10 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
5.3 Medium
AI Score
Confidence
High
0.143 Low
EPSS
Percentile
95.8%
Multiple vulnerabilities were found in Oracle products. By exploiting these vulnerabilities malicious users can affect integrity, confidentiality and availability. These vulnerabilities can be exploited remotely via an unknwn vectors related to CORBA, JNDI, BEANS, AWT, JAX-WS, Security, JGSS, Javadoc, SCRIPTING, JavaFX, Swing, Libraries, jhat, Deployment, 2D, JAXP and other unknown vectors.
CVE-2013-5787 critical
CVE-2013-5783 high
CVE-2013-5800 warning
CVE-2013-5810 critical
CVE-2013-5803 warning
CVE-2013-5838 critical
CVE-2013-5852 critical
CVE-2013-5790 warning
CVE-2013-3829 high
CVE-2013-5854 warning
CVE-2013-5848 critical
CVE-2013-5806 critical
CVE-2013-5829 critical
CVE-2013-5849 warning
CVE-2013-5797 warning
CVE-2013-4002 high
CVE-2013-5844 critical
CVE-2013-5784 warning
CVE-2013-5846 critical
CVE-2013-5805 critical
CVE-2013-5804 high
CVE-2013-5775 critical
CVE-2013-5825 critical
CVE-2013-5843 critical
CVE-2013-5812 high
CVE-2013-5842 critical
CVE-2013-5778 critical
CVE-2013-5823 critical
CVE-2013-5772 warning
CVE-2013-5774 critical
CVE-2013-5840 critical
CVE-2013-5789 critical
CVE-2013-5782 critical
CVE-2013-5780 warning
CVE-2013-5809 critical
CVE-2013-5824 critical
CVE-2013-5777 critical
CVE-2013-5819 critical
CVE-2013-5818 critical
CVE-2013-5814 critical
CVE-2013-5817 critical
CVE-2013-5801 critical
CVE-2013-5776 critical
CVE-2013-5832 critical
CVE-2013-5831 critical
CVE-2013-5830 critical
CVE-2013-5788 critical
CVE-2013-5820 critical
CVE-2013-5802 critical
CVE-2013-5851 critical
CVE-2013-5850 critical
Update to latest version!
Obtain sensitive information. Exploitation of vulnerabilities with this impact can lead to capturing by abuser information, critical for user or system.
Denial of service. Exploitation of vulnerabilities with this impact can lead to loss of system availability or critical functional fault.
Loss of integrity. Exploitation of vulnerabilities with this impact can lead to partial system fault or system components connection disruption.
www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html
statistics.securelist.com/
threats.kaspersky.com/en/product/Oracle-Java-JDK-1.7.x/
threats.kaspersky.com/en/product/Oracle-Java-JRE-1.7.x/
threats.kaspersky.com/en/product/Oracle-JRockit/
threats.kaspersky.com/en/product/Sun-Java-JDK-1.6.x/
threats.kaspersky.com/en/product/Sun-Java-JRE-1.6.x/
threats.kaspersky.com/en/product/Sun-Java-JRE/