Lucene search

K

Information Disclosure

🗓️ 02 May 2019 04:22:54Reported by Veracode Vulnerability DatabaseType 
veracode
 veracode
🔗 sca.analysiscenter.veracode.com👁 30 Views

OpenJDK vulnerability affects confidentiality via Librarie

Show more

AI Insights are available for you today

Leverage the power of AI to quickly understand vulnerabilities, impacts, and exploitability

Related
Detection
Refs
ReporterTitlePublishedViews
Family
Cvelist
CVE-2013-5780
16 Oct 201315:00
cvelist
IBM Security Bulletins
Security Bulletin: InfoSphere Replication Dashboard is affected by a vulnerability in the IBM JRE (CVE-2013-5780)
25 Sep 202223:09
ibm
IBM Security Bulletins
Security Bulletin: Vulnerability in IBM Rational RequisitePro could allow a remote attacker to obtain sensitive information. (CVE-2013-5780)
17 Jun 201804:52
ibm
IBM Security Bulletins
Security Bulletin: DB2 Recovery Expert for Linux, UNIX and Windows is affected by a vulnerability in IBM Java (CVE-2013-5780)
25 Sep 202221:06
ibm
IBM Security Bulletins
Security Bulletin: IBM WebSphere MQ is affected by a vulnerability in the IBM JRE (CVE-2013-5780)
15 Jun 201807:00
ibm
IBM Security Bulletins
Security Bulletin: InfoSphere Data Replication Dashboard is affected by a vulnerability in the IBM Runtime Environment, Java™ Technology Edition (CVE-2014-0453)
16 Jun 201814:14
ibm
IBM Security Bulletins
Security Bulletin: InfoSphere BigInsights affected by vulnerabilities in IBM SDK Java™ Technology Edition (CVE-2013-4002, CVE-2013-5780)
18 Jul 202023:22
ibm
IBM Security Bulletins
Security Bulletin: Information regarding security vulnerability in IBM SDK for Java that is shipped with IBM WebSphere Application Server and addressed by Oracle CPU October 2013
15 Sep 202218:13
ibm
IBM Security Bulletins
Security Bulletin: Information regarding security vulnerability in IBM SDK for Java that is shipped with IBM WebSphere Application Server and addressed by Oracle CPU October 2013
15 Jun 201806:59
ibm
IBM Security Bulletins
Security Bulletin: Information regarding security vulnerability in IBM SDK for Java that is shipped with IBM WebSphere Application Server and addressed by Oracle CPU October 2013
19 Aug 202223:26
ibm
Rows per page
Vulners
Node
java-1.7.0-openjdkjava-1.7.0-openjdkMatch1.7.0.9_2.3.3.el5.1
OR
java-1.7.0-openjdkjava-1.7.0-openjdkMatch1.7.0.25_2.3.10.4.el5_9
OR
java-1.7.0-openjdkjava-1.7.0-openjdkMatch1.7.0.9_2.3.5.3.el5_9
OR
java-1.7.0-openjdkjava-1.7.0-openjdkMatch1.7.0.9_2.3.7.1.el5_9
OR
java-1.7.0-openjdkjava-1.7.0-openjdkMatch1.7.0.19_2.3.9.1.el5_9
OR
java-1.7.0-openjdkjava-1.7.0-openjdkMatch1.7.0.9_2.3.8.0.el5_9
OR
java-1.7.0-openjdkjava-1.7.0-openjdkMatch1.7.0.25_2.3.10.5.el5_9
OR
java-1.7.0-openjdkjava-1.7.0-openjdkMatch1.7.0.9_2.3.4.el5_9.1
OROR
java-1.7.0-openjdkjava-1.7.0-openjdkMatch1.7.0.19_2.3.9.1.el6_4
OR
java-1.7.0-openjdkjava-1.7.0-openjdkMatch1.7.0.9_2.3.5.3.el6_3
OR
java-1.7.0-openjdkjava-1.7.0-openjdkMatch1.7.0.9_2.3.3.2.el6_3
OR
java-1.7.0-openjdkjava-1.7.0-openjdkMatch1.7.0.25_2.3.10.3.el6_4
OR
java-1.7.0-openjdkjava-1.7.0-openjdkMatch1.7.0.5_2.2.1.el6_3.3
OR
java-1.7.0-openjdkjava-1.7.0-openjdkMatch1.7.0.9_2.3.7.1.el6_3
OR
java-1.7.0-openjdkjava-1.7.0-openjdkMatch1.7.0.9_2.3.4.1.el6_3
OR
java-1.7.0-openjdkjava-1.7.0-openjdkMatch1.7.0.25_2.3.10.4.el6_4
OR
java-1.7.0-openjdkjava-1.7.0-openjdkMatch1.7.0.9_2.3.8.0.el6_4
OR
java-1.7.0-openjdkjava-1.7.0-openjdkMatch1.7.0.9_2.3.3.el6_3.1
OR
java-1.7.0-openjdkjava-1.7.0-openjdkMatch1.7.0.5_2.2.1.el6_3
OR
java-1.6.0-openjdkjava-1.6.0-openjdkMatch1.6.0.0_1.54.1.11.6.el6_3
OR
java-1.6.0-openjdkjava-1.6.0-openjdkMatch1.6.0.0_1.39.1.9.7.el6
OR
java-1.6.0-openjdkjava-1.6.0-openjdkMatch1.6.0.0_1.31.b17.el6_0
OR
java-1.6.0-openjdkjava-1.6.0-openjdkMatch1.6.0.0_1.16.b17.el5
OR
java-1.6.0-openjdkjava-1.6.0-openjdkMatch1.6.0.0_1.22.1.9.8.el5_6
OR
java-1.6.0-openjdkjava-1.6.0-openjdkMatch1.6.0.0_1.21.b17.el6
OR
java-1.6.0-openjdkjava-1.6.0-openjdkMatch1.6.0.0_1.21.b17.el5
OR
java-1.6.0-openjdkjava-1.6.0-openjdkMatch1.6.0.0_1.39.b17.el6_0
OR
java-1.6.0-openjdkjava-1.6.0-openjdkMatch1.6.0.0_1.17.b17.el5
OR
java-1.6.0-openjdkjava-1.6.0-openjdkMatch1.6.0.0_1.62.1.11.11.90.el6_4
OR
java-1.6.0-openjdkjava-1.6.0-openjdkMatch1.6.0.0_1.13.b16.el5
OR
java-1.6.0-openjdkjava-1.6.0-openjdkMatch1.6.0.0_1.57.1.11.9.el6_4
OR
java-1.6.0-openjdkjava-1.6.0-openjdkMatch1.6.0.0_1.61.1.11.11.el6_4
OR
java-1.6.0-openjdkjava-1.6.0-openjdkMatch1.6.0.0_1.41.1.11.11.90.el5_9
OR
java-1.6.0-openjdkjava-1.6.0-openjdkMatch1.6.0.0_1.65.1.11.13.el6_4
OR
java-1.6.0-openjdkjava-1.6.0-openjdkMatch1.6.0.0_0.30.b09.el5
OR
java-1.6.0-openjdkjava-1.6.0-openjdkMatch1.6.0.0_1.35.1.11.8.el5_9
OR
java-1.6.0-openjdkjava-1.6.0-openjdkMatch1.6.0.0_1.36.b17.el6_0
OR
java-1.6.0-openjdkjava-1.6.0-openjdkMatch1.6.0.0_0.25.b09.el5
OR
java-1.6.0-openjdkjava-1.6.0-openjdkMatch1.6.0.0_1.18.b17.el5
OR
java-1.6.0-openjdkjava-1.6.0-openjdkMatch1.6.0.0_1.30.1.11.5.el5
OR
java-1.6.0-openjdkjava-1.6.0-openjdkMatch1.6.0.0_1.28.1.10.9.el5_8
OR
java-1.6.0-openjdkjava-1.6.0-openjdkMatch1.6.0.0_1.28.1.10.10.el5_8
OR
java-1.6.0-openjdkjava-1.6.0-openjdkMatch1.6.0.0_1.41.1.10.4.el6
OR
java-1.6.0-openjdkjava-1.6.0-openjdkMatch1.6.0.0_1.25.1.10.6.el5_8
OR
java-1.6.0-openjdkjava-1.6.0-openjdkMatch1.6.0.0_1.42.1.10.4.el6_2
OR
java-1.6.0-openjdkjava-1.6.0-openjdkMatch1.6.0.0_1.33.1.11.6.el5_9
OR
java-1.6.0-openjdkjava-1.6.0-openjdkMatch1.6.0.0_1.48.1.11.3.el6_2
OR
java-1.6.0-openjdkjava-1.6.0-openjdkMatch1.6.0.0_1.7.b09.el5
OR
java-1.6.0-openjdkjava-1.6.0-openjdkMatch1.6.0.0_1.43.1.10.6.el6_2
OR
java-1.6.0-openjdkjava-1.6.0-openjdkMatch1.6.0.0_1.49.1.11.4.el6_3
OR
java-1.6.0-openjdkjava-1.6.0-openjdkMatch1.6.0.0_1.40.1.11.11.el5_9
OR
java-1.6.0-openjdkjava-1.6.0-openjdkMatch1.6.0.0_1.23.1.9.10.el5_7
OR
java-1.6.0-openjdkjava-1.6.0-openjdkMatch1.6.0.0_1.20.b17.el5
OR
java-1.6.0-openjdkjava-1.6.0-openjdkMatch1.6.0.0_1.45.1.11.1.el6
OR
java-1.6.0-openjdkjava-1.6.0-openjdkMatch1.6.0.0_1.50.1.11.5.el6_3
OR
java-1.6.0-openjdkjava-1.6.0-openjdkMatch1.6.0.0_1.2.b09.el5
OR
java-1.6.0-openjdkjava-1.6.0-openjdkMatch1.6.0.0_1.56.1.11.8.el6_3
OR
java-1.6.0-openjdkjava-1.6.0-openjdkMatch1.6.0.0_1.27.1.10.8.el5_8
OR
java-1.6.0-openjdkjava-1.6.0-openjdkMatch1.6.0.0_1.11.b16.el5
OR
java-1.6.0-openjdkjava-1.6.0-openjdkMatch1.6.0.0_1.24.1.10.4.el5
OR
java-1.6.0-openjdkjava-1.6.0-openjdkMatch1.6.0.0_1.39.1.9.8.el6_1
OR
java-1.6.0-openjdkjava-1.6.0-openjdkMatch1.6.0.0_1.36.1.11.9.el5_9
OR
java-1.6.0-openjdkjava-1.6.0-openjdkMatch1.6.0.0_1.40.1.9.10.el6_1
OR
java-1.6.0-ibmjava-1.6.0-ibmMatch1.6.0.9.1_1jpp.1.el5
OR
java-1.6.0-ibmjava-1.6.0-ibmMatch1.6.0.9.1_1jpp.1.el6
OR
java-1.6.0-ibmjava-1.6.0-ibmMatch1.6.0.4_1jpp.1.el5
OR
java-1.6.0-ibmjava-1.6.0-ibmMatch1.6.0.10.1_1jpp.1.el5
OR
java-1.6.0-ibmjava-1.6.0-ibmMatch1.6.0.14.0_1jpp.1.el6_4
OR
java-1.6.0-ibmjava-1.6.0-ibmMatch1.6.0.10.1_1jpp.5.el6_2
OR
java-1.6.0-ibmjava-1.6.0-ibmMatch1.6.0.14.0_1jpp.1.el5_9
OR
java-1.6.0-ibmjava-1.6.0-ibmMatch1.6.0.8.1_1jpp.2.el5

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
02 May 2019 04:54Current
5.6Medium risk
Vulners AI Score5.6
CVSS24.3
EPSS0.01293
30
.json
Report