Vulnerability Name:

CVE-2012-0498 (CCN-73186)

Assigned:2012-02-14
Published:2012-02-14
Updated:2022-05-13
Summary:Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, and 5.0 Update 33 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.
CVSS v3 Severity:10.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
CVSS v2 Severity:10.0 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)
7.4 High (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
10.0 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)
7.4 High (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
6.8 Medium (REDHAT CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P)
5.0 Medium (REDHAT Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Type:CWE-noinfo
Vulnerability Consequences:Gain Access
References:Source: MITRE
Type: CNA
CVE-2012-0498

Source: SUSE
Type: UNKNOWN
SUSE-SU-2012:0602

Source: SUSE
Type: UNKNOWN
SUSE-SU-2012:0603

Source: HP
Type: UNKNOWN
HPSBUX02757

Source: HP
Type: UNKNOWN
SSRT100805

Source: HP
Type: UNKNOWN
HPSBUX02784

Source: HP
Type: UNKNOWN
HPSBMU02799

Source: HP
Type: UNKNOWN
SSRT100867

Source: CCN
Type: RHSA-2012-0139
Critical: java-1.6.0-sun security update

Source: CCN
Type: RHSA-2012-0508
Critical: java-1.5.0-ibm security update

Source: REDHAT
Type: UNKNOWN
RHSA-2012:0508

Source: CCN
Type: RHSA-2012-0514
Critical: java-1.6.0-ibm security update

Source: REDHAT
Type: UNKNOWN
RHSA-2012:0514

Source: CCN
Type: RHSA-2013-1455
Low: Red Hat Network Satellite server IBM Java Runtime security update

Source: REDHAT
Type: UNKNOWN
RHSA-2013:1455

Source: CCN
Type: SA48009
Oracle Java SE Multiple Vulnerabilities

Source: SECUNIA
Type: UNKNOWN
48073

Source: CCN
Type: SA48074
Hitachi Cosminexus Products Java Multiple Vulnerabilities

Source: SECUNIA
Type: UNKNOWN
48074

Source: CCN
Type: SA48546
IBM 31-bit SDK for z/OS Multiple Vulnerabilities

Source: SECUNIA
Type: UNKNOWN
48589

Source: SECUNIA
Type: UNKNOWN
48692

Source: CCN
Type: SA48854
IBM 31-bit SDK for z/OS and IBM 64-bit SDK for z/OS Multiple Vulnerabilities

Source: CCN
Type: SA48915
IBM Java 5 Multiple Vulnerabilities

Source: SECUNIA
Type: UNKNOWN
48915

Source: SECUNIA
Type: UNKNOWN
48948

Source: SECUNIA
Type: UNKNOWN
48950

Source: CCN
Type: SA53006
IBM Tivoli System Automation Application Manager Multiple Vulnerabilities

Source: CCN
Type: SA53238
IBM Cognos Express Two Vulnerabilities

Source: CCN
Type: Apple KB HT5228
About the security content of Java for OS X Lion 2012-001 and Java for Mac OS X 10.6 Update 7

Source: CCN
Type: IBM Security Bulletin 1626697
Multiple vulnerabilities in IBM Cognos BI 8.4.1,10.1, 10.1.1 and 10.2 (CVE-2011-3026, CVE-2011-4858, CVE-2012-0498, CVE-2012-2177, CVE-2012-2193, CVE-2012-4835, CVE-2012-4836, CVE-2012-4837, CVE-2012-4840, CVE-2012-4858, CVE-2012-5081)

Source: CCN
Type: IBM Security Bulletin 1632668
IBM Tivoli System Automation for Multiplatforms

Source: CCN
Type: IBM Security Bulletin 1633918
The Java version bundled with IBM Cognos Express is susceptible to unspecified vulnerabilities in the Java Runtime Environment (JRE) (CVE-2012-0498 and CVE-2012-5081)

Source: CCN
Type: IBM Security Bulletin 1633991
Tivoli System Automation Application Manager 3.2.2

Source: CCN
Type: IBM Security Bulletin 1650822
Java Security Vulnerabilitys addressed in IBM Tivoli Netcool OMNIbus

Source: CCN
Type: Hitachi Security Vulnerability Information HS12-007
Multiple Vulnerabilities in Cosminexus

Source: CCN
Type: IBM APAR PM59971
GEN APAR: 31-BIT JAVA FOR Z/OS SDK 6 SERVICE REFRESH (SR10 FP1) THE PTF FOR THIS APAR DELIVERS THE LATEST CUMULATIVE SERVICE

Source: CCN
Type: IBM APAR PM59978
GEN APAR: 64-BIT JAVA FOR Z/OS SDK 6 SERVICE REFRESH (SR10 FP1) THE PTF FOR THIS APAR DELIVERS THE LATEST CUMULATIVE SERVICE

Source: CCN
Type: IBM APAR PM60958
GEN APAR: 31-BIT JAVA FOR Z/OS SDK 5 SERVICE REFRESH (SR13 FP1) THE PTF FOR THIS APAR DELIVERS THE LATEST CUMULATIVE SERVICE

Source: MANDRIVA
Type: UNKNOWN
MDVSA-2013:150

Source: CONFIRM
Type: UNKNOWN
http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html

Source: CCN
Type: Oracle Java SE Critical Patch Update Advisory - February 2012
Oracle Java SE Critical Patch Update Advisory - February 2012

Source: CONFIRM
Type: Vendor Advisory
http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html

Source: CCN
Type: OSVDB ID: 79225
Oracle Java SE 2D Component cmm.dll nTblSize Variable Multi-Function A-to-B Curve Data Parsing Memory Corruption

Source: BID
Type: UNKNOWN
52019

Source: CCN
Type: BID-52019
Oracle Java SE CVE-2012-0498 Remote Code Execution Vulnerability

Source: XF
Type: UNKNOWN
javase-jre-cve20120498(73186)

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:15075

Source: CCN
Type: WhiteSource Vulnerability Database
CVE-2012-0498

Source: CCN
Type: ZDI-12-060
Oracle Java Runtime readMabCurveData nTblSize Remote Code Execution Vulnerability

Vulnerable Configuration:Configuration 1:
  • cpe:/a:sun:jre:1.5.0:update22:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.5.0:update31:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.5.0:-:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.5.0:update18:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.5.0:update27:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.5.0:update2:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.5.0:update13:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.5.0:update24:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.5.0:update12:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.5.0:update26:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.5.0:update28:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.5.0:update21:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.5.0:update6:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.5.0:update1:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.5.0:update16:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.5.0:update20:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.5.0:update3:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.5.0:update5:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.5.0:update9:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.5.0:update19:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.5.0:update7:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.5.0:update8:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.5.0:update14:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:*:update33:*:*:*:*:*:* (Version <= 1.5.0)
  • OR cpe:/a:sun:jre:1.5.0:update25:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.5.0:update10:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.5.0:update23:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.5.0:update4:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.5.0:update15:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.5.0:update11:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.5.0:update17:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.5.0:update29:*:*:*:*:*:*

  • Configuration 2:
  • cpe:/a:sun:jre:1.6.0:update_3:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.6.0:update_5:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.6.0:update_13:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.6.0:update_1:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.6.0:update_2:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.6.0:update_16:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.6.0:update_20:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.6.0:update_15:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.6.0:update_6:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.6.0:update_19:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.6.0:update_21:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.6.0:update_7:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.6.0:update_12:*:*:*:*:*:*
  • OR cpe:/a:oracle:jre:1.6.0:update22:*:*:*:*:*:*
  • OR cpe:/a:oracle:jre:1.6.0:update23:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.6.0:update_10:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.6.0:update_4:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.6.0:update_11:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.6.0:update_14:*:*:*:*:*:*
  • OR cpe:/a:oracle:jre:1.6.0:update24:*:*:*:*:*:*
  • OR cpe:/a:oracle:jre:1.6.0:update25:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.6.0:update_17:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.6.0:update_18:*:*:*:*:*:*
  • OR cpe:/a:oracle:jre:1.6.0:update29:*:*:*:*:*:*
  • OR cpe:/a:oracle:jre:*:update30:*:*:*:*:*:* (Version <= 1.6.0)
  • OR cpe:/a:sun:jre:1.6.0:-:*:*:*:*:*:*
  • OR cpe:/a:oracle:jre:1.6.0:update26:*:*:*:*:*:*
  • OR cpe:/a:oracle:jre:1.6.0:update27:*:*:*:*:*:*

  • Configuration 3:
  • cpe:/a:oracle:jre:*:update2:*:*:*:*:*:* (Version <= 1.7.0)
  • OR cpe:/a:oracle:jre:1.7.0:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:jre:1.7.0:update1:*:*:*:*:*:*

  • Configuration RedHat 1:
  • cpe:/a:redhat:rhel_extras:6:*:*:*:*:*:*:*

  • Configuration RedHat 2:
  • cpe:/a:redhat:rhel_extras:5:*:*:*:*:*:*:*

  • Configuration RedHat 3:
  • cpe:/a:redhat:rhel_extras:4:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:sun:jre:1.1.5.0:update7:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.1.5.0:update11:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.1.5.0:update9:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.1.5.0:update3:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.1.5.0:update12:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.1.5.0:update10:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.1.5.0:update8:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.1.5.0:update13:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.1.5.0:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.1.5.0:update6:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.1.5.0:update1:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.1.5.0:update4:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.1.5.0:update5:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.1.5.0:update2:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.1.5.0:update14:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.1.5.0:update15:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.1.5.0:update16:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.1.5.0:update17:*:*:*:*:*:*
  • OR cpe:/a:oracle:jre:1.7.0:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:jre:1.7.0:update1:*:*:*:*:*:*
  • OR cpe:/a:oracle:jre:1.7.0:update2:*:*:*:*:*:*
  • AND
  • cpe:/a:redhat:rhel_extras:4:*:*:*:*:*:*:*
  • OR cpe:/a:hitachi:ucosminexus_service_architect:*:*:*:*:*:*:*:*
  • OR cpe:/a:hitachi:processing_kit_for_xml:01-00:*:*:*:*:*:*:*
  • OR cpe:/a:hitachi:ucosminexus_client:06-70-/f:*:*:*:*:*:*:*
  • OR cpe:/a:hitachi:ucosminexus_operator:07-00-05:*:*:*:*:*:*:*
  • OR cpe:/a:hitachi:ucosminexus_service_platform:*:*:*:*:*:*:*:*
  • OR cpe:/a:hitachi:cosminexus_application_server:05-00:*:*:*:*:*:*:*
  • OR cpe:/a:hitachi:cosminexus_application_server:06-00:-:enterprise:*:*:*:*:*
  • OR cpe:/a:hitachi:cosminexus_server:04-00:-:standard:*:*:*:*:*
  • OR cpe:/a:hitachi:cosminexus_studio:04-00:-:standard:*:*:*:*:*
  • OR cpe:/a:hitachi:ucosminexus_application_server:06-70:-:enterprise:*:*:*:*:*
  • OR cpe:/a:hitachi:ucosminexus_developer:06-70:-:light:*:*:*:*:*
  • OR cpe:/a:ibm:cognos_business_intelligence:8.4.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:tivoli_netcool/omnibus:7.3.0:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x:10.6.8:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x_server:10.6.8:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_server_supplementary:6:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_workstation_supplementary:6:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_desktop_supplementary:6:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_hpc_node_supplementary:6:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x_server:10.7.3:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x:10.7.3:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:cognos_business_intelligence:10.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:cognos_business_intelligence:10.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:cognos_business_intelligence:10.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:tivoli_system_automation:3.2:*:*:*:*:*:-:*
  • OR cpe:/a:ibm:tivoli_system_automation:3.2.1:*:*:*:*:*:-:*
  • OR cpe:/a:ibm:tivoli_system_automation:3.2.2:*:*:*:*:*:-:*
  • OR cpe:/a:ibm:tivoli_system_automation_application_manager:3.2.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:cognos_express:10.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:tivoli_netcool/omnibus:7.3.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:tivoli_netcool/omnibus:7.4.0:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:20120498
    V
    CVE-2012-0498
    2022-05-20
    oval:org.opensuse.security:def:33039
    P
    Security update for binutils (Moderate)
    2021-11-09
    oval:org.opensuse.security:def:32982
    P
    Security update for java-1_8_0-openjdk (Important)
    2021-08-20
    oval:org.opensuse.security:def:33088
    P
    Security update for MozillaFirefox (Important)
    2021-03-01
    oval:org.opensuse.security:def:28942
    P
    Security update for java-1_8_0-ibm (Important)
    2021-02-26
    oval:org.opensuse.security:def:28564
    P
    Security update for OpenJDK 1.6
    2020-12-01
    oval:org.opensuse.security:def:32363
    P
    Security update for sudo (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:29145
    P
    Security update for kvm (Important)
    2020-12-01
    oval:org.opensuse.security:def:28706
    P
    Security update for gstreamer-0_10-plugins-bad
    2020-12-01
    oval:org.opensuse.security:def:32375
    P
    Security update for tiff (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:29819
    P
    Security update for IBM Java 1.6.0
    2020-12-01
    oval:org.opensuse.security:def:33127
    P
    kernel-default on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:32588
    P
    pam on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:28354
    P
    Security update for pidgin (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:33194
    P
    libxml2 on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:29045
    P
    Security update for adns (Important)
    2020-12-01
    oval:org.opensuse.security:def:32739
    P
    libxml2 on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:28433
    P
    Security update for wireshark (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:33871
    P
    Security update for xorg-x11-server (Important)
    2020-12-01
    oval:org.opensuse.security:def:29101
    P
    Recommended update for glibc (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:28649
    P
    Security update for CUPS
    2020-12-01
    oval:org.opensuse.security:def:32364
    P
    Security update for sudo (Important)
    2020-12-01
    oval:org.opensuse.security:def:29783
    P
    Security update for gpg2 (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:28790
    P
    Security update for mysql (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:32453
    P
    Security update for xfsprogs (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:28353
    P
    Security update for pidgin (Important)
    2020-12-01
    oval:org.opensuse.security:def:33150
    P
    libgcc_s1-32bit on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:28996
    P
    Security update for gnutls
    2020-12-01
    oval:org.opensuse.security:def:32682
    P
    gzip on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:28365
    P
    Security update for postgresql94 (Important)
    2020-12-01
    oval:org.opensuse.security:def:33832
    P
    Security update for gnutls (Important)
    2020-12-01
    oval:org.opensuse.security:def:29084
    P
    Security update for dnsmasq (Important)
    2020-12-01
    oval:org.opensuse.security:def:32826
    P
    ant on GA media (Moderate)
    2020-12-01
    oval:org.mitre.oval:def:19808
    V
    HP-UX Running Java, Remote Unauthorized Access, Disclosure of Information, and Other Vulnerabilities
    2015-04-20
    oval:org.mitre.oval:def:15075
    V
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, and 5.0 Update 33 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.
    2015-03-23
    oval:org.mitre.oval:def:21404
    P
    RHSA-2012:0514: java-1.6.0-ibm security update (Critical)
    2015-03-09
    oval:org.mitre.oval:def:21398
    P
    RHSA-2012:0508: java-1.5.0-ibm security update (Critical)
    2015-03-09
    oval:org.mitre.oval:def:23749
    P
    ELSA-2012:0508: java-1.5.0-ibm security update (Critical)
    2014-05-26
    oval:org.mitre.oval:def:23323
    P
    ELSA-2012:0514: java-1.6.0-ibm security update (Critical)
    2014-05-26
    oval:org.mitre.oval:def:23638
    P
    ELSA-2012:0139: java-1.6.0-sun security update (Critical)
    2014-05-26
    oval:org.mitre.oval:def:21410
    P
    RHSA-2012:0139: java-1.6.0-sun security update (Critical)
    2014-02-24
    oval:com.redhat.rhsa:def:20120514
    P
    RHSA-2012:0514: java-1.6.0-ibm security update (Critical)
    2012-04-24
    oval:com.redhat.rhsa:def:20120508
    P
    RHSA-2012:0508: java-1.5.0-ibm security update (Critical)
    2012-04-23
    oval:com.redhat.rhsa:def:20120139
    P
    RHSA-2012:0139: java-1.6.0-sun security update (Critical)
    2012-02-16
    oval:com.ubuntu.precise:def:20120498000
    V
    CVE-2012-0498 on Ubuntu 12.04 LTS (precise) - medium.
    2012-02-15
    BACK
    sun jre 1.5.0 update22
    sun jre 1.5.0 update31
    sun jre 1.5.0
    sun jre 1.5.0 update18
    sun jre 1.5.0 update27
    sun jre 1.5.0 update2
    sun jre 1.5.0 update13
    sun jre 1.5.0 update24
    sun jre 1.5.0 update12
    sun jre 1.5.0 update26
    sun jre 1.5.0 update28
    sun jre 1.5.0 update21
    sun jre 1.5.0 update6
    sun jre 1.5.0 update1
    sun jre 1.5.0 update16
    sun jre 1.5.0 update20
    sun jre 1.5.0 update3
    sun jre 1.5.0 update5
    sun jre 1.5.0 update9
    sun jre 1.5.0 update19
    sun jre 1.5.0 update7
    sun jre 1.5.0 update8
    sun jre 1.5.0 update14
    sun jre * update33
    sun jre 1.5.0 update25
    sun jre 1.5.0 update10
    sun jre 1.5.0 update23
    sun jre 1.5.0 update4
    sun jre 1.5.0 update15
    sun jre 1.5.0 update11
    sun jre 1.5.0 update17
    sun jre 1.5.0 update29
    sun jre 1.6.0 update_3
    sun jre 1.6.0 update_5
    sun jre 1.6.0 update_13
    sun jre 1.6.0 update_1
    sun jre 1.6.0 update_2
    sun jre 1.6.0 update_16
    sun jre 1.6.0 update_20
    sun jre 1.6.0 update_15
    sun jre 1.6.0 update_6
    sun jre 1.6.0 update_19
    sun jre 1.6.0 update_21
    sun jre 1.6.0 update_7
    sun jre 1.6.0 update_12
    oracle jre 1.6.0 update22
    oracle jre 1.6.0 update23
    sun jre 1.6.0 update_10
    sun jre 1.6.0 update_4
    sun jre 1.6.0 update_11
    sun jre 1.6.0 update_14
    oracle jre 1.6.0 update24
    oracle jre 1.6.0 update25
    sun jre 1.6.0 update_17
    sun jre 1.6.0 update_18
    oracle jre 1.6.0 update29
    oracle jre * update30
    sun jre 1.6.0
    oracle jre 1.6.0 update26
    oracle jre 1.6.0 update27
    oracle jre * update2
    oracle jre 1.7.0
    oracle jre 1.7.0 update1
    sun jre 1.1.5.0 update7
    sun jre 1.1.5.0 update11
    sun jre 1.1.5.0 update9
    sun jre 1.1.5.0 update3
    sun jre 1.1.5.0 update12
    sun jre 1.1.5.0 update10
    sun jre 1.1.5.0 update8
    sun jre 1.1.5.0 update13
    sun jre 1.1.5.0
    sun jre 1.1.5.0 update6
    sun jre 1.1.5.0 update1
    sun jre 1.1.5.0 update4
    sun jre 1.1.5.0 update5
    sun jre 1.1.5.0 update2
    sun jre 1.1.5.0 update14
    sun jre 1.1.5.0 update15
    sun jre 1.1.5.0 update16
    sun jre 1.1.5.0 update17
    oracle jre 1.7.0
    oracle jre 1.7.0 update1
    oracle jre 1.7.0 update2
    redhat rhel extras 4
    hitachi ucosminexus service architect *
    hitachi processing kit for xml 01-00
    hitachi ucosminexus client 06-70-/f
    hitachi ucosminexus operator 07-00-05
    hitachi ucosminexus service platform *
    hitachi cosminexus application server 05-00
    hitachi cosminexus application server 06-00 -
    hitachi cosminexus server 04-00 -
    hitachi cosminexus studio 04-00 -
    hitachi ucosminexus application server 06-70 -
    hitachi ucosminexus developer 06-70 -
    ibm cognos business intelligence 8.4.1
    ibm tivoli netcool/omnibus 7.3.0
    apple mac os x 10.6.8
    apple mac os x server 10.6.8
    redhat enterprise linux server supplementary 6
    redhat enterprise linux workstation supplementary 6
    redhat enterprise linux desktop supplementary 6
    redhat enterprise linux hpc node supplementary 6
    apple mac os x server 10.7.3
    apple mac os x 10.7.3
    ibm cognos business intelligence 10.1
    ibm cognos business intelligence 10.1.1
    ibm cognos business intelligence 10.2
    ibm tivoli system automation 3.2
    ibm tivoli system automation 3.2.1
    ibm tivoli system automation 3.2.2
    ibm tivoli system automation application manager 3.2.2
    ibm cognos express 10.1
    ibm tivoli netcool/omnibus 7.3.1
    ibm tivoli netcool/omnibus 7.4.0