Lucene search

K

CVE-2012-4820

🗓️ 11 Jan 2013 00:00:55Reported by [email protected]Type 
nvd
 nvd
🔗 web.nvd.nist.gov👁 10 Views

Unspecified vulnerability in IBM Java 7 SR2 and earlier allowing remote attackers to gain privileges by modifying or removing the security manager

Show more
Related
Detection
Refs
ReporterTitlePublishedViews
Family
cve
CVE-2012-4820
11 Jan 201300:55
cve
cvelist
CVE-2012-4820
11 Jan 201300:00
cvelist
checkpoint_advisories
IBM Java ProxyUtil Sandbox Breach (CVE-2012-4820)
20 Feb 201300:00
checkpoint_advisories
checkpoint_advisories
IBM Java ProxyUtil Sandbox Breach - Ver2 (CVE-2012-4820)
18 May 201500:00
checkpoint_advisories
prion
Design/Logic Flaw
11 Jan 201300:55
prion
nessus
IBM Lotus Notes 8.5.1 / 8.5.2 / 8.5.3 < 8.5.3 FP3 Multiple Vulnerabilities
17 Dec 201200:00
nessus
nessus
RHEL 5 : java-1.4.2-ibm (RHSA-2012:1485) (ROBOT)
24 Jan 201300:00
nessus
nessus
RHEL 5 / 6 : java-1.5.0-ibm (RHSA-2012:1465)
16 Nov 201200:00
nessus
nessus
RHEL 5 / 6 : java-1.6.0-ibm (RHSA-2012:1466)
16 Nov 201200:00
nessus
nessus
RHEL 6 : java-1.7.0-ibm (RHSA-2012:1467)
16 Nov 201200:00
nessus
Rows per page
Nvd
Node
ibmjavaRange1.4.21.4.2.13.13
OR
ibmjavaRange5.0.0.05.0.14.0
OR
ibmjavaRange6.0.0.06.0.11.0
OR
ibmjavaRange7.0.0.07.0.2.0
OROR
ibmlotus_dominoMatch8.0.1
OR
ibmlotus_dominoMatch8.0.2
OR
ibmlotus_dominoMatch8.0.2.1
OR
ibmlotus_dominoMatch8.0.2.2
OR
ibmlotus_dominoMatch8.0.2.3
OR
ibmlotus_dominoMatch8.0.2.4
OR
ibmlotus_dominoMatch8.5.0
OR
ibmlotus_dominoMatch8.5.0.1
OR
ibmlotus_dominoMatch8.5.1
OR
ibmlotus_dominoMatch8.5.1.1
OR
ibmlotus_dominoMatch8.5.1.2
OR
ibmlotus_dominoMatch8.5.1.3
OR
ibmlotus_dominoMatch8.5.1.4
OR
ibmlotus_dominoMatch8.5.1.5
OR
ibmlotus_dominoMatch8.5.2.0
OR
ibmlotus_dominoMatch8.5.2.1
OR
ibmlotus_dominoMatch8.5.2.2
OR
ibmlotus_dominoMatch8.5.2.3
OR
ibmlotus_dominoMatch8.5.2.4
OR
ibmlotus_dominoMatch8.5.3.0
OR
ibmlotus_dominoMatch8.5.3.1
OR
ibmlotus_dominoMatch8.5.3.2
OROR
ibmlotus_notesMatch8.0.0
OR
ibmlotus_notesMatch8.0.1
OR
ibmlotus_notesMatch8.0.2
OR
ibmlotus_notesMatch8.0.2.0
OR
ibmlotus_notesMatch8.0.2.1
OR
ibmlotus_notesMatch8.0.2.2
OR
ibmlotus_notesMatch8.0.2.3
OR
ibmlotus_notesMatch8.0.2.4
OR
ibmlotus_notesMatch8.0.2.5
OR
ibmlotus_notesMatch8.0.2.6
OROR
ibmlotus_notesMatch8.5.0.0
OR
ibmlotus_notesMatch8.5.0.1
OR
ibmlotus_notesMatch8.5.1
OR
ibmlotus_notesMatch8.5.1.0
OR
ibmlotus_notesMatch8.5.1.1
OR
ibmlotus_notesMatch8.5.1.2
OR
ibmlotus_notesMatch8.5.1.3
OR
ibmlotus_notesMatch8.5.1.4
OR
ibmlotus_notesMatch8.5.1.5
OR
ibmlotus_notesMatch8.5.2.0
OR
ibmlotus_notesMatch8.5.2.1
OR
ibmlotus_notesMatch8.5.2.2
OR
ibmlotus_notesMatch8.5.2.3
OR
ibmlotus_notesMatch8.5.3
OR
ibmlotus_notesMatch8.5.3.1
OR
ibmlotus_notesMatch8.5.3.2
OR
ibmlotus_notesMatch8.5.4
OROROR
ibmlotus_notes_sametimeMatch8.5.1.20100709-1631advanced_embedded
OROROROROROROROROROROROROROROROR
ibmlotus_notes_travelerMatch8.5.3.3interim_fix_1
OROROROROROROROROROROROROROROROROROROROROROROROROROROROROROROROROROROROROROROROROROROROROROROROROROROROROR

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
11 Jan 2013 00:55Current
4.6Medium risk
Vulners AI Score4.6
CVSS29.3
EPSS0.201
10
.json
Report