10 CVE-2012-3174
Unspecified vulnerability in Oracle Java 7 before Update 11 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors, a different vulnerability than CVE-2013-0422. NOTE: some parties have mapped CVE-2012-3174 to an issue involving recursive use of the Reflection API, but that issue is already covered as part of CVE-2013-0422. This identifier is for a different vulnerability whose details are not public as of 20130114.
https://nvd.nist.gov/vuln/detail/CVE-2012-3174
Categories
CWE-264
References
af854a3a-2127-422b-91ae-364da2661108
secalert_us@oracle.com
CPE
cpe | start | end |
---|---|---|
Configuration 1 | ||
cpe:2.3:a:oracle:jdk:1.7.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:jdk:1.7.0:update1:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:jdk:1.7.0:update10:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:jdk:1.7.0:update2:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:jdk:1.7.0:update3:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:jdk:1.7.0:update4:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:jdk:1.7.0:update5:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:jdk:1.7.0:update6:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:jdk:1.7.0:update7:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:jdk:1.7.0:update9:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:jre:1.7.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:jre:1.7.0:update1:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:jre:1.7.0:update10:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:jre:1.7.0:update2:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:jre:1.7.0:update3:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:jre:1.7.0:update4:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:jre:1.7.0:update5:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:jre:1.7.0:update6:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:jre:1.7.0:update7:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:jre:1.7.0:update9:*:*:*:*:*:* |
REMEDIATION
EXPLOITS
Exploit-db.com
id | description | date | |
---|---|---|---|
No known exploits |
POC Github
Url |
---|
No known exploits |
Other Nist (github, ...)
Url |
---|
No known exploits |
CAPEC
Common Attack Pattern Enumerations and Classifications
id | description | severity |
---|---|---|
No entry |
Cybersecurity needs ?
Strengthen software security from the outset with our DevSecOps expertise
Integrate security right from the start of the software development cycle for more robust applications and greater customer confidence.
Our team of DevSecOps experts can help you secure your APIs, data pipelines, CI/CD chains, Docker containers and Kubernetes deployments.