Vulnerability Name:

CVE-2012-0507 (CCN-72513)

Assigned:2012-01-17
Published:2012-01-17
Updated:2022-05-13
Summary:Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, and 5.0 Update 33 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Concurrency.
Note: the previous information was obtained from the February 2012 Oracle CPU. Oracle has not commented on claims from a downstream vendor and third party researchers that this issue occurs because the AtomicReferenceArray class implementation does not ensure that the array is of the Object[] type, which allows attackers to cause a denial of service (JVM crash) or bypass Java sandbox restrictions.
Note: this issue was originally mapped to CVE-2011-3571, but that identifier was already assigned to a different issue.
CVSS v3 Severity:10.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
CVSS v2 Severity:10.0 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)
8.3 High (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C/E:F/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
9.3 High (CCN CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C)
7.7 High (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:F/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Athentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
6.8 Medium (REDHAT CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P)
5.6 Medium (REDHAT Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P/E:F/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Type:CWE-noinfo
Vulnerability Consequences:Gain Access
References:Source: CCN
Type: Microsoft Malware Protection Center Threat Research & Response Blog
An interesting case of JRE sandbox breach (CVE-2012-0507)

Source: MISC
Type: UNKNOWN
http://blogs.technet.com/b/mmpc/archive/2012/03/20/an-interesting-case-of-jre-sandbox-breach-cve-2012-0507.aspx

Source: CCN
Type: websense Security Labs blog
Is CVE-2012-0507 the best toolkit to exploit Mac OS X? - Security Labs

Source: MITRE
Type: CNA
CVE-2012-0507

Source: MISC
Type: UNKNOWN
http://krebsonsecurity.com/2012/03/new-java-attack-rolled-into-exploit-packs/

Source: SUSE
Type: UNKNOWN
SUSE-SU-2012:0602

Source: SUSE
Type: UNKNOWN
SUSE-SU-2012:0603

Source: HP
Type: UNKNOWN
HPSBUX02757

Source: HP
Type: UNKNOWN
SSRT100805

Source: HP
Type: UNKNOWN
HPSBUX02784

Source: HP
Type: UNKNOWN
HPSBMU02799

Source: HP
Type: UNKNOWN
SSRT100867

Source: CCN
Type: RHSA-2012-0135
Critical: java-1.6.0-openjdk security update

Source: CCN
Type: RHSA-2012-0139
Critical: java-1.6.0-sun security update

Source: CCN
Type: RHSA-2012-0322
Important: java-1.6.0-openjdk security update

Source: CCN
Type: RHSA-2012-0508
Critical: java-1.5.0-ibm security update

Source: REDHAT
Type: UNKNOWN
RHSA-2012:0508

Source: CCN
Type: RHSA-2012-0514
Critical: java-1.6.0-ibm security update

Source: REDHAT
Type: UNKNOWN
RHSA-2012:0514

Source: CCN
Type: RHSA-2013-1455
Low: Red Hat Network Satellite server IBM Java Runtime security update

Source: REDHAT
Type: UNKNOWN
RHSA-2013:1455

Source: CCN
Type: SA47553
Oracle Virtual Desktop Infrastructure Information Disclosure and Data Manipulation

Source: CCN
Type: SA48074
Hitachi Cosminexus Products Java Multiple Vulnerabilities

Source: CCN
Type: SA48546
IBM 31-bit SDK for z/OS Multiple Vulnerabilities

Source: SECUNIA
Type: UNKNOWN
48589

Source: SECUNIA
Type: UNKNOWN
48692

Source: CCN
Type: SA48854
IBM 31-bit SDK for z/OS and IBM 64-bit SDK for z/OS Multiple Vulnerabilities

Source: CCN
Type: SA48913
IBM Java 6 Multiple Vulnerabilities

Source: CCN
Type: SA48915
IBM Java 5 Multiple Vulnerabilities

Source: SECUNIA
Type: UNKNOWN
48915

Source: SECUNIA
Type: UNKNOWN
48948

Source: SECUNIA
Type: UNKNOWN
48950

Source: CCN
Type: SA49333
IBM Java 7 Multiple Vulnerabilities

Source: CCN
Type: SA53006
IBM Tivoli System Automation Application Manager Multiple Vulnerabilities

Source: CCN
Type: Apple KB HT5228
About the security content of Java for OS X Lion 2012-001 and Java for Mac OS X 10.6 Update 7

Source: MISC
Type: Exploit
http://weblog.ikvm.net/PermaLink.aspx?guid=cd48169a-9405-4f63-9087-798c4a1866d3

Source: CCN
Type: IBM Security Bulletin 1632668
IBM Tivoli System Automation for Multiplatforms

Source: CCN
Type: IBM Security Bulletin 1633991
Tivoli System Automation Application Manager 3.2.2

Source: CCN
Type: IBM Security Bulletin 1650822
Java Security Vulnerabilitys addressed in IBM Tivoli Netcool OMNIbus

Source: DEBIAN
Type: UNKNOWN
DSA-2420

Source: DEBIAN
Type: DSA-2420
openjdk-6 -- several vulnerabilities

Source: CCN
Type: Hitachi Security Vulnerability Information HS12-007
Multiple Vulnerabilities in Cosminexus

Source: CCN
Type: IBM APAR PM59971
GEN APAR: 31-BIT JAVA FOR Z/OS SDK 6 SERVICE REFRESH (SR10 FP1) THE PTF FOR THIS APAR DELIVERS THE LATEST CUMULATIVE SERVICE

Source: CCN
Type: IBM APAR PM59978
GEN APAR: 64-BIT JAVA FOR Z/OS SDK 6 SERVICE REFRESH (SR10 FP1) THE PTF FOR THIS APAR DELIVERS THE LATEST CUMULATIVE SERVICE

Source: CCN
Type: IBM APAR PM60958
GEN APAR: 31-BIT JAVA FOR Z/OS SDK 5 SERVICE REFRESH (SR13 FP1) THE PTF FOR THIS APAR DELIVERS THE LATEST CUMULATIVE SERVICE

Source: CCN
Type: IBM Security Protection Alert
Java AtomicReferenceArray Sandbox Evasion and Code Execution

Source: CCN
Type: Oracle Critical Patch Update Advisory - January 2012
Oracle Critical Patch Update Advisory - January 2012

Source: CCN
Type: Oracle Java SE
Oracle Java SE Critical Patch Update Advisory - February 2012

Source: CCN
Type: Oracle Java SE Critical Patch Update Advisory - February 2012
Oracle Java SE Critical Patch Update Advisory - February 2012

Source: CCN
Type: Oracle Web Site
Oracle Java SE Critical Patch Update Advisory - February 2012

Source: CONFIRM
Type: Vendor Advisory
http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html

Source: CCN
Type: OSVDB ID: 80724
Oracle Java SE / JRE AtomicReferenceArray Sandbox Escape Code Execution

Source: CCN
Type: BID-51467
Oracle Virtual Desktop Infrastructure (VDI) CVE-2011-3571 Remote Vulnerability

Source: BID
Type: Exploit
52161

Source: CCN
Type: BID-52161
Oracle Java SE Remote Java Runtime Environment Code Execution Vulnerability

Source: CONFIRM
Type: UNKNOWN
https://bugzilla.redhat.com/show_bug.cgi?id=788994

Source: XF
Type: UNKNOWN
virtualization-vdi-code-execution(72513)

Source: CCN
Type: CYBERSECURITY & INFRASTRUCTURE SECURITY AGENCY
KNOWN EXPLOITED VULNERABILITIES CATALOG

Vulnerable Configuration:Configuration 1:
  • cpe:/a:sun:jre:1.5.0:update22:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.5.0:update31:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.5.0:-:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.5.0:update18:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.5.0:update27:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.5.0:update2:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.5.0:update13:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.5.0:update24:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.5.0:update12:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.5.0:update26:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.5.0:update28:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.5.0:update21:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.5.0:update6:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.5.0:update1:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.5.0:update16:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.5.0:update20:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.5.0:update3:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.5.0:update5:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.5.0:update9:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.5.0:update25:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.5.0:update10:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.5.0:update23:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.5.0:update4:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.5.0:update15:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.5.0:update11:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.5.0:update19:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.5.0:update7:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.5.0:update8:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.5.0:update14:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:*:update33:*:*:*:*:*:* (Version <= 1.5.0)
  • OR cpe:/a:sun:jre:1.5.0:update17:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.5.0:update29:*:*:*:*:*:*

  • Configuration 2:
  • cpe:/a:sun:jre:1.6.0:update_3:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.6.0:update_5:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.6.0:update_13:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.6.0:update_1:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.6.0:update_2:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.6.0:update_16:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.6.0:update_20:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.6.0:update_15:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.6.0:update_6:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.6.0:update_19:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.6.0:update_21:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.6.0:-:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.6.0:update_12:*:*:*:*:*:*
  • OR cpe:/a:oracle:jre:1.6.0:update22:*:*:*:*:*:*
  • OR cpe:/a:oracle:jre:1.6.0:update23:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.6.0:update_17:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.6.0:update_18:*:*:*:*:*:*
  • OR cpe:/a:oracle:jre:1.6.0:update29:*:*:*:*:*:*
  • OR cpe:/a:oracle:jre:*:update30:*:*:*:*:*:* (Version <= 1.6.0)
  • OR cpe:/a:oracle:jre:1.6.0:update26:*:*:*:*:*:*
  • OR cpe:/a:oracle:jre:1.6.0:update27:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.6.0:update_7:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.6.0:update_10:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.6.0:update_4:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.6.0:update_11:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.6.0:update_14:*:*:*:*:*:*
  • OR cpe:/a:oracle:jre:1.6.0:update24:*:*:*:*:*:*
  • OR cpe:/a:oracle:jre:1.6.0:update25:*:*:*:*:*:*

  • Configuration 3:
  • cpe:/a:oracle:jre:*:update2:*:*:*:*:*:* (Version <= 1.7.0)
  • OR cpe:/a:oracle:jre:1.7.0:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:jre:1.7.0:update1:*:*:*:*:*:*

  • Configuration RedHat 1:
  • cpe:/o:redhat:enterprise_linux:6:*:*:*:*:*:*:*

  • Configuration RedHat 2:
  • cpe:/o:redhat:enterprise_linux:6::client:*:*:*:*:*

  • Configuration RedHat 3:
  • cpe:/o:redhat:enterprise_linux:6::computenode:*:*:*:*:*

  • Configuration RedHat 4:
  • cpe:/o:redhat:enterprise_linux:6::server:*:*:*:*:*

  • Configuration RedHat 5:
  • cpe:/o:redhat:enterprise_linux:6::workstation:*:*:*:*:*

  • Configuration RedHat 6:
  • cpe:/o:redhat:enterprise_linux:5:*:*:*:*:*:*:*

  • Configuration RedHat 7:
  • cpe:/o:redhat:enterprise_linux:5::client:*:*:*:*:*

  • Configuration RedHat 8:
  • cpe:/o:redhat:enterprise_linux:5::server:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:sun:jre:1.1.5.0:update7:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.1.5.0:update11:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.1.5.0:update9:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.1.5.0:update3:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.1.5.0:update12:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.1.5.0:update10:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.1.5.0:update8:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.1.5.0:update13:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.1.5.0:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.1.5.0:update6:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.1.5.0:update1:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.1.5.0:update4:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.1.5.0:update5:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.1.5.0:update2:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.1.5.0:update14:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.1.5.0:update15:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.1.5.0:update16:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.1.5.0:update17:*:*:*:*:*:*
  • OR cpe:/a:oracle:virtualization:3.2:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:jre:1.7.0:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:jre:1.7.0:update1:*:*:*:*:*:*
  • OR cpe:/a:oracle:jre:1.7.0:update2:*:*:*:*:*:*
  • AND
  • cpe:/a:redhat:rhel_extras:4:*:*:*:*:*:*:*
  • OR cpe:/a:hitachi:ucosminexus_service_architect:*:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:5:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:5::client:*:*:*:*:*
  • OR cpe:/a:hitachi:processing_kit_for_xml:01-00:*:*:*:*:*:*:*
  • OR cpe:/a:hitachi:ucosminexus_client:06-70-/f:*:*:*:*:*:*:*
  • OR cpe:/a:hitachi:ucosminexus_operator:07-00-05:*:*:*:*:*:*:*
  • OR cpe:/a:hitachi:ucosminexus_service_platform:*:*:*:*:*:*:*:*
  • OR cpe:/a:hitachi:cosminexus_application_server:05-00:*:*:*:*:*:*:*
  • OR cpe:/a:hitachi:cosminexus_application_server:06-00:-:enterprise:*:*:*:*:*
  • OR cpe:/a:hitachi:cosminexus_server:04-00:-:standard:*:*:*:*:*
  • OR cpe:/a:hitachi:cosminexus_studio:04-00:-:standard:*:*:*:*:*
  • OR cpe:/a:hitachi:ucosminexus_application_server:06-70:-:enterprise:*:*:*:*:*
  • OR cpe:/a:hitachi:ucosminexus_developer:06-70:-:light:*:*:*:*:*
  • OR cpe:/a:ibm:tivoli_netcool/omnibus:7.3.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:6::server:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:6::workstation:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x:10.6.8:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x_server:10.6.8:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_server_supplementary:6:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_workstation_supplementary:6:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_desktop:6:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_desktop_supplementary:6:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_hpc_node:6:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_hpc_node_supplementary:6:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x_server:10.7.3:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x:10.7.3:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:tivoli_system_automation:3.2:*:*:*:*:*:-:*
  • OR cpe:/a:ibm:tivoli_system_automation:3.2.1:*:*:*:*:*:-:*
  • OR cpe:/a:ibm:tivoli_system_automation:3.2.2:*:*:*:*:*:-:*
  • OR cpe:/a:ibm:tivoli_system_automation_application_manager:3.2.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:tivoli_netcool/omnibus:7.3.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:tivoli_netcool/omnibus:7.4.0:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:20120507
    V
    CVE-2012-0507
    2022-05-20
    oval:org.opensuse.security:def:33039
    P
    Security update for binutils (Moderate)
    2021-11-09
    oval:org.opensuse.security:def:32982
    P
    Security update for java-1_8_0-openjdk (Important)
    2021-08-20
    oval:org.opensuse.security:def:33088
    P
    Security update for MozillaFirefox (Important)
    2021-03-01
    oval:org.opensuse.security:def:28942
    P
    Security update for java-1_8_0-ibm (Important)
    2021-02-26
    oval:org.opensuse.security:def:28353
    P
    Security update for pidgin (Important)
    2020-12-01
    oval:org.opensuse.security:def:33150
    P
    libgcc_s1-32bit on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:28996
    P
    Security update for gnutls
    2020-12-01
    oval:org.opensuse.security:def:32682
    P
    gzip on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:28365
    P
    Security update for postgresql94 (Important)
    2020-12-01
    oval:org.opensuse.security:def:33832
    P
    Security update for gnutls (Important)
    2020-12-01
    oval:org.opensuse.security:def:29084
    P
    Security update for dnsmasq (Important)
    2020-12-01
    oval:org.opensuse.security:def:32826
    P
    ant on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:28564
    P
    Security update for OpenJDK 1.6
    2020-12-01
    oval:org.opensuse.security:def:32363
    P
    Security update for sudo (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:29145
    P
    Security update for kvm (Important)
    2020-12-01
    oval:org.opensuse.security:def:28706
    P
    Security update for gstreamer-0_10-plugins-bad
    2020-12-01
    oval:org.opensuse.security:def:32375
    P
    Security update for tiff (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:29819
    P
    Security update for IBM Java 1.6.0
    2020-12-01
    oval:org.opensuse.security:def:33127
    P
    kernel-default on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:32588
    P
    pam on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:28354
    P
    Security update for pidgin (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:33194
    P
    libxml2 on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:29045
    P
    Security update for adns (Important)
    2020-12-01
    oval:org.opensuse.security:def:32739
    P
    libxml2 on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:28433
    P
    Security update for wireshark (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:33871
    P
    Security update for xorg-x11-server (Important)
    2020-12-01
    oval:org.opensuse.security:def:29101
    P
    Recommended update for glibc (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:28649
    P
    Security update for CUPS
    2020-12-01
    oval:org.opensuse.security:def:32364
    P
    Security update for sudo (Important)
    2020-12-01
    oval:org.opensuse.security:def:29783
    P
    Security update for gpg2 (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:28790
    P
    Security update for mysql (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:32453
    P
    Security update for xfsprogs (Moderate)
    2020-12-01
    oval:org.mitre.oval:def:19848
    V
    HP-UX Running Java, Remote Unauthorized Access, Disclosure of Information, and Other Vulnerabilities
    2015-04-20
    oval:org.mitre.oval:def:21398
    P
    RHSA-2012:0508: java-1.5.0-ibm security update (Critical)
    2015-03-09
    oval:org.mitre.oval:def:21404
    P
    RHSA-2012:0514: java-1.6.0-ibm security update (Critical)
    2015-03-09
    oval:org.mitre.oval:def:15326
    P
    USN-1373-1 -- OpenJDK 6 vulnerabilities
    2014-06-30
    oval:org.mitre.oval:def:15473
    P
    USN-1373-2 -- OpenJDK 6 (ARM) vulnerabilities
    2014-06-30
    oval:org.mitre.oval:def:15259
    P
    DSA-2420-1 openjdk-6 -- several
    2014-06-23
    oval:org.mitre.oval:def:23720
    P
    ELSA-2012:0135: java-1.6.0-openjdk security update (Critical)
    2014-05-26
    oval:org.mitre.oval:def:23287
    P
    ELSA-2012:0322: java-1.6.0-openjdk security update (Important)
    2014-05-26
    oval:org.mitre.oval:def:23749
    P
    ELSA-2012:0508: java-1.5.0-ibm security update (Critical)
    2014-05-26
    oval:org.mitre.oval:def:23323
    P
    ELSA-2012:0514: java-1.6.0-ibm security update (Critical)
    2014-05-26
    oval:org.mitre.oval:def:23638
    P
    ELSA-2012:0139: java-1.6.0-sun security update (Critical)
    2014-05-26
    oval:org.mitre.oval:def:21410
    P
    RHSA-2012:0139: java-1.6.0-sun security update (Critical)
    2014-02-24
    oval:org.mitre.oval:def:21340
    P
    RHSA-2012:0135: java-1.6.0-openjdk security update (Critical)
    2014-02-24
    oval:org.mitre.oval:def:20754
    P
    RHSA-2012:0322: java-1.6.0-openjdk security update (Important)
    2014-02-24
    oval:com.ubuntu.precise:def:20120507000
    V
    CVE-2012-0507 on Ubuntu 12.04 LTS (precise) - medium.
    2012-06-07
    oval:com.redhat.rhsa:def:20120514
    P
    RHSA-2012:0514: java-1.6.0-ibm security update (Critical)
    2012-04-24
    oval:com.redhat.rhsa:def:20120508
    P
    RHSA-2012:0508: java-1.5.0-ibm security update (Critical)
    2012-04-23
    oval:com.redhat.rhsa:def:20120322
    P
    RHSA-2012:0322: java-1.6.0-openjdk security update (Important)
    2012-02-21
    oval:com.redhat.rhsa:def:20120139
    P
    RHSA-2012:0139: java-1.6.0-sun security update (Critical)
    2012-02-16
    oval:com.redhat.rhsa:def:20120135
    P
    RHSA-2012:0135: java-1.6.0-openjdk security update (Critical)
    2012-02-14
    BACK
    sun jre 1.5.0 update22
    sun jre 1.5.0 update31
    sun jre 1.5.0
    sun jre 1.5.0 update18
    sun jre 1.5.0 update27
    sun jre 1.5.0 update2
    sun jre 1.5.0 update13
    sun jre 1.5.0 update24
    sun jre 1.5.0 update12
    sun jre 1.5.0 update26
    sun jre 1.5.0 update28
    sun jre 1.5.0 update21
    sun jre 1.5.0 update6
    sun jre 1.5.0 update1
    sun jre 1.5.0 update16
    sun jre 1.5.0 update20
    sun jre 1.5.0 update3
    sun jre 1.5.0 update5
    sun jre 1.5.0 update9
    sun jre 1.5.0 update25
    sun jre 1.5.0 update10
    sun jre 1.5.0 update23
    sun jre 1.5.0 update4
    sun jre 1.5.0 update15
    sun jre 1.5.0 update11
    sun jre 1.5.0 update19
    sun jre 1.5.0 update7
    sun jre 1.5.0 update8
    sun jre 1.5.0 update14
    sun jre * update33
    sun jre 1.5.0 update17
    sun jre 1.5.0 update29
    sun jre 1.6.0 update_3
    sun jre 1.6.0 update_5
    sun jre 1.6.0 update_13
    sun jre 1.6.0 update_1
    sun jre 1.6.0 update_2
    sun jre 1.6.0 update_16
    sun jre 1.6.0 update_20
    sun jre 1.6.0 update_15
    sun jre 1.6.0 update_6
    sun jre 1.6.0 update_19
    sun jre 1.6.0 update_21
    sun jre 1.6.0
    sun jre 1.6.0 update_12
    oracle jre 1.6.0 update22
    oracle jre 1.6.0 update23
    sun jre 1.6.0 update_17
    sun jre 1.6.0 update_18
    oracle jre 1.6.0 update29
    oracle jre * update30
    oracle jre 1.6.0 update26
    oracle jre 1.6.0 update27
    sun jre 1.6.0 update_7
    sun jre 1.6.0 update_10
    sun jre 1.6.0 update_4
    sun jre 1.6.0 update_11
    sun jre 1.6.0 update_14
    oracle jre 1.6.0 update24
    oracle jre 1.6.0 update25
    oracle jre * update2
    oracle jre 1.7.0
    oracle jre 1.7.0 update1
    sun jre 1.1.5.0 update7
    sun jre 1.1.5.0 update11
    sun jre 1.1.5.0 update9
    sun jre 1.1.5.0 update3
    sun jre 1.1.5.0 update12
    sun jre 1.1.5.0 update10
    sun jre 1.1.5.0 update8
    sun jre 1.1.5.0 update13
    sun jre 1.1.5.0
    sun jre 1.1.5.0 update6
    sun jre 1.1.5.0 update1
    sun jre 1.1.5.0 update4
    sun jre 1.1.5.0 update5
    sun jre 1.1.5.0 update2
    sun jre 1.1.5.0 update14
    sun jre 1.1.5.0 update15
    sun jre 1.1.5.0 update16
    sun jre 1.1.5.0 update17
    oracle virtualization 3.2
    oracle jre 1.7.0
    oracle jre 1.7.0 update1
    oracle jre 1.7.0 update2
    redhat rhel extras 4
    hitachi ucosminexus service architect *
    redhat enterprise linux 5
    redhat enterprise linux 5
    hitachi processing kit for xml 01-00
    hitachi ucosminexus client 06-70-/f
    hitachi ucosminexus operator 07-00-05
    hitachi ucosminexus service platform *
    hitachi cosminexus application server 05-00
    hitachi cosminexus application server 06-00 -
    hitachi cosminexus server 04-00 -
    hitachi cosminexus studio 04-00 -
    hitachi ucosminexus application server 06-70 -
    hitachi ucosminexus developer 06-70 -
    ibm tivoli netcool/omnibus 7.3.0
    redhat enterprise linux 6
    redhat enterprise linux 6
    apple mac os x 10.6.8
    apple mac os x server 10.6.8
    redhat enterprise linux server supplementary 6
    redhat enterprise linux workstation supplementary 6
    redhat enterprise linux desktop 6
    redhat enterprise linux desktop supplementary 6
    redhat enterprise linux hpc node 6
    redhat enterprise linux hpc node supplementary 6
    apple mac os x server 10.7.3
    apple mac os x 10.7.3
    ibm tivoli system automation 3.2
    ibm tivoli system automation 3.2.1
    ibm tivoli system automation 3.2.2
    ibm tivoli system automation application manager 3.2.2
    ibm tivoli netcool/omnibus 7.3.1
    ibm tivoli netcool/omnibus 7.4.0