Versio.io

CVE-2013-2467

Common vulnerabilities & exposures (CVE)

CVE databaseCVE database blogpostRelease & EoL database
 
Published at: - 19-06-2013 12:55
Last modified: - 13-05-2022 04:49
Total changes: - 2

Description

Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 5.0 Update 45 and earlier allows local users to affect confidentiality, integrity, and availability via unknown vectors related to the Java installer.

Common Vulnerability Scoring System (CVSS)

AV:L/AC:M/Au:N/C:C/I:C/A:C
Low
Attack complexity
Local
Attack vector
High
Availability
High
Confidentiality
High
Integrity
-
Privileges required
-
Scope
-
User interaction
6.9
Base score
3.4
10.0
Exploitability score
Impact score
 

Verification logic

OR
OR
vendor=sun AND product=jre AND version=1.5.0 AND update=update22
vendor=sun AND product=jre AND version=1.5.0 AND update=update31
vendor=sun AND product=jre AND version=1.5.0
vendor=sun AND product=jre AND version=1.5.0 AND update=update18
vendor=sun AND product=jre AND version=1.5.0 AND update=update27
vendor=sun AND product=jre AND version=1.5.0 AND update=update2
vendor=sun AND product=jre AND version=1.5.0 AND update=update13
vendor=sun AND product=jre AND version=1.5.0 AND update=update24
vendor=sun AND product=jre AND version=1.5.0 AND update=update12
vendor=sun AND product=jre AND version=1.5.0 AND update=update26
vendor=sun AND product=jre AND version=1.5.0 AND update=update28
vendor=sun AND product=jre AND version=1.5.0 AND update=update21
vendor=sun AND product=jre AND version=1.5.0 AND update=update20
vendor=sun AND product=jre AND version=1.5.0 AND update=update4
vendor=sun AND product=jre AND version=1.5.0 AND update=update3
vendor=sun AND product=jre AND version=1.5.0 AND update=update19
vendor=sun AND product=jre AND version=1.5.0 AND update=update11
vendor=sun AND product=jre AND version=1.5.0 AND update=update10
vendor=sun AND product=jre AND version=1.5.0 AND update=update1
vendor=sun AND product=jre AND version=1.5.0 AND update=update25
vendor=sun AND product=jre AND version=1.5.0 AND update=update16
vendor=sun AND product=jre AND version=1.5.0 AND update=update9
vendor=sun AND product=jre AND version=1.5.0 AND update=update8
vendor=sun AND product=jre AND version=1.5.0 AND update=update33
vendor=sun AND product=jre AND version=1.5.0 AND update=update23
vendor=sun AND product=jre AND version=1.5.0 AND update=update15
vendor=sun AND product=jre AND version=1.5.0 AND update=update14
vendor=sun AND product=jre AND version=1.5.0 AND update=update7
vendor=sun AND product=jre AND version=1.5.0 AND update=update6
vendor=sun AND product=jre AND version=1.5.0 AND update=update5
vendor=sun AND product=jre AND version=1.5.0 AND update=update29
vendor=oracle AND product=jre AND update=update45 AND versionEndIncluding=1.5.0
vendor=oracle AND product=jre AND version=1.5.0 AND update=update38
vendor=sun AND product=jre AND version=1.5.0 AND update=update17
vendor=oracle AND product=jre AND version=1.5.0 AND update=update40
vendor=oracle AND product=jre AND version=1.5.0 AND update=update36
vendor=oracle AND product=jre AND version=1.5.0 AND update=update39
vendor=oracle AND product=jre AND version=1.5.0 AND update=update41
OR
vendor=sun AND product=jdk AND version=1.5.0 AND update=update20
vendor=sun AND product=jdk AND version=1.5.0 AND update=update15
vendor=sun AND product=jdk AND version=1.5.0 AND update=update18
vendor=sun AND product=jdk AND version=1.5.0 AND update=update27
vendor=sun AND product=jdk AND version=1.5.0 AND update=update3
vendor=sun AND product=jdk AND version=1.5.0 AND update=update21
vendor=sun AND product=jdk AND version=1.5.0 AND update=update31
vendor=sun AND product=jdk AND version=1.5.0 AND update=update11
vendor=sun AND product=jdk AND version=1.5.0 AND update=update26
vendor=sun AND product=jdk AND version=1.5.0 AND update=update16
vendor=sun AND product=jdk AND version=1.5.0 AND update=update17
vendor=sun AND product=jdk AND version=1.5.0 AND update=update4
vendor=sun AND product=jdk AND version=1.5.0 AND update=update25
vendor=sun AND product=jdk AND version=1.5.0 AND update=update24
vendor=sun AND product=jdk AND version=1.5.0 AND update=update9
vendor=sun AND product=jdk AND version=1.5.0 AND update=update2
vendor=sun AND product=jdk AND version=1.5.0 AND update=update1
vendor=sun AND product=jdk AND version=1.5.0
vendor=sun AND product=jdk AND version=1.5.0 AND update=update33
vendor=sun AND product=jdk AND version=1.5.0 AND update=update23
vendor=sun AND product=jdk AND version=1.5.0 AND update=update22
vendor=sun AND product=jdk AND version=1.5.0 AND update=update14
vendor=sun AND product=jdk AND version=1.5.0 AND update=update7_b03
vendor=sun AND product=jdk AND version=1.5.0 AND update=update7
vendor=sun AND product=jdk AND version=1.5.0 AND update=update29
vendor=sun AND product=jdk AND version=1.5.0 AND update=update28
vendor=sun AND product=jdk AND version=1.5.0 AND update=update12
vendor=sun AND product=jdk AND version=1.5.0 AND update=update11_b03
vendor=sun AND product=jdk AND version=1.5.0 AND update=update6
vendor=sun AND product=jdk AND version=1.5.0 AND update=update5
vendor=sun AND product=jdk AND version=1.5.0 AND update=update10
vendor=oracle AND product=jdk AND version=1.5.0 AND update=update38
vendor=oracle AND product=jdk AND version=1.5.0 AND update=update36
vendor=sun AND product=jdk AND version=1.5.0 AND update=update8
vendor=sun AND product=jdk AND version=1.5.0 AND update=update13
vendor=oracle AND product=jdk AND version=1.5.0 AND update=update40
vendor=oracle AND product=jdk AND version=1.5.0 AND update=update39
vendor=sun AND product=jdk AND version=1.5.0 AND update=update19
vendor=oracle AND product=jdk AND version=1.5.0 AND update=update41
vendor=oracle AND product=jdk AND update=update45 AND versionEndIncluding=1.5.0
 

Reference

 


Keywords

NVD

 

CVE-2013-2467

 

CVE

 

Common vulnerabilities & exposures

 

CVSS

 

Common vulnerability scoring system

 

Security

 

Vulnerabilities

 

Exposures

 

We use cookies to ensure that we give you the best experience on our website. Read privacy policies for more information.