc.info/?l=bugtraq&m=135542848327757&w=2
http://marc.info/?l=bugtraq&m=135542848327757&w=2
http://marc.info/?l=bugtraq&m=135758563611658&w=2
http://marc.info/?l=bugtraq&m=135758563611658&w=2
http://rhn.redhat.com/errata/RHSA-2012-1385.html
http://rhn.redhat.com/errata/RHSA-2012-1386.html
http://rhn.redhat.com/errata/RHSA-2012-1391.html
http://rhn.redhat.com/errata/RHSA-2012-1392.html
http://rhn.redhat.com/errata/RHSA-2012-1465.html
http://rhn.redhat.com/errata/RHSA-2012-1466.html
http://rhn.redhat.com/errata/RHSA-2012-1467.html
http://rhn.redhat.com/errata/RHSA-2013-1455.html
http://rhn.redhat.com/errata/RHSA-2013-1456.html
http://secunia.com/advisories/51028
http://secunia.com/advisories/51029
http://secunia.com/advisories/51141
http://secunia.com/advisories/51166
http://secunia.com/advisories/51313
http://secunia.com/advisories/51315
http://secunia.com/advisories/51326
http://secunia.com/advisories/51327
http://secunia.com/advisories/51328
http://secunia.com/advisories/51390
http://secunia.com/advisories/51393
http://secunia.com/advisories/51438
http://security.gentoo.org/glsa/glsa-201406-32.xml
http://www-01.ibm.com/support/docview.wss?uid=swg21616490
http://www-01.ibm.com/support/docview.wss?uid=swg21620037
http://www-01.ibm.com/support/docview.wss?uid=swg21621154
http://www-01.ibm.com/support/docview.wss?uid=swg21631786
http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS12-023/index.html
http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html Patch Vendor Advisory
http://www.securityfocus.com/bid/56063
http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf
https://exchange.xforce.ibmcloud.com/vulnerabilities/79423
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16553
http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00016.html
http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00023.html
http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00010.html
http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00011.html
http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00022.html
http://marc.info/?l=bugtraq&m=135542848327757&w=2
http://marc.info/?l=bugtraq&m=135542848327757&w=2
http://marc.info/?l=bugtraq&m=135758563611658&w=2
http://marc.info/?l=bugtraq&m=135758563611658&w=2
http://rhn.redhat.com/errata/RHSA-2012-1385.html
http://rhn.redhat.com/errata/RHSA-2012-1386.html
http://rhn.redhat.com/errata/RHSA-2012-1391.html
http://rhn.redhat.com/errata/RHSA-2012-1392.html
http://rhn.redhat.com/errata/RHSA-2012-1465.html
http://rhn.redhat.com/errata/RHSA-2012-1466.html
http://rhn.redhat.com/errata/RHSA-2012-1467.html
http://rhn.redhat.com/errata/RHSA-2013-1455.html
http://rhn.redhat.com/errata/RHSA-2013-1456.html
http://secunia.com/advisories/51028
http://secunia.com/advisories/51029
http://secunia.com/advisories/51141
http://secunia.com/advisories/51166
http://secunia.com/advisories/51313
http://secunia.com/advisories/51315
http://secunia.com/advisories/51326
http://secunia.com/advisories/51327
http://secunia.com/advisories/51328
http://secunia.com/advisories/51390
http://secunia.com/advisories/51393
http://secunia.com/advisories/51438
http://security.gentoo.org/glsa/glsa-201406-32.xml
http://www-01.ibm.com/support/docview.wss?uid=swg21616490
http://www-01.ibm.com/support/docview.wss?uid=swg21620037
http://www-01.ibm.com/support/docview.wss?uid=swg21621154
http://www-01.ibm.com/support/docview.wss?uid=swg21631786
http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS12-023/index.html
http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html Patch Vendor Advisory
http://www.securityfocus.com/bid/56063
http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf
https://exchange.xforce.ibmcloud.com/vulnerabilities/79423
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16553
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:oracle:jdk:*:update7:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.7.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.7.0:update1:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.7.0:update2:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.7.0:update3:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.7.0:update4:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.7.0:update5:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.7.0:update6:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:*:update7:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.7.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.7.0:update1:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.7.0:update2:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.7.0:update3:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.7.0:update4:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.7.0:update5:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.7.0:update6:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:oracle:jdk:*:update35:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.6.0:update22:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.6.0:update23:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.6.0:update24:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.6.0:update25:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.6.0:update26:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.6.0:update27:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.6.0:update29:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.6.0:update30:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.6.0:update31:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.6.0:update32:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.6.0:update33:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.6.0:update34:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:*:update35:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.6.0:update22:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.6.0:update23:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.6.0:update24:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.6.0:update25:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.6.0:update26:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.6.0:update27:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.6.0:update29:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.6.0:update30:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.6.0:update31:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.6.0:update32:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.6.0:update33:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.6.0:update34:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.6.0:update_10:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.6.0:update_11:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.6.0:update_12:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.6.0:update_13:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.6.0:update_14:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.6.0:update_15:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.6.0:update_16:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.6.0:update_17:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.6.0:update_18:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.6.0:update_19:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.6.0:update_3:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.6.0:update_4:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.6.0:update_5:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.6.0:update_6:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.6.0:update_7:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.6.0:update1:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.6.0:update1_b06:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.6.0:update2:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.6.0.200:update20:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.6.0.210:update21:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.6.0:*:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.6.0:update_10:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.6.0:update_11:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.6.0:update_12:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.6.0:update_13:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.6.0:update_14:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.6.0:update_15:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.6.0:update_16:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.6.0:update_17:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.6.0:update_18:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.6.0:update_19:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.6.0:update_2:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.6.0:update_20:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.6.0:update_21:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.6.0:update_3:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.6.0:update_4:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.6.0:update_5:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.6.0:update_6:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.6.0:update_7:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:a:oracle:jdk:*:update36:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:*:update36:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:*:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update1:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update10:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update11:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update11_b03:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update12:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update13:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update14:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update15:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update16:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update17:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update18:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update19:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update2:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update20:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update21:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update22:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update23:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update24:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update25:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update26:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update27:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update28:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update29:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update3:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update31:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update33:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update4:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update5:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update6:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update7:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update7_b03:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update8:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update9:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:*:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update1:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update10:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update11:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update12:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update13:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update14:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update15:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update16:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update17:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update18:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update19:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update2:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update20:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update21:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update22:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update23:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update24:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update25:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update26:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update27:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update28:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update29:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update3:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update31:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update33:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update4:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update5:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update6:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update7:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update8:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update9:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:a:oracle:jdk:*:*:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:*:*:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.4.2:*:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.4.2_1:*:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.4.2_2:*:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.4.2_3:*:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.4.2_4:*:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.4.2_5:*:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.4.2_6:*:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.4.2_7:*:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.4.2_8:*:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.4.2_9:*:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.4.2_10:*:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.4.2_11:*:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.4.2_12:*:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.4.2_13:*:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.4.2_14:*:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.4.2_15:*:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.4.2_16:*:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.4.2_17:*:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.4.2_18:*:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.4.2_19:*:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.4.2_22:*:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.4.2_23:*:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.4.2_25:*:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.4.2_26:*:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.4.2_27:*:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.4.2_28:*:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.4.2_29:*:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.4.2_30:*:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.4.2_31:*:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.4.2_32:*:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.4.2_33:*:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.4.2_34:*:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.4.2_35:*:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.4.2_36:*:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.4.2_37:*:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.4.2_1:*:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.4.2_2:*:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.4.2_3:*:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.4.2_4:*:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.4.2_5:*:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.4.2_6:*:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.4.2_7:*:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.4.2_8:*:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.4.2_9:*:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.4.2_10:*:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.4.2_11:*:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.4.2_12:*:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.4.2_13:*:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.4.2_14:*:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.4.2_15:*:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.4.2_16:*:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.4.2_17:*:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.4.2_18:*:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.4.2_19:*:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.4.2_20:*:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.4.2_21:*:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.4.2_22:*:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.4.2_23:*:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.4.2_24:*:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.4.2_25:*:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.4.2_26:*:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.4.2_27:*:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.4.2_28:*:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.4.2_29:*:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.4.2_30:*:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.4.2_31:*:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.4.2_32:*:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.4.2_33:*:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.4.2_34:*:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.4.2_35:*:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.4.2_36:*:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.4.2_37:*:*:*:*:*:*:*

History

21 Nov 2024, 01:44

Type Values Removed Values Added
References () http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00016.html - () http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00016.html -
References () http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00023.html - () http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00023.html -
References () http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00010.html - () http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00010.html -
References () http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00011.html - () http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00011.html -
References () http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00022.html - () http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00022.html -
References () http://marc.info/?l=bugtraq&m=135542848327757&w=2 - () http://marc.info/?l=bugtraq&m=135542848327757&w=2 -
References () http://marc.info/?l=bugtraq&m=135758563611658&w=2 - () http://marc.info/?l=bugtraq&m=135758563611658&w=2 -
References () http://rhn.redhat.com/errata/RHSA-2012-1385.html - () http://rhn.redhat.com/errata/RHSA-2012-1385.html -
References () http://rhn.redhat.com/errata/RHSA-2012-1386.html - () http://rhn.redhat.com/errata/RHSA-2012-1386.html -
References () http://rhn.redhat.com/errata/RHSA-2012-1391.html - () http://rhn.redhat.com/errata/RHSA-2012-1391.html -
References () http://rhn.redhat.com/errata/RHSA-2012-1392.html - () http://rhn.redhat.com/errata/RHSA-2012-1392.html -
References () http://rhn.redhat.com/errata/RHSA-2012-1465.html - () http://rhn.redhat.com/errata/RHSA-2012-1465.html -
References () http://rhn.redhat.com/errata/RHSA-2012-1466.html - () http://rhn.redhat.com/errata/RHSA-2012-1466.html -
References () http://rhn.redhat.com/errata/RHSA-2012-1467.html - () http://rhn.redhat.com/errata/RHSA-2012-1467.html -
References () http://rhn.redhat.com/errata/RHSA-2013-1455.html - () http://rhn.redhat.com/errata/RHSA-2013-1455.html -
References () http://rhn.redhat.com/errata/RHSA-2013-1456.html - () http://rhn.redhat.com/errata/RHSA-2013-1456.html -
References () http://secunia.com/advisories/51028 - () http://secunia.com/advisories/51028 -
References () http://secunia.com/advisories/51029 - () http://secunia.com/advisories/51029 -
References () http://secunia.com/advisories/51141 - () http://secunia.com/advisories/51141 -
References () http://secunia.com/advisories/51166 - () http://secunia.com/advisories/51166 -
References () http://secunia.com/advisories/51313 - () http://secunia.com/advisories/51313 -
References () http://secunia.com/advisories/51315 - () http://secunia.com/advisories/51315 -
References () http://secunia.com/advisories/51326 - () http://secunia.com/advisories/51326 -
References () http://secunia.com/advisories/51327 - () http://secunia.com/advisories/51327 -
References () http://secunia.com/advisories/51328 - () http://secunia.com/advisories/51328 -
References () http://secunia.com/advisories/51390 - () http://secunia.com/advisories/51390 -
References () http://secunia.com/advisories/51393 - () http://secunia.com/advisories/51393 -
References () http://secunia.com/advisories/51438 - () http://secunia.com/advisories/51438 -
References () http://security.gentoo.org/glsa/glsa-201406-32.xml - () http://security.gentoo.org/glsa/glsa-201406-32.xml -
References () http://www-01.ibm.com/support/docview.wss?uid=swg21616490 - () http://www-01.ibm.com/support/docview.wss?uid=swg21616490 -
References () http://www-01.ibm.com/support/docview.wss?uid=swg21620037 - () http://www-01.ibm.com/support/docview.wss?uid=swg21620037 -
References () http://www-01.ibm.com/support/docview.wss?uid=swg21621154 - () http://www-01.ibm.com/support/docview.wss?uid=swg21621154 -
References () http://www-01.ibm.com/support/docview.wss?uid=swg21631786 - () http://www-01.ibm.com/support/docview.wss?uid=swg21631786 -
References () http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS12-023/index.html - () http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS12-023/index.html -
References () http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html - Patch, Vendor Advisory () http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html - Patch, Vendor Advisory
References () http://www.securityfocus.com/bid/56063 - () http://www.securityfocus.com/bid/56063 -
References () http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf - () http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/79423 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/79423 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16553 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16553 -

Information

Published : 2012-10-16 21:55

Updated : 2024-11-21 01:44


NVD link : CVE-2012-5084

Mitre link : CVE-2012-5084

CVE.ORG link : CVE-2012-5084


JSON object : View

Products Affected

oracle

  • jdk
  • jre

sun

  • jre
  • jdk