Vulnerability Name:

CVE-2012-0499 (CCN-73187)

Assigned:2012-02-14
Published:2012-02-14
Updated:2022-05-13
Summary:Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, 5.0 Update 33 and earlier, and 1.4.2_35 and earlier; and JavaFX 2.0.2 and earlier; allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.
CVSS v3 Severity:10.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
CVSS v2 Severity:10.0 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)
7.4 High (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
9.3 High (CCN CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C)
6.9 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Athentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
6.8 Medium (REDHAT CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P)
5.0 Medium (REDHAT Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Type:CWE-noinfo
Vulnerability Consequences:Gain Access
References:Source: MITRE
Type: CNA
CVE-2012-0499

Source: CCN
Type: TPTI-12-01
Oracle Java True Type Font IDEF Opcode Parsing Remote Code Execution Vulnerability

Source: SUSE
Type: UNKNOWN
SUSE-SU-2012:0602

Source: SUSE
Type: UNKNOWN
SUSE-SU-2012:0603

Source: SUSE
Type: UNKNOWN
SUSE-SU-2012:0734

Source: SUSE
Type: UNKNOWN
SUSE-SU-2012:0881

Source: SUSE
Type: UNKNOWN
SUSE-SU-2012:1013

Source: HP
Type: UNKNOWN
HPSBUX02757

Source: HP
Type: UNKNOWN
SSRT100805

Source: HP
Type: UNKNOWN
HPSBUX02777

Source: HP
Type: UNKNOWN
HPSBUX02784

Source: HP
Type: UNKNOWN
HPSBMU02799

Source: HP
Type: UNKNOWN
SSRT100867

Source: CCN
Type: RHSA-2012-0139
Critical: java-1.6.0-sun security update

Source: CCN
Type: RHSA-2012-0508
Critical: java-1.5.0-ibm security update

Source: REDHAT
Type: UNKNOWN
RHSA-2012:0508

Source: CCN
Type: RHSA-2012-0514
Critical: java-1.6.0-ibm security update

Source: REDHAT
Type: UNKNOWN
RHSA-2012:0514

Source: CCN
Type: RHSA-2012-0702
Critical: java-1.4.2-ibm security update

Source: REDHAT
Type: UNKNOWN
RHSA-2012:0702

Source: CCN
Type: RHSA-2012-1080
Moderate: java-1.4.2-ibm-sap security update

Source: REDHAT
Type: UNKNOWN
RHSA-2012:1080

Source: CCN
Type: RHSA-2013-1455
Low: Red Hat Network Satellite server IBM Java Runtime security update

Source: REDHAT
Type: UNKNOWN
RHSA-2013:1455

Source: CCN
Type: SA48009
Oracle Java SE Multiple Vulnerabilities

Source: SECUNIA
Type: UNKNOWN
48073

Source: CCN
Type: SA48074
Hitachi Cosminexus Products Java Multiple Vulnerabilities

Source: SECUNIA
Type: UNKNOWN
48074

Source: CCN
Type: SA48546
IBM 31-bit SDK for z/OS Multiple Vulnerabilities

Source: SECUNIA
Type: UNKNOWN
48589

Source: SECUNIA
Type: UNKNOWN
48692

Source: CCN
Type: SA48854
IBM 31-bit SDK for z/OS and IBM 64-bit SDK for z/OS Multiple Vulnerabilities

Source: CCN
Type: SA48915
IBM Java 5 Multiple Vulnerabilities

Source: SECUNIA
Type: UNKNOWN
48915

Source: SECUNIA
Type: UNKNOWN
48948

Source: SECUNIA
Type: UNKNOWN
48950

Source: SECUNIA
Type: UNKNOWN
49198

Source: CCN
Type: SA53006
IBM Tivoli System Automation Application Manager Multiple Vulnerabilities

Source: CCN
Type: Apple KB HT5228
About the security content of Java for OS X Lion 2012-001 and Java for Mac OS X 10.6 Update 7

Source: CCN
Type: TSL20120222-10
Oracle Java Runtime True Type Font IDEF Opcode Heap Buffer Overflow

Source: CCN
Type: IBM Security Bulletin 1632668
IBM Tivoli System Automation for Multiplatforms

Source: CCN
Type: IBM Security Bulletin 1633991
Tivoli System Automation Application Manager 3.2.2

Source: CCN
Type: IBM Security Bulletin 1650822
Java Security Vulnerabilitys addressed in IBM Tivoli Netcool OMNIbus

Source: CCN
Type: Hitachi Security Vulnerability Information HS12-007
Multiple Vulnerabilities in Cosminexus

Source: CCN
Type: IBM APAR PM59971
GEN APAR: 31-BIT JAVA FOR Z/OS SDK 6 SERVICE REFRESH (SR10 FP1) THE PTF FOR THIS APAR DELIVERS THE LATEST CUMULATIVE SERVICE

Source: CCN
Type: IBM APAR PM59978
GEN APAR: 64-BIT JAVA FOR Z/OS SDK 6 SERVICE REFRESH (SR10 FP1) THE PTF FOR THIS APAR DELIVERS THE LATEST CUMULATIVE SERVICE

Source: CCN
Type: IBM APAR PM60958
GEN APAR: 31-BIT JAVA FOR Z/OS SDK 5 SERVICE REFRESH (SR13 FP1) THE PTF FOR THIS APAR DELIVERS THE LATEST CUMULATIVE SERVICE

Source: MANDRIVA
Type: UNKNOWN
MDVSA-2013:150

Source: CONFIRM
Type: UNKNOWN
http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html

Source: CCN
Type: Oracle Java SE Critical Patch Update Advisory - February 2012
Oracle Java SE Critical Patch Update Advisory - February 2012

Source: CONFIRM
Type: Vendor Advisory
http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html

Source: CCN
Type: OSVDB ID: 79226
Oracle Java SE 2D Component Unspecified Remote Code Execution (2011-0499)

Source: BID
Type: UNKNOWN
52016

Source: CCN
Type: BID-52016
Oracle Java SE CVE-2012-0499 Remote Java Runtime Environment Vulnerability

Source: XF
Type: UNKNOWN
javase-jre-cve20120499(73187)

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:14878

Vulnerable Configuration:Configuration 1:
  • cpe:/a:sun:jre:1.4.2_26:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2_7:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2_27:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2_16:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2_24:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2_4:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:*:*:*:*:*:*:*:* (Version <= 1.4.2_35)
  • OR cpe:/a:sun:jre:1.4.2_2:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2_19:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2_25:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2_13:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2_31:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2_21:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2_23:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2_18:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2_14:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2_8:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2_29:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2:-:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2_12:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2_15:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2_17:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2_1:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2_32:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2_10:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2_11:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2_30:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2_9:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2_22:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2_28:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2_6:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2_5:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2_3:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2_20:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2_33:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2_34:*:*:*:*:*:*:*

  • Configuration 2:
  • cpe:/a:sun:jre:1.5.0:update22:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.5.0:update31:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.5.0:-:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.5.0:update18:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.5.0:update27:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.5.0:update2:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.5.0:update13:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.5.0:update24:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.5.0:update12:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.5.0:update26:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.5.0:update7:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.5.0:update21:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.5.0:update14:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:*:update33:*:*:*:*:*:* (Version <= 1.5.0)
  • OR cpe:/a:sun:jre:1.5.0:update10:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.5.0:update3:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.5.0:update23:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.5.0:update4:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.5.0:update5:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.5.0:update11:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.5.0:update9:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.5.0:update20:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.5.0:update19:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.5.0:update8:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.5.0:update28:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.5.0:update25:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.5.0:update6:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.5.0:update1:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.5.0:update16:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.5.0:update15:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.5.0:update17:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.5.0:update29:*:*:*:*:*:*

  • Configuration 3:
  • cpe:/a:sun:jre:1.6.0:update_3:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.6.0:update_5:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.6.0:update_13:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.6.0:update_1:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.6.0:update_2:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.6.0:update_16:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.6.0:update_20:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.6.0:update_15:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.6.0:update_6:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.6.0:update_19:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.6.0:update_10:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.6.0:update_4:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.6.0:update_14:*:*:*:*:*:*
  • OR cpe:/a:oracle:jre:1.6.0:update25:*:*:*:*:*:*
  • OR cpe:/a:oracle:jre:1.6.0:update26:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.6.0:update_18:*:*:*:*:*:*
  • OR cpe:/a:oracle:jre:1.6.0:update22:*:*:*:*:*:*
  • OR cpe:/a:oracle:jre:*:update30:*:*:*:*:*:* (Version <= 1.6.0)
  • OR cpe:/a:sun:jre:1.6.0:update_7:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.6.0:update_12:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.6.0:update_11:*:*:*:*:*:*
  • OR cpe:/a:oracle:jre:1.6.0:update23:*:*:*:*:*:*
  • OR cpe:/a:oracle:jre:1.6.0:update24:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.6.0:update_21:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.6.0:-:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.6.0:update_17:*:*:*:*:*:*
  • OR cpe:/a:oracle:jre:1.6.0:update27:*:*:*:*:*:*
  • OR cpe:/a:oracle:jre:1.6.0:update29:*:*:*:*:*:*

  • Configuration 4:
  • cpe:/a:oracle:jre:*:update2:*:*:*:*:*:* (Version <= 1.7.0)
  • OR cpe:/a:oracle:jre:1.7.0:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:jre:1.7.0:update1:*:*:*:*:*:*

  • Configuration 5:
  • cpe:/a:oracle:javafx:1.2.3:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:javafx:*:*:*:*:*:*:*:* (Version <= 2.0.2)
  • OR cpe:/a:oracle:javafx:2.0:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:javafx:1.3.1:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:javafx:1.3.0:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:javafx:1.2:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:javafx:1.2.2:*:*:*:*:*:*:*

  • Configuration RedHat 1:
  • cpe:/a:redhat:rhel_extras:6:*:*:*:*:*:*:*

  • Configuration RedHat 2:
  • cpe:/a:redhat:rhel_extras:5:*:*:*:*:*:*:*

  • Configuration RedHat 3:
  • cpe:/a:redhat:rhel_extras:4:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:sun:jre:1.4.2:-:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2_1:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2_10:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2_11:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2_12:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2_13:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2_14:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2_15:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2_16:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2_17:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2_18:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2_2:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2_3:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2_4:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2_5:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2_6:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2_7:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2_8:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2_9:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2_19:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2_20:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2_21:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2_23:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2_22:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2_24:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2_25:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2_26:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2_27:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2_28:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2_29:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:javafx:2.0:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2_33:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2_32:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2_31:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2_30:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:jre:1.7.0:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:jre:1.7.0:update1:*:*:*:*:*:*
  • OR cpe:/a:oracle:jre:1.7.0:update2:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2_34:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2_35:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:javafx:1.3.1:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:javafx:1.2.3:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:javafx:1.2:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:javafx:1.3.0:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:javafx:1.2.2:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:javafx:2.0.2:*:*:*:*:*:*:*
  • AND
  • cpe:/a:redhat:rhel_extras:4:*:*:*:*:*:*:*
  • OR cpe:/a:hitachi:ucosminexus_service_architect:*:*:*:*:*:*:*:*
  • OR cpe:/a:hitachi:processing_kit_for_xml:01-00:*:*:*:*:*:*:*
  • OR cpe:/a:hitachi:ucosminexus_client:06-70-/f:*:*:*:*:*:*:*
  • OR cpe:/a:hitachi:ucosminexus_operator:07-00-05:*:*:*:*:*:*:*
  • OR cpe:/a:hitachi:ucosminexus_service_platform:*:*:*:*:*:*:*:*
  • OR cpe:/a:hitachi:cosminexus_application_server:05-00:*:*:*:*:*:*:*
  • OR cpe:/a:hitachi:cosminexus_application_server:06-00:-:enterprise:*:*:*:*:*
  • OR cpe:/a:hitachi:cosminexus_server:04-00:-:standard:*:*:*:*:*
  • OR cpe:/a:hitachi:cosminexus_studio:04-00:-:standard:*:*:*:*:*
  • OR cpe:/a:hitachi:ucosminexus_application_server:06-70:-:enterprise:*:*:*:*:*
  • OR cpe:/a:hitachi:ucosminexus_developer:06-70:-:light:*:*:*:*:*
  • OR cpe:/a:ibm:tivoli_netcool/omnibus:7.3.0:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x:10.6.8:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x_server:10.6.8:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:tivoli_netcool/omnibus:7.3.1.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:tivoli_netcool/omnibus:7.4.0:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:20120499
    V
    CVE-2012-0499
    2022-05-20
    oval:org.opensuse.security:def:33039
    P
    Security update for binutils (Moderate)
    2021-11-09
    oval:org.opensuse.security:def:33038
    P
    Security update for bind (Important)
    2021-11-08
    oval:org.opensuse.security:def:32982
    P
    Security update for java-1_8_0-openjdk (Important)
    2021-08-20
    oval:org.opensuse.security:def:32981
    P
    Security update for fetchmail (Moderate)
    2021-08-18
    oval:org.opensuse.security:def:33088
    P
    Security update for MozillaFirefox (Important)
    2021-03-01
    oval:org.opensuse.security:def:33087
    P
    Security update for java-1_8_0-ibm (Important)
    2021-02-26
    oval:org.opensuse.security:def:28942
    P
    Security update for java-1_8_0-ibm (Important)
    2021-02-26
    oval:org.opensuse.security:def:28941
    P
    Security update for java-1_8_0-openjdk (Moderate)
    2021-02-19
    oval:org.opensuse.security:def:32825
    P
    Security update for mutt (Important)
    2020-12-07
    oval:org.opensuse.security:def:32374
    P
    Security update for tiff (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:28353
    P
    Security update for pidgin (Important)
    2020-12-01
    oval:org.opensuse.security:def:28789
    P
    Security update for mysql (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:29818
    P
    Security update for IBM Java
    2020-12-01
    oval:org.opensuse.security:def:28649
    P
    Security update for CUPS
    2020-12-01
    oval:org.opensuse.security:def:29145
    P
    Security update for kvm (Important)
    2020-12-01
    oval:org.opensuse.security:def:32452
    P
    Security update for xerces-j2 (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:33126
    P
    kdirstat on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:32364
    P
    Security update for sudo (Important)
    2020-12-01
    oval:org.opensuse.security:def:28706
    P
    Security update for gstreamer-0_10-plugins-bad
    2020-12-01
    oval:org.opensuse.security:def:29783
    P
    Security update for gpg2 (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:32587
    P
    openvpn on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:33149
    P
    libfreebl3 on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:32375
    P
    Security update for tiff (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:32362
    P
    Security update for strongswan (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:28995
    P
    Security update for ctdb
    2020-12-01
    oval:org.opensuse.security:def:28790
    P
    Security update for mysql (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:29819
    P
    Security update for IBM Java 1.6.0
    2020-12-01
    oval:org.opensuse.security:def:32681
    P
    gvim on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:33193
    P
    libxcrypt on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:32453
    P
    Security update for xfsprogs (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:33127
    P
    kernel-default on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:28364
    P
    Security update for postgresql94 (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:29044
    P
    Security update for SDL (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:32738
    P
    libxcrypt on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:33831
    P
    Security update for gnutls (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:32588
    P
    pam on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:33150
    P
    libgcc_s1-32bit on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:28432
    P
    Security update for wireshark (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:29083
    P
    Security update for dhcp (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:32363
    P
    Security update for sudo (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:28996
    P
    Security update for gnutls
    2020-12-01
    oval:org.opensuse.security:def:33870
    P
    Security update for IBM Java
    2020-12-01
    oval:org.opensuse.security:def:32682
    P
    gzip on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:33194
    P
    libxml2 on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:28563
    P
    Security update for inkscape
    2020-12-01
    oval:org.opensuse.security:def:29100
    P
    Security update for glibc (Important)
    2020-12-01
    oval:org.opensuse.security:def:28365
    P
    Security update for postgresql94 (Important)
    2020-12-01
    oval:org.opensuse.security:def:29045
    P
    Security update for adns (Important)
    2020-12-01
    oval:org.opensuse.security:def:28352
    P
    Security update for php53 (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:32739
    P
    libxml2 on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:33832
    P
    Security update for gnutls (Important)
    2020-12-01
    oval:org.opensuse.security:def:28648
    P
    Security update for cpio
    2020-12-01
    oval:org.opensuse.security:def:29144
    P
    Security update for kvm (Important)
    2020-12-01
    oval:org.opensuse.security:def:28433
    P
    Security update for wireshark (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:29084
    P
    Security update for dnsmasq (Important)
    2020-12-01
    oval:org.opensuse.security:def:28354
    P
    Security update for pidgin (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:32826
    P
    ant on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:33871
    P
    Security update for xorg-x11-server (Important)
    2020-12-01
    oval:org.opensuse.security:def:28705
    P
    Security update for grub2 (Important)
    2020-12-01
    oval:org.opensuse.security:def:29782
    P
    Security update for gnutls (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:28564
    P
    Security update for OpenJDK 1.6
    2020-12-01
    oval:org.opensuse.security:def:29101
    P
    Recommended update for glibc (Moderate)
    2020-12-01
    oval:org.mitre.oval:def:19800
    V
    HP-UX Running Java, Remote Unauthorized Access, Disclosure of Information, and Other Vulnerabilities
    2015-04-20
    oval:org.mitre.oval:def:14878
    V
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, 5.0 Update 33 and earlier, and 1.4.2_35 and earlier; and JavaFX 2.0.2 and earlier; allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.
    2015-03-23
    oval:org.mitre.oval:def:21404
    P
    RHSA-2012:0514: java-1.6.0-ibm security update (Critical)
    2015-03-09
    oval:org.mitre.oval:def:21398
    P
    RHSA-2012:0508: java-1.5.0-ibm security update (Critical)
    2015-03-09
    oval:org.mitre.oval:def:23749
    P
    ELSA-2012:0508: java-1.5.0-ibm security update (Critical)
    2014-05-26
    oval:org.mitre.oval:def:23323
    P
    ELSA-2012:0514: java-1.6.0-ibm security update (Critical)
    2014-05-26
    oval:org.mitre.oval:def:23638
    P
    ELSA-2012:0139: java-1.6.0-sun security update (Critical)
    2014-05-26
    oval:org.mitre.oval:def:21410
    P
    RHSA-2012:0139: java-1.6.0-sun security update (Critical)
    2014-02-24
    oval:com.redhat.rhsa:def:20120514
    P
    RHSA-2012:0514: java-1.6.0-ibm security update (Critical)
    2012-04-24
    oval:com.redhat.rhsa:def:20120508
    P
    RHSA-2012:0508: java-1.5.0-ibm security update (Critical)
    2012-04-23
    oval:com.redhat.rhsa:def:20120139
    P
    RHSA-2012:0139: java-1.6.0-sun security update (Critical)
    2012-02-16
    oval:com.ubuntu.precise:def:20120499000
    V
    CVE-2012-0499 on Ubuntu 12.04 LTS (precise) - low.
    2012-02-15
    BACK
    sun jre 1.4.2_26
    sun jre 1.4.2_7
    sun jre 1.4.2_27
    sun jre 1.4.2_16
    sun jre 1.4.2_24
    sun jre 1.4.2_4
    sun jre *
    sun jre 1.4.2_2
    sun jre 1.4.2_19
    sun jre 1.4.2_25
    sun jre 1.4.2_13
    sun jre 1.4.2_31
    sun jre 1.4.2_21
    sun jre 1.4.2_23
    sun jre 1.4.2_18
    sun jre 1.4.2_14
    sun jre 1.4.2_8
    sun jre 1.4.2_29
    sun jre 1.4.2
    sun jre 1.4.2_12
    sun jre 1.4.2_15
    sun jre 1.4.2_17
    sun jre 1.4.2_1
    sun jre 1.4.2_32
    sun jre 1.4.2_10
    sun jre 1.4.2_11
    sun jre 1.4.2_30
    sun jre 1.4.2_9
    sun jre 1.4.2_22
    sun jre 1.4.2_28
    sun jre 1.4.2_6
    sun jre 1.4.2_5
    sun jre 1.4.2_3
    sun jre 1.4.2_20
    sun jre 1.4.2_33
    sun jre 1.4.2_34
    sun jre 1.5.0 update22
    sun jre 1.5.0 update31
    sun jre 1.5.0
    sun jre 1.5.0 update18
    sun jre 1.5.0 update27
    sun jre 1.5.0 update2
    sun jre 1.5.0 update13
    sun jre 1.5.0 update24
    sun jre 1.5.0 update12
    sun jre 1.5.0 update26
    sun jre 1.5.0 update7
    sun jre 1.5.0 update21
    sun jre 1.5.0 update14
    sun jre * update33
    sun jre 1.5.0 update10
    sun jre 1.5.0 update3
    sun jre 1.5.0 update23
    sun jre 1.5.0 update4
    sun jre 1.5.0 update5
    sun jre 1.5.0 update11
    sun jre 1.5.0 update9
    sun jre 1.5.0 update20
    sun jre 1.5.0 update19
    sun jre 1.5.0 update8
    sun jre 1.5.0 update28
    sun jre 1.5.0 update25
    sun jre 1.5.0 update6
    sun jre 1.5.0 update1
    sun jre 1.5.0 update16
    sun jre 1.5.0 update15
    sun jre 1.5.0 update17
    sun jre 1.5.0 update29
    sun jre 1.6.0 update_3
    sun jre 1.6.0 update_5
    sun jre 1.6.0 update_13
    sun jre 1.6.0 update_1
    sun jre 1.6.0 update_2
    sun jre 1.6.0 update_16
    sun jre 1.6.0 update_20
    sun jre 1.6.0 update_15
    sun jre 1.6.0 update_6
    sun jre 1.6.0 update_19
    sun jre 1.6.0 update_10
    sun jre 1.6.0 update_4
    sun jre 1.6.0 update_14
    oracle jre 1.6.0 update25
    oracle jre 1.6.0 update26
    sun jre 1.6.0 update_18
    oracle jre 1.6.0 update22
    oracle jre * update30
    sun jre 1.6.0 update_7
    sun jre 1.6.0 update_12
    sun jre 1.6.0 update_11
    oracle jre 1.6.0 update23
    oracle jre 1.6.0 update24
    sun jre 1.6.0 update_21
    sun jre 1.6.0
    sun jre 1.6.0 update_17
    oracle jre 1.6.0 update27
    oracle jre 1.6.0 update29
    oracle jre * update2
    oracle jre 1.7.0
    oracle jre 1.7.0 update1
    oracle javafx 1.2.3
    oracle javafx *
    oracle javafx 2.0
    oracle javafx 1.3.1
    oracle javafx 1.3.0
    oracle javafx 1.2
    oracle javafx 1.2.2
    sun jre 1.4.2
    sun jre 1.4.2_1
    sun jre 1.4.2_10
    sun jre 1.4.2_11
    sun jre 1.4.2_12
    sun jre 1.4.2_13
    sun jre 1.4.2_14
    sun jre 1.4.2_15
    sun jre 1.4.2_16
    sun jre 1.4.2_17
    sun jre 1.4.2_18
    sun jre 1.4.2_2
    sun jre 1.4.2_3
    sun jre 1.4.2_4
    sun jre 1.4.2_5
    sun jre 1.4.2_6
    sun jre 1.4.2_7
    sun jre 1.4.2_8
    sun jre 1.4.2_9
    sun jre 1.4.2_19
    sun jre 1.4.2_20
    sun jre 1.4.2_21
    sun jre 1.4.2_23
    sun jre 1.4.2_22
    sun jre 1.4.2_24
    sun jre 1.4.2_25
    sun jre 1.4.2_26
    sun jre 1.4.2_27
    sun jre 1.4.2_28
    sun jre 1.4.2_29
    oracle javafx 2.0
    sun jre 1.4.2_33
    sun jre 1.4.2_32
    sun jre 1.4.2_31
    sun jre 1.4.2_30
    oracle jre 1.7.0
    oracle jre 1.7.0 update1
    oracle jre 1.7.0 update2
    sun jre 1.4.2_34
    sun jre 1.4.2_35
    oracle javafx 1.3.1
    oracle javafx 1.2.3
    oracle javafx 1.2
    oracle javafx 1.3.0
    oracle javafx 1.2.2
    oracle javafx 2.0.2
    redhat rhel extras 4
    hitachi ucosminexus service architect *
    hitachi processing kit for xml 01-00
    hitachi ucosminexus client 06-70-/f
    hitachi ucosminexus operator 07-00-05
    hitachi ucosminexus service platform *
    hitachi cosminexus application server 05-00
    hitachi cosminexus application server 06-00 -
    hitachi cosminexus server 04-00 -
    hitachi cosminexus studio 04-00 -
    hitachi ucosminexus application server 06-70 -
    hitachi ucosminexus developer 06-70 -
    ibm tivoli netcool/omnibus 7.3.0
    apple mac os x 10.6.8
    apple mac os x server 10.6.8
    ibm tivoli netcool/omnibus 7.3.1.0
    ibm tivoli netcool/omnibus 7.4.0