Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2017-10107 (GCVE-0-2017-10107)
Vulnerability from cvelistv5 – Published: 2017-08-08 15:00 – Updated: 2024-10-04 19:03
VLAI?
EPSS
Summary
Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: RMI). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 9.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).
Severity ?
No CVSS data available.
CWE
- Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded.
Assigner
References
16 references
Impacted products
1 product
| Vendor | Product | Version | |
|---|---|---|---|
| Oracle Corporation | Java |
Affected:
Java SE: 6u151
Affected: 7u141 Affected: 8u131; Java SE Embedded: 8u131 |
Date Public ?
2017-07-18 00:00
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T17:33:16.294Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "RHSA-2017:1791",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2017:1791"
},
{
"name": "RHSA-2017:1790",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2017:1790"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://security.netapp.com/advisory/ntap-20170720-0001/"
},
{
"name": "RHSA-2017:1789",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2017:1789"
},
{
"name": "RHSA-2017:2424",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2017:2424"
},
{
"name": "1038931",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id/1038931"
},
{
"name": "RHSA-2017:1792",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2017:1792"
},
{
"name": "GLSA-201709-22",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO",
"x_transferred"
],
"url": "https://security.gentoo.org/glsa/201709-22"
},
{
"name": "DSA-3919",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2017/dsa-3919"
},
{
"name": "RHSA-2017:2481",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2017:2481"
},
{
"name": "RHSA-2017:2530",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2017:2530"
},
{
"name": "99719",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/99719"
},
{
"name": "RHSA-2017:3453",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2017:3453"
},
{
"name": "RHSA-2017:2469",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2017:2469"
},
{
"name": "DSA-3954",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2017/dsa-3954"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2017-10107",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-04T15:39:35.619154Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-10-04T19:03:31.799Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "Java",
"vendor": "Oracle Corporation",
"versions": [
{
"status": "affected",
"version": "Java SE: 6u151"
},
{
"status": "affected",
"version": "7u141"
},
{
"status": "affected",
"version": "8u131; Java SE Embedded: 8u131"
}
]
}
],
"datePublic": "2017-07-18T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: RMI). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 9.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H)."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded.",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-01-04T19:57:01.000Z",
"orgId": "43595867-4340-4103-b7a2-9a5208d29a85",
"shortName": "oracle"
},
"references": [
{
"name": "RHSA-2017:1791",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2017:1791"
},
{
"name": "RHSA-2017:1790",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2017:1790"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://security.netapp.com/advisory/ntap-20170720-0001/"
},
{
"name": "RHSA-2017:1789",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2017:1789"
},
{
"name": "RHSA-2017:2424",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2017:2424"
},
{
"name": "1038931",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id/1038931"
},
{
"name": "RHSA-2017:1792",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2017:1792"
},
{
"name": "GLSA-201709-22",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO"
],
"url": "https://security.gentoo.org/glsa/201709-22"
},
{
"name": "DSA-3919",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2017/dsa-3919"
},
{
"name": "RHSA-2017:2481",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2017:2481"
},
{
"name": "RHSA-2017:2530",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2017:2530"
},
{
"name": "99719",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/99719"
},
{
"name": "RHSA-2017:3453",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2017:3453"
},
{
"name": "RHSA-2017:2469",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2017:2469"
},
{
"name": "DSA-3954",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2017/dsa-3954"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2017-10107",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Java",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "Java SE: 6u151"
},
{
"version_affected": "=",
"version_value": "7u141"
},
{
"version_affected": "=",
"version_value": "8u131; Java SE Embedded: 8u131"
}
]
}
}
]
},
"vendor_name": "Oracle Corporation"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: RMI). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 9.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H)."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded."
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "RHSA-2017:1791",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:1791"
},
{
"name": "RHSA-2017:1790",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:1790"
},
{
"name": "https://security.netapp.com/advisory/ntap-20170720-0001/",
"refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20170720-0001/"
},
{
"name": "RHSA-2017:1789",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:1789"
},
{
"name": "RHSA-2017:2424",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:2424"
},
{
"name": "1038931",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1038931"
},
{
"name": "RHSA-2017:1792",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:1792"
},
{
"name": "GLSA-201709-22",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201709-22"
},
{
"name": "DSA-3919",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2017/dsa-3919"
},
{
"name": "RHSA-2017:2481",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:2481"
},
{
"name": "RHSA-2017:2530",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:2530"
},
{
"name": "99719",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/99719"
},
{
"name": "RHSA-2017:3453",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:3453"
},
{
"name": "RHSA-2017:2469",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:2469"
},
{
"name": "DSA-3954",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2017/dsa-3954"
},
{
"name": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "43595867-4340-4103-b7a2-9a5208d29a85",
"assignerShortName": "oracle",
"cveId": "CVE-2017-10107",
"datePublished": "2017-08-08T15:00:00.000Z",
"dateReserved": "2017-06-21T00:00:00.000Z",
"dateUpdated": "2024-10-04T19:03:31.799Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2017-10107",
"date": "2026-05-24",
"epss": "0.00247",
"percentile": "0.48034"
},
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:jdk:1.6.0:update151:*:*:*:*:*:*\", \"matchCriteriaId\": \"A3322D72-6B56-467E-90E5-5DCE0FA1F431\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:jdk:1.7.0:update141:*:*:*:*:*:*\", \"matchCriteriaId\": \"C4D0E043-D34F-446D-879B-692E3CF500C1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:jdk:1.8.0:update131:*:*:*:*:*:*\", \"matchCriteriaId\": \"106E9F69-857A-42F8-A727-2650C896D3B0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:jre:1.6.0:update151:*:*:*:*:*:*\", \"matchCriteriaId\": \"673DD72C-4FC8-406A-A24A-B06DD709649C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:jre:1.7.0:update141:*:*:*:*:*:*\", \"matchCriteriaId\": \"363C8E7E-2EEA-4308-A141-854B9EC17AAB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:jre:1.8.0:update131:*:*:*:*:*:*\", \"matchCriteriaId\": \"595FC4B7-418E-457C-ADCC-0A49A676D629\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DEECE5FC-CACF-4496-A3E7-164736409252\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F4F86C3C-B99C-44C6-97D7-163DC3F59687\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EE249E1B-A1FD-4E08-AA71-A0E1F10FFE97\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"33C068A4-3780-4EAB-A937-6082DF847564\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"807C024A-F8E8-4B48-A349-4C68CD252CA1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F96E3779-F56A-45FF-BB3D-4980527D721E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0CF73560-2F5B-4723-A8A1-9AADBB3ADA00\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5BF3C7A5-9117-42C7-BEA1-4AA378A582EF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"83737173-E12E-4641-BC49-0BD84A6B29D0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9BBCD86A-E6C7-4444-9D74-F861084090F0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"51EF4996-72F4-4FA4-814F-F5991E7A8318\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"98381E61-F082-4302-B51F-5648884F998B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D99A687E-EAE6-417E-A88E-D0082BC194CD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B353CE99-D57C-465B-AAB0-73EF581127D1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7431ABC1-9252-419E-8CC1-311B41360078\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"24C0F4E1-C52C-41E0-9F14-F83ADD5CC7ED\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D5F7E11E-FB34-4467-8919-2B6BEAABF665\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B76AA310-FEC7-497F-AF04-C3EC1E76C4CC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"17F256A9-D3B9-4C72-B013-4EFD878BFEA8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E5ED5807-55B7-47C5-97A6-03233F4FBC3A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"825ECE2D-E232-46E0-A047-074B34DB1E97\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*\", \"versionStartIncluding\": \"7.3\", \"matchCriteriaId\": \"BD075607-09B7-493E-8611-66D041FFDA62\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*\", \"versionStartIncluding\": \"9.5\", \"matchCriteriaId\": \"0CB28AF5-5AF0-4475-A7B6-12E1795FFDCB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5C2089EE-5D7F-47EC-8EA5-0F69790564C4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"11.0\", \"versionEndIncluding\": \"11.70.1\", \"matchCriteriaId\": \"73F81EC3-4AB0-4CD7-B845-267C5974DE98\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0D9CC59D-6182-4B5E-96B5-226FCD343916\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"85DF4B3F-4BBC-42B7-B729-096934523D63\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7DCBCC5D-C396-47A8-ADF4-D3A2C4377FB1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F1BE6C1F-2565-4E97-92AA-16563E5660A5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*\", \"matchCriteriaId\": \"698C6261-679D-45C1-A396-57AC96AD64D6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:oncommand_shift:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3BD81527-A341-42C3-9AB9-880D3DB04B08\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*\", \"versionEndIncluding\": \"7.1\", \"matchCriteriaId\": \"E32A4C2E-3DA6-4BE5-9D95-9F800B01ED9A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*\", \"versionEndIncluding\": \"7.1\", \"matchCriteriaId\": \"1A79A7B7-2CE9-4F5E-B76D-01A882C66226\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*\", \"matchCriteriaId\": \"3FA5E22C-489B-4C5F-A5F3-C03F45CA8811\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FFE0A9D2-9A49-4BF6-BC6F-8249162D8334\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*\", \"matchCriteriaId\": \"26A2B713-7D6D-420A-93A4-E0D983C983DF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*\", \"matchCriteriaId\": \"64DE38C8-94F1-4860-B045-F33928F676A8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E94F7F59-1785-493F-91A7-5F5EA5E87E4D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:windows:*:*\", \"versionStartIncluding\": \"7.2\", \"matchCriteriaId\": \"1E35D95E-CCBF-4335-A4DB-02218BA172DE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:9.6:*:*:*:*:vmware_vsphere:*:*\", \"matchCriteriaId\": \"B92F025C-D612-4A64-B138-E6B4B113B504\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"7.2\", \"matchCriteriaId\": \"13270F58-E106-48CE-9933-E68AABBBFC21\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:6.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"923F6B82-6A8B-4994-89F6-C430775D5234\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*\", \"versionStartIncluding\": \"7.2\", \"matchCriteriaId\": \"B7B42CB6-3C14-4183-AFA8-C3682F8B54AB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:virtual_storage_console:6.0:*:*:*:*:vmware_vsphere:*:*\", \"matchCriteriaId\": \"2AA40F7F-504D-47A9-9778-EC4CE46EB8BF\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: RMI). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 9.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).\"}, {\"lang\": \"es\", \"value\": \"Vulnerabilidad en los componentes Java SE y Java SE Embedded de Oracle Java SE (subcomponente: RMI). Las versiones compatibles que se han visto afectadas son JavaSE: 6u151, 7u141 y 8u131; Java SE Embedded: 8u131. Una vulnerabilidad f\\u00e1cilmente explotable permite que un atacante sin autenticar que tenga acceso a red por medio de m\\u00faltiples protocolos comprometa la seguridad de Java SE y Java SE Embedded. Para que los ataques tengan \\u00e9xito, se necesita la participaci\\u00f3n de otra persona diferente del atacante y, aunque la vulnerabilidad est\\u00e1 presente en Java SE y Java SE Embedded, los ataques podr\\u00edan afectar seriamente a productos adicionales. Los ataques exitosos a esta vulnerabilidad pueden resultar en la toma de control de Java SE y Java SE Embedded. Nota: Esta vulnerabilidad se aplica a implementaciones Java, normalmente en clientes que ejecutan aplicaciones Java Web Start en sandbox o applets Java en sandbox que cargan y ejecutan c\\u00f3digo que no es de confianza (por ejemplo, c\\u00f3digo proveniente de internet) y que conf\\u00edan en la sandbox de Java para protegerse. Esta vulnerabilidad no se aplica a implementaciones Java, normalmente en servidores, que solo cargan y ejecutan c\\u00f3digo de confianza (por ejemplo, c\\u00f3digo instalado por un administrador). CVSS 3.0 Base Score 9.6 (impactos en la confidencialidad, integridad y disponibilidad). Vector CVSS: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).\"}]",
"id": "CVE-2017-10107",
"lastModified": "2024-11-21T03:05:23.353",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H\", \"baseScore\": 9.6, \"baseSeverity\": \"CRITICAL\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"REQUIRED\", \"scope\": \"CHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 2.8, \"impactScore\": 6.0}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:M/Au:N/C:P/I:P/A:P\", \"baseScore\": 6.8, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 8.6, \"impactScore\": 6.4, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": true}]}",
"published": "2017-08-08T15:29:03.490",
"references": "[{\"url\": \"http://www.debian.org/security/2017/dsa-3919\", \"source\": \"secalert_us@oracle.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.debian.org/security/2017/dsa-3954\", \"source\": \"secalert_us@oracle.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html\", \"source\": \"secalert_us@oracle.com\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"http://www.securityfocus.com/bid/99719\", \"source\": \"secalert_us@oracle.com\", \"tags\": [\"Broken Link\"]}, {\"url\": \"http://www.securitytracker.com/id/1038931\", \"source\": \"secalert_us@oracle.com\", \"tags\": [\"Broken Link\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2017:1789\", \"source\": \"secalert_us@oracle.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2017:1790\", \"source\": \"secalert_us@oracle.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2017:1791\", \"source\": \"secalert_us@oracle.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2017:1792\", \"source\": \"secalert_us@oracle.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2017:2424\", \"source\": \"secalert_us@oracle.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2017:2469\", \"source\": \"secalert_us@oracle.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2017:2481\", \"source\": \"secalert_us@oracle.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2017:2530\", \"source\": \"secalert_us@oracle.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2017:3453\", \"source\": \"secalert_us@oracle.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://security.gentoo.org/glsa/201709-22\", \"source\": \"secalert_us@oracle.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://security.netapp.com/advisory/ntap-20170720-0001/\", \"source\": \"secalert_us@oracle.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.debian.org/security/2017/dsa-3919\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.debian.org/security/2017/dsa-3954\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"http://www.securityfocus.com/bid/99719\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Broken Link\"]}, {\"url\": \"http://www.securitytracker.com/id/1038931\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Broken Link\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2017:1789\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2017:1790\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2017:1791\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2017:1792\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2017:2424\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2017:2469\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2017:2481\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2017:2530\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2017:3453\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://security.gentoo.org/glsa/201709-22\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://security.netapp.com/advisory/ntap-20170720-0001/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}]",
"sourceIdentifier": "secalert_us@oracle.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"NVD-CWE-noinfo\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2017-10107\",\"sourceIdentifier\":\"secalert_us@oracle.com\",\"published\":\"2017-08-08T15:29:03.490\",\"lastModified\":\"2026-05-13T00:24:29.033\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: RMI). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 9.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).\"},{\"lang\":\"es\",\"value\":\"Vulnerabilidad en los componentes Java SE y Java SE Embedded de Oracle Java SE (subcomponente: RMI). Las versiones compatibles que se han visto afectadas son JavaSE: 6u151, 7u141 y 8u131; Java SE Embedded: 8u131. Una vulnerabilidad f\u00e1cilmente explotable permite que un atacante sin autenticar que tenga acceso a red por medio de m\u00faltiples protocolos comprometa la seguridad de Java SE y Java SE Embedded. Para que los ataques tengan \u00e9xito, se necesita la participaci\u00f3n de otra persona diferente del atacante y, aunque la vulnerabilidad est\u00e1 presente en Java SE y Java SE Embedded, los ataques podr\u00edan afectar seriamente a productos adicionales. Los ataques exitosos a esta vulnerabilidad pueden resultar en la toma de control de Java SE y Java SE Embedded. Nota: Esta vulnerabilidad se aplica a implementaciones Java, normalmente en clientes que ejecutan aplicaciones Java Web Start en sandbox o applets Java en sandbox que cargan y ejecutan c\u00f3digo que no es de confianza (por ejemplo, c\u00f3digo proveniente de internet) y que conf\u00edan en la sandbox de Java para protegerse. Esta vulnerabilidad no se aplica a implementaciones Java, normalmente en servidores, que solo cargan y ejecutan c\u00f3digo de confianza (por ejemplo, c\u00f3digo instalado por un administrador). CVSS 3.0 Base Score 9.6 (impactos en la confidencialidad, integridad y disponibilidad). Vector CVSS: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H\",\"baseScore\":9.6,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":6.0}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:P/A:P\",\"baseScore\":6.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jdk:1.6.0:update151:*:*:*:*:*:*\",\"matchCriteriaId\":\"A3322D72-6B56-467E-90E5-5DCE0FA1F431\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jdk:1.7.0:update141:*:*:*:*:*:*\",\"matchCriteriaId\":\"C4D0E043-D34F-446D-879B-692E3CF500C1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jdk:1.8.0:update131:*:*:*:*:*:*\",\"matchCriteriaId\":\"106E9F69-857A-42F8-A727-2650C896D3B0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jre:1.6.0:update151:*:*:*:*:*:*\",\"matchCriteriaId\":\"673DD72C-4FC8-406A-A24A-B06DD709649C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jre:1.7.0:update141:*:*:*:*:*:*\",\"matchCriteriaId\":\"363C8E7E-2EEA-4308-A141-854B9EC17AAB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jre:1.8.0:update131:*:*:*:*:*:*\",\"matchCriteriaId\":\"595FC4B7-418E-457C-ADCC-0A49A676D629\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEECE5FC-CACF-4496-A3E7-164736409252\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F4F86C3C-B99C-44C6-97D7-163DC3F59687\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE249E1B-A1FD-4E08-AA71-A0E1F10FFE97\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33C068A4-3780-4EAB-A937-6082DF847564\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"807C024A-F8E8-4B48-A349-4C68CD252CA1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F96E3779-F56A-45FF-BB3D-4980527D721E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0CF73560-2F5B-4723-A8A1-9AADBB3ADA00\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5BF3C7A5-9117-42C7-BEA1-4AA378A582EF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"83737173-E12E-4641-BC49-0BD84A6B29D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9BBCD86A-E6C7-4444-9D74-F861084090F0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"51EF4996-72F4-4FA4-814F-F5991E7A8318\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"98381E61-F082-4302-B51F-5648884F998B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D99A687E-EAE6-417E-A88E-D0082BC194CD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B353CE99-D57C-465B-AAB0-73EF581127D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7431ABC1-9252-419E-8CC1-311B41360078\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"24C0F4E1-C52C-41E0-9F14-F83ADD5CC7ED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D5F7E11E-FB34-4467-8919-2B6BEAABF665\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B76AA310-FEC7-497F-AF04-C3EC1E76C4CC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"17F256A9-D3B9-4C72-B013-4EFD878BFEA8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E5ED5807-55B7-47C5-97A6-03233F4FBC3A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"825ECE2D-E232-46E0-A047-074B34DB1E97\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*\",\"versionStartIncluding\":\"7.3\",\"matchCriteriaId\":\"BD075607-09B7-493E-8611-66D041FFDA62\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*\",\"versionStartIncluding\":\"9.5\",\"matchCriteriaId\":\"0CB28AF5-5AF0-4475-A7B6-12E1795FFDCB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C2089EE-5D7F-47EC-8EA5-0F69790564C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.0\",\"versionEndIncluding\":\"11.70.1\",\"matchCriteriaId\":\"73F81EC3-4AB0-4CD7-B845-267C5974DE98\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D9CC59D-6182-4B5E-96B5-226FCD343916\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"85DF4B3F-4BBC-42B7-B729-096934523D63\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7DCBCC5D-C396-47A8-ADF4-D3A2C4377FB1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F1BE6C1F-2565-4E97-92AA-16563E5660A5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*\",\"matchCriteriaId\":\"698C6261-679D-45C1-A396-57AC96AD64D6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:oncommand_shift:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3BD81527-A341-42C3-9AB9-880D3DB04B08\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*\",\"versionEndIncluding\":\"7.1\",\"matchCriteriaId\":\"E32A4C2E-3DA6-4BE5-9D95-9F800B01ED9A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*\",\"versionEndIncluding\":\"7.1\",\"matchCriteriaId\":\"1A79A7B7-2CE9-4F5E-B76D-01A882C66226\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*\",\"matchCriteriaId\":\"3FA5E22C-489B-4C5F-A5F3-C03F45CA8811\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FFE0A9D2-9A49-4BF6-BC6F-8249162D8334\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*\",\"matchCriteriaId\":\"26A2B713-7D6D-420A-93A4-E0D983C983DF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*\",\"matchCriteriaId\":\"64DE38C8-94F1-4860-B045-F33928F676A8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E94F7F59-1785-493F-91A7-5F5EA5E87E4D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:windows:*:*\",\"versionStartIncluding\":\"7.2\",\"matchCriteriaId\":\"1E35D95E-CCBF-4335-A4DB-02218BA172DE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:9.6:*:*:*:*:vmware_vsphere:*:*\",\"matchCriteriaId\":\"B92F025C-D612-4A64-B138-E6B4B113B504\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"7.2\",\"matchCriteriaId\":\"13270F58-E106-48CE-9933-E68AABBBFC21\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"923F6B82-6A8B-4994-89F6-C430775D5234\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*\",\"versionStartIncluding\":\"7.2\",\"matchCriteriaId\":\"B7B42CB6-3C14-4183-AFA8-C3682F8B54AB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:virtual_storage_console:6.0:*:*:*:*:vmware_vsphere:*:*\",\"matchCriteriaId\":\"2AA40F7F-504D-47A9-9778-EC4CE46EB8BF\"}]}]}],\"references\":[{\"url\":\"http://www.debian.org/security/2017/dsa-3919\",\"source\":\"secalert_us@oracle.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2017/dsa-3954\",\"source\":\"secalert_us@oracle.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html\",\"source\":\"secalert_us@oracle.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/99719\",\"source\":\"secalert_us@oracle.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.securitytracker.com/id/1038931\",\"source\":\"secalert_us@oracle.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:1789\",\"source\":\"secalert_us@oracle.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:1790\",\"source\":\"secalert_us@oracle.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:1791\",\"source\":\"secalert_us@oracle.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:1792\",\"source\":\"secalert_us@oracle.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:2424\",\"source\":\"secalert_us@oracle.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:2469\",\"source\":\"secalert_us@oracle.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:2481\",\"source\":\"secalert_us@oracle.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:2530\",\"source\":\"secalert_us@oracle.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:3453\",\"source\":\"secalert_us@oracle.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/201709-22\",\"source\":\"secalert_us@oracle.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20170720-0001/\",\"source\":\"secalert_us@oracle.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2017/dsa-3919\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2017/dsa-3954\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/99719\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.securitytracker.com/id/1038931\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:1789\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:1790\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:1791\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:1792\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:2424\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:2469\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:2481\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:2530\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:3453\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/201709-22\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20170720-0001/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://access.redhat.com/errata/RHSA-2017:1791\", \"name\": \"RHSA-2017:1791\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\", \"x_transferred\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2017:1790\", \"name\": \"RHSA-2017:1790\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\", \"x_transferred\"]}, {\"url\": \"https://security.netapp.com/advisory/ntap-20170720-0001/\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2017:1789\", \"name\": \"RHSA-2017:1789\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\", \"x_transferred\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2017:2424\", \"name\": \"RHSA-2017:2424\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\", \"x_transferred\"]}, {\"url\": \"http://www.securitytracker.com/id/1038931\", \"name\": \"1038931\", \"tags\": [\"vdb-entry\", \"x_refsource_SECTRACK\", \"x_transferred\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2017:1792\", \"name\": \"RHSA-2017:1792\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\", \"x_transferred\"]}, {\"url\": \"https://security.gentoo.org/glsa/201709-22\", \"name\": \"GLSA-201709-22\", \"tags\": [\"vendor-advisory\", \"x_refsource_GENTOO\", \"x_transferred\"]}, {\"url\": \"http://www.debian.org/security/2017/dsa-3919\", \"name\": \"DSA-3919\", \"tags\": [\"vendor-advisory\", \"x_refsource_DEBIAN\", \"x_transferred\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2017:2481\", \"name\": \"RHSA-2017:2481\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\", \"x_transferred\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2017:2530\", \"name\": \"RHSA-2017:2530\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\", \"x_transferred\"]}, {\"url\": \"http://www.securityfocus.com/bid/99719\", \"name\": \"99719\", \"tags\": [\"vdb-entry\", \"x_refsource_BID\", \"x_transferred\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2017:3453\", \"name\": \"RHSA-2017:3453\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\", \"x_transferred\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2017:2469\", \"name\": \"RHSA-2017:2469\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\", \"x_transferred\"]}, {\"url\": \"http://www.debian.org/security/2017/dsa-3954\", \"name\": \"DSA-3954\", \"tags\": [\"vendor-advisory\", \"x_refsource_DEBIAN\", \"x_transferred\"]}, {\"url\": \"http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-05T17:33:16.294Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2017-10107\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-10-04T15:39:35.619154Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-10-04T15:39:48.457Z\"}}], \"cna\": {\"affected\": [{\"vendor\": \"Oracle Corporation\", \"product\": \"Java\", \"versions\": [{\"status\": \"affected\", \"version\": \"Java SE: 6u151\"}, {\"status\": \"affected\", \"version\": \"7u141\"}, {\"status\": \"affected\", \"version\": \"8u131; Java SE Embedded: 8u131\"}]}], \"datePublic\": \"2017-07-18T00:00:00.000Z\", \"references\": [{\"url\": \"https://access.redhat.com/errata/RHSA-2017:1791\", \"name\": \"RHSA-2017:1791\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2017:1790\", \"name\": \"RHSA-2017:1790\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://security.netapp.com/advisory/ntap-20170720-0001/\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2017:1789\", \"name\": \"RHSA-2017:1789\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2017:2424\", \"name\": \"RHSA-2017:2424\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"http://www.securitytracker.com/id/1038931\", \"name\": \"1038931\", \"tags\": [\"vdb-entry\", \"x_refsource_SECTRACK\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2017:1792\", \"name\": \"RHSA-2017:1792\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://security.gentoo.org/glsa/201709-22\", \"name\": \"GLSA-201709-22\", \"tags\": [\"vendor-advisory\", \"x_refsource_GENTOO\"]}, {\"url\": \"http://www.debian.org/security/2017/dsa-3919\", \"name\": \"DSA-3919\", \"tags\": [\"vendor-advisory\", \"x_refsource_DEBIAN\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2017:2481\", \"name\": \"RHSA-2017:2481\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2017:2530\", \"name\": \"RHSA-2017:2530\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"http://www.securityfocus.com/bid/99719\", \"name\": \"99719\", \"tags\": [\"vdb-entry\", \"x_refsource_BID\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2017:3453\", \"name\": \"RHSA-2017:3453\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2017:2469\", \"name\": \"RHSA-2017:2469\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"http://www.debian.org/security/2017/dsa-3954\", \"name\": \"DSA-3954\", \"tags\": [\"vendor-advisory\", \"x_refsource_DEBIAN\"]}, {\"url\": \"http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html\", \"tags\": [\"x_refsource_CONFIRM\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: RMI). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 9.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"text\", \"description\": \"Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded.\"}]}], \"providerMetadata\": {\"orgId\": \"43595867-4340-4103-b7a2-9a5208d29a85\", \"shortName\": \"oracle\", \"dateUpdated\": \"2018-01-04T19:57:01.000Z\"}, \"x_legacyV4Record\": {\"affects\": {\"vendor\": {\"vendor_data\": [{\"product\": {\"product_data\": [{\"version\": {\"version_data\": [{\"version_value\": \"Java SE: 6u151\", \"version_affected\": \"=\"}, {\"version_value\": \"7u141\", \"version_affected\": \"=\"}, {\"version_value\": \"8u131; Java SE Embedded: 8u131\", \"version_affected\": \"=\"}]}, \"product_name\": \"Java\"}]}, \"vendor_name\": \"Oracle Corporation\"}]}}, \"data_type\": \"CVE\", \"references\": {\"reference_data\": [{\"url\": \"https://access.redhat.com/errata/RHSA-2017:1791\", \"name\": \"RHSA-2017:1791\", \"refsource\": \"REDHAT\"}, {\"url\": \"https://access.redhat.com/errata/RHSA-2017:1790\", \"name\": \"RHSA-2017:1790\", \"refsource\": \"REDHAT\"}, {\"url\": \"https://security.netapp.com/advisory/ntap-20170720-0001/\", \"name\": \"https://security.netapp.com/advisory/ntap-20170720-0001/\", \"refsource\": \"CONFIRM\"}, {\"url\": \"https://access.redhat.com/errata/RHSA-2017:1789\", \"name\": \"RHSA-2017:1789\", \"refsource\": \"REDHAT\"}, {\"url\": \"https://access.redhat.com/errata/RHSA-2017:2424\", \"name\": \"RHSA-2017:2424\", \"refsource\": \"REDHAT\"}, {\"url\": \"http://www.securitytracker.com/id/1038931\", \"name\": \"1038931\", \"refsource\": \"SECTRACK\"}, {\"url\": \"https://access.redhat.com/errata/RHSA-2017:1792\", \"name\": \"RHSA-2017:1792\", \"refsource\": \"REDHAT\"}, {\"url\": \"https://security.gentoo.org/glsa/201709-22\", \"name\": \"GLSA-201709-22\", \"refsource\": \"GENTOO\"}, {\"url\": \"http://www.debian.org/security/2017/dsa-3919\", \"name\": \"DSA-3919\", \"refsource\": \"DEBIAN\"}, {\"url\": \"https://access.redhat.com/errata/RHSA-2017:2481\", \"name\": \"RHSA-2017:2481\", \"refsource\": \"REDHAT\"}, {\"url\": \"https://access.redhat.com/errata/RHSA-2017:2530\", \"name\": \"RHSA-2017:2530\", \"refsource\": \"REDHAT\"}, {\"url\": \"http://www.securityfocus.com/bid/99719\", \"name\": \"99719\", \"refsource\": \"BID\"}, {\"url\": \"https://access.redhat.com/errata/RHSA-2017:3453\", \"name\": \"RHSA-2017:3453\", \"refsource\": \"REDHAT\"}, {\"url\": \"https://access.redhat.com/errata/RHSA-2017:2469\", \"name\": \"RHSA-2017:2469\", \"refsource\": \"REDHAT\"}, {\"url\": \"http://www.debian.org/security/2017/dsa-3954\", \"name\": \"DSA-3954\", \"refsource\": \"DEBIAN\"}, {\"url\": \"http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html\", \"name\": \"http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html\", \"refsource\": \"CONFIRM\"}]}, \"data_format\": \"MITRE\", \"description\": {\"description_data\": [{\"lang\": \"eng\", \"value\": \"Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: RMI). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 9.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).\"}]}, \"problemtype\": {\"problemtype_data\": [{\"description\": [{\"lang\": \"eng\", \"value\": \"Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded.\"}]}]}, \"data_version\": \"4.0\", \"CVE_data_meta\": {\"ID\": \"CVE-2017-10107\", \"STATE\": \"PUBLIC\", \"ASSIGNER\": \"secalert_us@oracle.com\"}}}}",
"cveMetadata": "{\"cveId\": \"CVE-2017-10107\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-10-04T19:03:31.799Z\", \"dateReserved\": \"2017-06-21T00:00:00.000Z\", \"assignerOrgId\": \"43595867-4340-4103-b7a2-9a5208d29a85\", \"datePublished\": \"2017-08-08T15:00:00.000Z\", \"assignerShortName\": \"oracle\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
WID-SEC-W-2025-1210
Vulnerability from csaf_certbund - Published: 2017-07-18 22:00 - Updated: 2025-06-02 22:00Summary
Oracle Java SE: Mehrere Schwachstellen
Severity
Hoch
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung: Die Java Platform, Standard Edition (SE) ist eine Sammlung von Java-APIs (JDK) und der Java Laufzeit Umgebung (JRE).
Java Standard Edition (SE) Embedded ist die Laufzeitumgebung für die Java-Plattform des US-Unternehmens Oracle Corporation für Embedded Systems.
Oracle JRockit JVM ist eine leistungsfähige Java Virtual Machine, die in Oracle Fusion Middleware enthalten ist.
Angriff: Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Oracle Java SE, Oracle Java SE Embedded und Oracle JRockit ausnutzen,um Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.
Betroffene Betriebssysteme: - F5 Networks
- Linux
- UNIX
- Windows
Affected products
Known affected
14 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Oracle Java SE Embedded 8u131
Oracle / Java SE Embedded
|
cpe:/a:oracle:java_se_embedded:8u131
|
8u131 | |
|
Oracle Java SE 8u131
Oracle / Java SE
|
cpe:/a:oracle:java_se:8u131
|
8u131 | |
|
Oracle Java SE 7u141
Oracle / Java SE
|
cpe:/a:oracle:java_se:7u141
|
7u141 | |
|
Xerox FreeFlow Print Server 9
Xerox / FreeFlow Print Server
|
cpe:/a:xerox:freeflow_print_server:9
|
9 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Java SE 6u151
Oracle / Java SE
|
cpe:/a:oracle:java_se:6u151
|
6u151 | |
|
Oracle JRockit 28.3.14
Oracle / JRockit
|
cpe:/a:oracle:jrockit:28.3.14
|
28.3.14 | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
F5 Enterprise Manager
F5
|
cpe:/a:f5:enterprise_manager:-
|
— | |
|
Open Source CentOS
Open Source
|
cpe:/o:centos:centos:-
|
— | |
|
Xerox FreeFlow Print Server
Xerox / FreeFlow Print Server
|
cpe:/a:xerox:freeflow_print_server:-
|
— |
Affected products
Known affected
14 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Oracle Java SE Embedded 8u131
Oracle / Java SE Embedded
|
cpe:/a:oracle:java_se_embedded:8u131
|
8u131 | |
|
Oracle Java SE 8u131
Oracle / Java SE
|
cpe:/a:oracle:java_se:8u131
|
8u131 | |
|
Oracle Java SE 7u141
Oracle / Java SE
|
cpe:/a:oracle:java_se:7u141
|
7u141 | |
|
Xerox FreeFlow Print Server 9
Xerox / FreeFlow Print Server
|
cpe:/a:xerox:freeflow_print_server:9
|
9 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Java SE 6u151
Oracle / Java SE
|
cpe:/a:oracle:java_se:6u151
|
6u151 | |
|
Oracle JRockit 28.3.14
Oracle / JRockit
|
cpe:/a:oracle:jrockit:28.3.14
|
28.3.14 | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
F5 Enterprise Manager
F5
|
cpe:/a:f5:enterprise_manager:-
|
— | |
|
Open Source CentOS
Open Source
|
cpe:/o:centos:centos:-
|
— | |
|
Xerox FreeFlow Print Server
Xerox / FreeFlow Print Server
|
cpe:/a:xerox:freeflow_print_server:-
|
— |
Affected products
Known affected
14 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Oracle Java SE Embedded 8u131
Oracle / Java SE Embedded
|
cpe:/a:oracle:java_se_embedded:8u131
|
8u131 | |
|
Oracle Java SE 8u131
Oracle / Java SE
|
cpe:/a:oracle:java_se:8u131
|
8u131 | |
|
Oracle Java SE 7u141
Oracle / Java SE
|
cpe:/a:oracle:java_se:7u141
|
7u141 | |
|
Xerox FreeFlow Print Server 9
Xerox / FreeFlow Print Server
|
cpe:/a:xerox:freeflow_print_server:9
|
9 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Java SE 6u151
Oracle / Java SE
|
cpe:/a:oracle:java_se:6u151
|
6u151 | |
|
Oracle JRockit 28.3.14
Oracle / JRockit
|
cpe:/a:oracle:jrockit:28.3.14
|
28.3.14 | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
F5 Enterprise Manager
F5
|
cpe:/a:f5:enterprise_manager:-
|
— | |
|
Open Source CentOS
Open Source
|
cpe:/o:centos:centos:-
|
— | |
|
Xerox FreeFlow Print Server
Xerox / FreeFlow Print Server
|
cpe:/a:xerox:freeflow_print_server:-
|
— |
Affected products
Known affected
14 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Oracle Java SE Embedded 8u131
Oracle / Java SE Embedded
|
cpe:/a:oracle:java_se_embedded:8u131
|
8u131 | |
|
Oracle Java SE 8u131
Oracle / Java SE
|
cpe:/a:oracle:java_se:8u131
|
8u131 | |
|
Oracle Java SE 7u141
Oracle / Java SE
|
cpe:/a:oracle:java_se:7u141
|
7u141 | |
|
Xerox FreeFlow Print Server 9
Xerox / FreeFlow Print Server
|
cpe:/a:xerox:freeflow_print_server:9
|
9 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Java SE 6u151
Oracle / Java SE
|
cpe:/a:oracle:java_se:6u151
|
6u151 | |
|
Oracle JRockit 28.3.14
Oracle / JRockit
|
cpe:/a:oracle:jrockit:28.3.14
|
28.3.14 | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
F5 Enterprise Manager
F5
|
cpe:/a:f5:enterprise_manager:-
|
— | |
|
Open Source CentOS
Open Source
|
cpe:/o:centos:centos:-
|
— | |
|
Xerox FreeFlow Print Server
Xerox / FreeFlow Print Server
|
cpe:/a:xerox:freeflow_print_server:-
|
— |
Affected products
Known affected
14 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Oracle Java SE Embedded 8u131
Oracle / Java SE Embedded
|
cpe:/a:oracle:java_se_embedded:8u131
|
8u131 | |
|
Oracle Java SE 8u131
Oracle / Java SE
|
cpe:/a:oracle:java_se:8u131
|
8u131 | |
|
Oracle Java SE 7u141
Oracle / Java SE
|
cpe:/a:oracle:java_se:7u141
|
7u141 | |
|
Xerox FreeFlow Print Server 9
Xerox / FreeFlow Print Server
|
cpe:/a:xerox:freeflow_print_server:9
|
9 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Java SE 6u151
Oracle / Java SE
|
cpe:/a:oracle:java_se:6u151
|
6u151 | |
|
Oracle JRockit 28.3.14
Oracle / JRockit
|
cpe:/a:oracle:jrockit:28.3.14
|
28.3.14 | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
F5 Enterprise Manager
F5
|
cpe:/a:f5:enterprise_manager:-
|
— | |
|
Open Source CentOS
Open Source
|
cpe:/o:centos:centos:-
|
— | |
|
Xerox FreeFlow Print Server
Xerox / FreeFlow Print Server
|
cpe:/a:xerox:freeflow_print_server:-
|
— |
Affected products
Known affected
14 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Oracle Java SE Embedded 8u131
Oracle / Java SE Embedded
|
cpe:/a:oracle:java_se_embedded:8u131
|
8u131 | |
|
Oracle Java SE 8u131
Oracle / Java SE
|
cpe:/a:oracle:java_se:8u131
|
8u131 | |
|
Oracle Java SE 7u141
Oracle / Java SE
|
cpe:/a:oracle:java_se:7u141
|
7u141 | |
|
Xerox FreeFlow Print Server 9
Xerox / FreeFlow Print Server
|
cpe:/a:xerox:freeflow_print_server:9
|
9 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Java SE 6u151
Oracle / Java SE
|
cpe:/a:oracle:java_se:6u151
|
6u151 | |
|
Oracle JRockit 28.3.14
Oracle / JRockit
|
cpe:/a:oracle:jrockit:28.3.14
|
28.3.14 | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
F5 Enterprise Manager
F5
|
cpe:/a:f5:enterprise_manager:-
|
— | |
|
Open Source CentOS
Open Source
|
cpe:/o:centos:centos:-
|
— | |
|
Xerox FreeFlow Print Server
Xerox / FreeFlow Print Server
|
cpe:/a:xerox:freeflow_print_server:-
|
— |
Affected products
Known affected
14 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Oracle Java SE Embedded 8u131
Oracle / Java SE Embedded
|
cpe:/a:oracle:java_se_embedded:8u131
|
8u131 | |
|
Oracle Java SE 8u131
Oracle / Java SE
|
cpe:/a:oracle:java_se:8u131
|
8u131 | |
|
Oracle Java SE 7u141
Oracle / Java SE
|
cpe:/a:oracle:java_se:7u141
|
7u141 | |
|
Xerox FreeFlow Print Server 9
Xerox / FreeFlow Print Server
|
cpe:/a:xerox:freeflow_print_server:9
|
9 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Java SE 6u151
Oracle / Java SE
|
cpe:/a:oracle:java_se:6u151
|
6u151 | |
|
Oracle JRockit 28.3.14
Oracle / JRockit
|
cpe:/a:oracle:jrockit:28.3.14
|
28.3.14 | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
F5 Enterprise Manager
F5
|
cpe:/a:f5:enterprise_manager:-
|
— | |
|
Open Source CentOS
Open Source
|
cpe:/o:centos:centos:-
|
— | |
|
Xerox FreeFlow Print Server
Xerox / FreeFlow Print Server
|
cpe:/a:xerox:freeflow_print_server:-
|
— |
Affected products
Known affected
14 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Oracle Java SE Embedded 8u131
Oracle / Java SE Embedded
|
cpe:/a:oracle:java_se_embedded:8u131
|
8u131 | |
|
Oracle Java SE 8u131
Oracle / Java SE
|
cpe:/a:oracle:java_se:8u131
|
8u131 | |
|
Oracle Java SE 7u141
Oracle / Java SE
|
cpe:/a:oracle:java_se:7u141
|
7u141 | |
|
Xerox FreeFlow Print Server 9
Xerox / FreeFlow Print Server
|
cpe:/a:xerox:freeflow_print_server:9
|
9 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Java SE 6u151
Oracle / Java SE
|
cpe:/a:oracle:java_se:6u151
|
6u151 | |
|
Oracle JRockit 28.3.14
Oracle / JRockit
|
cpe:/a:oracle:jrockit:28.3.14
|
28.3.14 | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
F5 Enterprise Manager
F5
|
cpe:/a:f5:enterprise_manager:-
|
— | |
|
Open Source CentOS
Open Source
|
cpe:/o:centos:centos:-
|
— | |
|
Xerox FreeFlow Print Server
Xerox / FreeFlow Print Server
|
cpe:/a:xerox:freeflow_print_server:-
|
— |
Affected products
Known affected
14 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Oracle Java SE Embedded 8u131
Oracle / Java SE Embedded
|
cpe:/a:oracle:java_se_embedded:8u131
|
8u131 | |
|
Oracle Java SE 8u131
Oracle / Java SE
|
cpe:/a:oracle:java_se:8u131
|
8u131 | |
|
Oracle Java SE 7u141
Oracle / Java SE
|
cpe:/a:oracle:java_se:7u141
|
7u141 | |
|
Xerox FreeFlow Print Server 9
Xerox / FreeFlow Print Server
|
cpe:/a:xerox:freeflow_print_server:9
|
9 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Java SE 6u151
Oracle / Java SE
|
cpe:/a:oracle:java_se:6u151
|
6u151 | |
|
Oracle JRockit 28.3.14
Oracle / JRockit
|
cpe:/a:oracle:jrockit:28.3.14
|
28.3.14 | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
F5 Enterprise Manager
F5
|
cpe:/a:f5:enterprise_manager:-
|
— | |
|
Open Source CentOS
Open Source
|
cpe:/o:centos:centos:-
|
— | |
|
Xerox FreeFlow Print Server
Xerox / FreeFlow Print Server
|
cpe:/a:xerox:freeflow_print_server:-
|
— |
Affected products
Known affected
14 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Oracle Java SE Embedded 8u131
Oracle / Java SE Embedded
|
cpe:/a:oracle:java_se_embedded:8u131
|
8u131 | |
|
Oracle Java SE 8u131
Oracle / Java SE
|
cpe:/a:oracle:java_se:8u131
|
8u131 | |
|
Oracle Java SE 7u141
Oracle / Java SE
|
cpe:/a:oracle:java_se:7u141
|
7u141 | |
|
Xerox FreeFlow Print Server 9
Xerox / FreeFlow Print Server
|
cpe:/a:xerox:freeflow_print_server:9
|
9 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Java SE 6u151
Oracle / Java SE
|
cpe:/a:oracle:java_se:6u151
|
6u151 | |
|
Oracle JRockit 28.3.14
Oracle / JRockit
|
cpe:/a:oracle:jrockit:28.3.14
|
28.3.14 | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
F5 Enterprise Manager
F5
|
cpe:/a:f5:enterprise_manager:-
|
— | |
|
Open Source CentOS
Open Source
|
cpe:/o:centos:centos:-
|
— | |
|
Xerox FreeFlow Print Server
Xerox / FreeFlow Print Server
|
cpe:/a:xerox:freeflow_print_server:-
|
— |
Affected products
Known affected
14 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Oracle Java SE Embedded 8u131
Oracle / Java SE Embedded
|
cpe:/a:oracle:java_se_embedded:8u131
|
8u131 | |
|
Oracle Java SE 8u131
Oracle / Java SE
|
cpe:/a:oracle:java_se:8u131
|
8u131 | |
|
Oracle Java SE 7u141
Oracle / Java SE
|
cpe:/a:oracle:java_se:7u141
|
7u141 | |
|
Xerox FreeFlow Print Server 9
Xerox / FreeFlow Print Server
|
cpe:/a:xerox:freeflow_print_server:9
|
9 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Java SE 6u151
Oracle / Java SE
|
cpe:/a:oracle:java_se:6u151
|
6u151 | |
|
Oracle JRockit 28.3.14
Oracle / JRockit
|
cpe:/a:oracle:jrockit:28.3.14
|
28.3.14 | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
F5 Enterprise Manager
F5
|
cpe:/a:f5:enterprise_manager:-
|
— | |
|
Open Source CentOS
Open Source
|
cpe:/o:centos:centos:-
|
— | |
|
Xerox FreeFlow Print Server
Xerox / FreeFlow Print Server
|
cpe:/a:xerox:freeflow_print_server:-
|
— |
Affected products
Known affected
14 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Oracle Java SE Embedded 8u131
Oracle / Java SE Embedded
|
cpe:/a:oracle:java_se_embedded:8u131
|
8u131 | |
|
Oracle Java SE 8u131
Oracle / Java SE
|
cpe:/a:oracle:java_se:8u131
|
8u131 | |
|
Oracle Java SE 7u141
Oracle / Java SE
|
cpe:/a:oracle:java_se:7u141
|
7u141 | |
|
Xerox FreeFlow Print Server 9
Xerox / FreeFlow Print Server
|
cpe:/a:xerox:freeflow_print_server:9
|
9 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Java SE 6u151
Oracle / Java SE
|
cpe:/a:oracle:java_se:6u151
|
6u151 | |
|
Oracle JRockit 28.3.14
Oracle / JRockit
|
cpe:/a:oracle:jrockit:28.3.14
|
28.3.14 | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
F5 Enterprise Manager
F5
|
cpe:/a:f5:enterprise_manager:-
|
— | |
|
Open Source CentOS
Open Source
|
cpe:/o:centos:centos:-
|
— | |
|
Xerox FreeFlow Print Server
Xerox / FreeFlow Print Server
|
cpe:/a:xerox:freeflow_print_server:-
|
— |
Affected products
Known affected
14 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Oracle Java SE Embedded 8u131
Oracle / Java SE Embedded
|
cpe:/a:oracle:java_se_embedded:8u131
|
8u131 | |
|
Oracle Java SE 8u131
Oracle / Java SE
|
cpe:/a:oracle:java_se:8u131
|
8u131 | |
|
Oracle Java SE 7u141
Oracle / Java SE
|
cpe:/a:oracle:java_se:7u141
|
7u141 | |
|
Xerox FreeFlow Print Server 9
Xerox / FreeFlow Print Server
|
cpe:/a:xerox:freeflow_print_server:9
|
9 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Java SE 6u151
Oracle / Java SE
|
cpe:/a:oracle:java_se:6u151
|
6u151 | |
|
Oracle JRockit 28.3.14
Oracle / JRockit
|
cpe:/a:oracle:jrockit:28.3.14
|
28.3.14 | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
F5 Enterprise Manager
F5
|
cpe:/a:f5:enterprise_manager:-
|
— | |
|
Open Source CentOS
Open Source
|
cpe:/o:centos:centos:-
|
— | |
|
Xerox FreeFlow Print Server
Xerox / FreeFlow Print Server
|
cpe:/a:xerox:freeflow_print_server:-
|
— |
Affected products
Known affected
14 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Oracle Java SE Embedded 8u131
Oracle / Java SE Embedded
|
cpe:/a:oracle:java_se_embedded:8u131
|
8u131 | |
|
Oracle Java SE 8u131
Oracle / Java SE
|
cpe:/a:oracle:java_se:8u131
|
8u131 | |
|
Oracle Java SE 7u141
Oracle / Java SE
|
cpe:/a:oracle:java_se:7u141
|
7u141 | |
|
Xerox FreeFlow Print Server 9
Xerox / FreeFlow Print Server
|
cpe:/a:xerox:freeflow_print_server:9
|
9 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Java SE 6u151
Oracle / Java SE
|
cpe:/a:oracle:java_se:6u151
|
6u151 | |
|
Oracle JRockit 28.3.14
Oracle / JRockit
|
cpe:/a:oracle:jrockit:28.3.14
|
28.3.14 | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
F5 Enterprise Manager
F5
|
cpe:/a:f5:enterprise_manager:-
|
— | |
|
Open Source CentOS
Open Source
|
cpe:/o:centos:centos:-
|
— | |
|
Xerox FreeFlow Print Server
Xerox / FreeFlow Print Server
|
cpe:/a:xerox:freeflow_print_server:-
|
— |
Affected products
Known affected
14 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Oracle Java SE Embedded 8u131
Oracle / Java SE Embedded
|
cpe:/a:oracle:java_se_embedded:8u131
|
8u131 | |
|
Oracle Java SE 8u131
Oracle / Java SE
|
cpe:/a:oracle:java_se:8u131
|
8u131 | |
|
Oracle Java SE 7u141
Oracle / Java SE
|
cpe:/a:oracle:java_se:7u141
|
7u141 | |
|
Xerox FreeFlow Print Server 9
Xerox / FreeFlow Print Server
|
cpe:/a:xerox:freeflow_print_server:9
|
9 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Java SE 6u151
Oracle / Java SE
|
cpe:/a:oracle:java_se:6u151
|
6u151 | |
|
Oracle JRockit 28.3.14
Oracle / JRockit
|
cpe:/a:oracle:jrockit:28.3.14
|
28.3.14 | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
F5 Enterprise Manager
F5
|
cpe:/a:f5:enterprise_manager:-
|
— | |
|
Open Source CentOS
Open Source
|
cpe:/o:centos:centos:-
|
— | |
|
Xerox FreeFlow Print Server
Xerox / FreeFlow Print Server
|
cpe:/a:xerox:freeflow_print_server:-
|
— |
Affected products
Known affected
14 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Oracle Java SE Embedded 8u131
Oracle / Java SE Embedded
|
cpe:/a:oracle:java_se_embedded:8u131
|
8u131 | |
|
Oracle Java SE 8u131
Oracle / Java SE
|
cpe:/a:oracle:java_se:8u131
|
8u131 | |
|
Oracle Java SE 7u141
Oracle / Java SE
|
cpe:/a:oracle:java_se:7u141
|
7u141 | |
|
Xerox FreeFlow Print Server 9
Xerox / FreeFlow Print Server
|
cpe:/a:xerox:freeflow_print_server:9
|
9 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Java SE 6u151
Oracle / Java SE
|
cpe:/a:oracle:java_se:6u151
|
6u151 | |
|
Oracle JRockit 28.3.14
Oracle / JRockit
|
cpe:/a:oracle:jrockit:28.3.14
|
28.3.14 | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
F5 Enterprise Manager
F5
|
cpe:/a:f5:enterprise_manager:-
|
— | |
|
Open Source CentOS
Open Source
|
cpe:/o:centos:centos:-
|
— | |
|
Xerox FreeFlow Print Server
Xerox / FreeFlow Print Server
|
cpe:/a:xerox:freeflow_print_server:-
|
— |
Affected products
Known affected
14 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Oracle Java SE Embedded 8u131
Oracle / Java SE Embedded
|
cpe:/a:oracle:java_se_embedded:8u131
|
8u131 | |
|
Oracle Java SE 8u131
Oracle / Java SE
|
cpe:/a:oracle:java_se:8u131
|
8u131 | |
|
Oracle Java SE 7u141
Oracle / Java SE
|
cpe:/a:oracle:java_se:7u141
|
7u141 | |
|
Xerox FreeFlow Print Server 9
Xerox / FreeFlow Print Server
|
cpe:/a:xerox:freeflow_print_server:9
|
9 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Java SE 6u151
Oracle / Java SE
|
cpe:/a:oracle:java_se:6u151
|
6u151 | |
|
Oracle JRockit 28.3.14
Oracle / JRockit
|
cpe:/a:oracle:jrockit:28.3.14
|
28.3.14 | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
F5 Enterprise Manager
F5
|
cpe:/a:f5:enterprise_manager:-
|
— | |
|
Open Source CentOS
Open Source
|
cpe:/o:centos:centos:-
|
— | |
|
Xerox FreeFlow Print Server
Xerox / FreeFlow Print Server
|
cpe:/a:xerox:freeflow_print_server:-
|
— |
Affected products
Known affected
14 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Oracle Java SE Embedded 8u131
Oracle / Java SE Embedded
|
cpe:/a:oracle:java_se_embedded:8u131
|
8u131 | |
|
Oracle Java SE 8u131
Oracle / Java SE
|
cpe:/a:oracle:java_se:8u131
|
8u131 | |
|
Oracle Java SE 7u141
Oracle / Java SE
|
cpe:/a:oracle:java_se:7u141
|
7u141 | |
|
Xerox FreeFlow Print Server 9
Xerox / FreeFlow Print Server
|
cpe:/a:xerox:freeflow_print_server:9
|
9 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Java SE 6u151
Oracle / Java SE
|
cpe:/a:oracle:java_se:6u151
|
6u151 | |
|
Oracle JRockit 28.3.14
Oracle / JRockit
|
cpe:/a:oracle:jrockit:28.3.14
|
28.3.14 | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
F5 Enterprise Manager
F5
|
cpe:/a:f5:enterprise_manager:-
|
— | |
|
Open Source CentOS
Open Source
|
cpe:/o:centos:centos:-
|
— | |
|
Xerox FreeFlow Print Server
Xerox / FreeFlow Print Server
|
cpe:/a:xerox:freeflow_print_server:-
|
— |
Affected products
Known affected
14 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Oracle Java SE Embedded 8u131
Oracle / Java SE Embedded
|
cpe:/a:oracle:java_se_embedded:8u131
|
8u131 | |
|
Oracle Java SE 8u131
Oracle / Java SE
|
cpe:/a:oracle:java_se:8u131
|
8u131 | |
|
Oracle Java SE 7u141
Oracle / Java SE
|
cpe:/a:oracle:java_se:7u141
|
7u141 | |
|
Xerox FreeFlow Print Server 9
Xerox / FreeFlow Print Server
|
cpe:/a:xerox:freeflow_print_server:9
|
9 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Java SE 6u151
Oracle / Java SE
|
cpe:/a:oracle:java_se:6u151
|
6u151 | |
|
Oracle JRockit 28.3.14
Oracle / JRockit
|
cpe:/a:oracle:jrockit:28.3.14
|
28.3.14 | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
F5 Enterprise Manager
F5
|
cpe:/a:f5:enterprise_manager:-
|
— | |
|
Open Source CentOS
Open Source
|
cpe:/o:centos:centos:-
|
— | |
|
Xerox FreeFlow Print Server
Xerox / FreeFlow Print Server
|
cpe:/a:xerox:freeflow_print_server:-
|
— |
Affected products
Known affected
14 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Oracle Java SE Embedded 8u131
Oracle / Java SE Embedded
|
cpe:/a:oracle:java_se_embedded:8u131
|
8u131 | |
|
Oracle Java SE 8u131
Oracle / Java SE
|
cpe:/a:oracle:java_se:8u131
|
8u131 | |
|
Oracle Java SE 7u141
Oracle / Java SE
|
cpe:/a:oracle:java_se:7u141
|
7u141 | |
|
Xerox FreeFlow Print Server 9
Xerox / FreeFlow Print Server
|
cpe:/a:xerox:freeflow_print_server:9
|
9 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Java SE 6u151
Oracle / Java SE
|
cpe:/a:oracle:java_se:6u151
|
6u151 | |
|
Oracle JRockit 28.3.14
Oracle / JRockit
|
cpe:/a:oracle:jrockit:28.3.14
|
28.3.14 | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
F5 Enterprise Manager
F5
|
cpe:/a:f5:enterprise_manager:-
|
— | |
|
Open Source CentOS
Open Source
|
cpe:/o:centos:centos:-
|
— | |
|
Xerox FreeFlow Print Server
Xerox / FreeFlow Print Server
|
cpe:/a:xerox:freeflow_print_server:-
|
— |
Affected products
Known affected
14 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Oracle Java SE Embedded 8u131
Oracle / Java SE Embedded
|
cpe:/a:oracle:java_se_embedded:8u131
|
8u131 | |
|
Oracle Java SE 8u131
Oracle / Java SE
|
cpe:/a:oracle:java_se:8u131
|
8u131 | |
|
Oracle Java SE 7u141
Oracle / Java SE
|
cpe:/a:oracle:java_se:7u141
|
7u141 | |
|
Xerox FreeFlow Print Server 9
Xerox / FreeFlow Print Server
|
cpe:/a:xerox:freeflow_print_server:9
|
9 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Java SE 6u151
Oracle / Java SE
|
cpe:/a:oracle:java_se:6u151
|
6u151 | |
|
Oracle JRockit 28.3.14
Oracle / JRockit
|
cpe:/a:oracle:jrockit:28.3.14
|
28.3.14 | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
F5 Enterprise Manager
F5
|
cpe:/a:f5:enterprise_manager:-
|
— | |
|
Open Source CentOS
Open Source
|
cpe:/o:centos:centos:-
|
— | |
|
Xerox FreeFlow Print Server
Xerox / FreeFlow Print Server
|
cpe:/a:xerox:freeflow_print_server:-
|
— |
Affected products
Known affected
14 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Oracle Java SE Embedded 8u131
Oracle / Java SE Embedded
|
cpe:/a:oracle:java_se_embedded:8u131
|
8u131 | |
|
Oracle Java SE 8u131
Oracle / Java SE
|
cpe:/a:oracle:java_se:8u131
|
8u131 | |
|
Oracle Java SE 7u141
Oracle / Java SE
|
cpe:/a:oracle:java_se:7u141
|
7u141 | |
|
Xerox FreeFlow Print Server 9
Xerox / FreeFlow Print Server
|
cpe:/a:xerox:freeflow_print_server:9
|
9 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Java SE 6u151
Oracle / Java SE
|
cpe:/a:oracle:java_se:6u151
|
6u151 | |
|
Oracle JRockit 28.3.14
Oracle / JRockit
|
cpe:/a:oracle:jrockit:28.3.14
|
28.3.14 | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
F5 Enterprise Manager
F5
|
cpe:/a:f5:enterprise_manager:-
|
— | |
|
Open Source CentOS
Open Source
|
cpe:/o:centos:centos:-
|
— | |
|
Xerox FreeFlow Print Server
Xerox / FreeFlow Print Server
|
cpe:/a:xerox:freeflow_print_server:-
|
— |
Affected products
Known affected
14 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Oracle Java SE Embedded 8u131
Oracle / Java SE Embedded
|
cpe:/a:oracle:java_se_embedded:8u131
|
8u131 | |
|
Oracle Java SE 8u131
Oracle / Java SE
|
cpe:/a:oracle:java_se:8u131
|
8u131 | |
|
Oracle Java SE 7u141
Oracle / Java SE
|
cpe:/a:oracle:java_se:7u141
|
7u141 | |
|
Xerox FreeFlow Print Server 9
Xerox / FreeFlow Print Server
|
cpe:/a:xerox:freeflow_print_server:9
|
9 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Java SE 6u151
Oracle / Java SE
|
cpe:/a:oracle:java_se:6u151
|
6u151 | |
|
Oracle JRockit 28.3.14
Oracle / JRockit
|
cpe:/a:oracle:jrockit:28.3.14
|
28.3.14 | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
F5 Enterprise Manager
F5
|
cpe:/a:f5:enterprise_manager:-
|
— | |
|
Open Source CentOS
Open Source
|
cpe:/o:centos:centos:-
|
— | |
|
Xerox FreeFlow Print Server
Xerox / FreeFlow Print Server
|
cpe:/a:xerox:freeflow_print_server:-
|
— |
Affected products
Known affected
14 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Oracle Java SE Embedded 8u131
Oracle / Java SE Embedded
|
cpe:/a:oracle:java_se_embedded:8u131
|
8u131 | |
|
Oracle Java SE 8u131
Oracle / Java SE
|
cpe:/a:oracle:java_se:8u131
|
8u131 | |
|
Oracle Java SE 7u141
Oracle / Java SE
|
cpe:/a:oracle:java_se:7u141
|
7u141 | |
|
Xerox FreeFlow Print Server 9
Xerox / FreeFlow Print Server
|
cpe:/a:xerox:freeflow_print_server:9
|
9 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Java SE 6u151
Oracle / Java SE
|
cpe:/a:oracle:java_se:6u151
|
6u151 | |
|
Oracle JRockit 28.3.14
Oracle / JRockit
|
cpe:/a:oracle:jrockit:28.3.14
|
28.3.14 | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
F5 Enterprise Manager
F5
|
cpe:/a:f5:enterprise_manager:-
|
— | |
|
Open Source CentOS
Open Source
|
cpe:/o:centos:centos:-
|
— | |
|
Xerox FreeFlow Print Server
Xerox / FreeFlow Print Server
|
cpe:/a:xerox:freeflow_print_server:-
|
— |
Affected products
Known affected
14 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Oracle Java SE Embedded 8u131
Oracle / Java SE Embedded
|
cpe:/a:oracle:java_se_embedded:8u131
|
8u131 | |
|
Oracle Java SE 8u131
Oracle / Java SE
|
cpe:/a:oracle:java_se:8u131
|
8u131 | |
|
Oracle Java SE 7u141
Oracle / Java SE
|
cpe:/a:oracle:java_se:7u141
|
7u141 | |
|
Xerox FreeFlow Print Server 9
Xerox / FreeFlow Print Server
|
cpe:/a:xerox:freeflow_print_server:9
|
9 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Java SE 6u151
Oracle / Java SE
|
cpe:/a:oracle:java_se:6u151
|
6u151 | |
|
Oracle JRockit 28.3.14
Oracle / JRockit
|
cpe:/a:oracle:jrockit:28.3.14
|
28.3.14 | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
F5 Enterprise Manager
F5
|
cpe:/a:f5:enterprise_manager:-
|
— | |
|
Open Source CentOS
Open Source
|
cpe:/o:centos:centos:-
|
— | |
|
Xerox FreeFlow Print Server
Xerox / FreeFlow Print Server
|
cpe:/a:xerox:freeflow_print_server:-
|
— |
Affected products
Known affected
14 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Oracle Java SE Embedded 8u131
Oracle / Java SE Embedded
|
cpe:/a:oracle:java_se_embedded:8u131
|
8u131 | |
|
Oracle Java SE 8u131
Oracle / Java SE
|
cpe:/a:oracle:java_se:8u131
|
8u131 | |
|
Oracle Java SE 7u141
Oracle / Java SE
|
cpe:/a:oracle:java_se:7u141
|
7u141 | |
|
Xerox FreeFlow Print Server 9
Xerox / FreeFlow Print Server
|
cpe:/a:xerox:freeflow_print_server:9
|
9 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Java SE 6u151
Oracle / Java SE
|
cpe:/a:oracle:java_se:6u151
|
6u151 | |
|
Oracle JRockit 28.3.14
Oracle / JRockit
|
cpe:/a:oracle:jrockit:28.3.14
|
28.3.14 | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
F5 Enterprise Manager
F5
|
cpe:/a:f5:enterprise_manager:-
|
— | |
|
Open Source CentOS
Open Source
|
cpe:/o:centos:centos:-
|
— | |
|
Xerox FreeFlow Print Server
Xerox / FreeFlow Print Server
|
cpe:/a:xerox:freeflow_print_server:-
|
— |
Affected products
Known affected
14 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Oracle Java SE Embedded 8u131
Oracle / Java SE Embedded
|
cpe:/a:oracle:java_se_embedded:8u131
|
8u131 | |
|
Oracle Java SE 8u131
Oracle / Java SE
|
cpe:/a:oracle:java_se:8u131
|
8u131 | |
|
Oracle Java SE 7u141
Oracle / Java SE
|
cpe:/a:oracle:java_se:7u141
|
7u141 | |
|
Xerox FreeFlow Print Server 9
Xerox / FreeFlow Print Server
|
cpe:/a:xerox:freeflow_print_server:9
|
9 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Java SE 6u151
Oracle / Java SE
|
cpe:/a:oracle:java_se:6u151
|
6u151 | |
|
Oracle JRockit 28.3.14
Oracle / JRockit
|
cpe:/a:oracle:jrockit:28.3.14
|
28.3.14 | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
F5 Enterprise Manager
F5
|
cpe:/a:f5:enterprise_manager:-
|
— | |
|
Open Source CentOS
Open Source
|
cpe:/o:centos:centos:-
|
— | |
|
Xerox FreeFlow Print Server
Xerox / FreeFlow Print Server
|
cpe:/a:xerox:freeflow_print_server:-
|
— |
Affected products
Known affected
14 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Oracle Java SE Embedded 8u131
Oracle / Java SE Embedded
|
cpe:/a:oracle:java_se_embedded:8u131
|
8u131 | |
|
Oracle Java SE 8u131
Oracle / Java SE
|
cpe:/a:oracle:java_se:8u131
|
8u131 | |
|
Oracle Java SE 7u141
Oracle / Java SE
|
cpe:/a:oracle:java_se:7u141
|
7u141 | |
|
Xerox FreeFlow Print Server 9
Xerox / FreeFlow Print Server
|
cpe:/a:xerox:freeflow_print_server:9
|
9 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Java SE 6u151
Oracle / Java SE
|
cpe:/a:oracle:java_se:6u151
|
6u151 | |
|
Oracle JRockit 28.3.14
Oracle / JRockit
|
cpe:/a:oracle:jrockit:28.3.14
|
28.3.14 | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
F5 Enterprise Manager
F5
|
cpe:/a:f5:enterprise_manager:-
|
— | |
|
Open Source CentOS
Open Source
|
cpe:/o:centos:centos:-
|
— | |
|
Xerox FreeFlow Print Server
Xerox / FreeFlow Print Server
|
cpe:/a:xerox:freeflow_print_server:-
|
— |
Affected products
Known affected
14 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Oracle Java SE Embedded 8u131
Oracle / Java SE Embedded
|
cpe:/a:oracle:java_se_embedded:8u131
|
8u131 | |
|
Oracle Java SE 8u131
Oracle / Java SE
|
cpe:/a:oracle:java_se:8u131
|
8u131 | |
|
Oracle Java SE 7u141
Oracle / Java SE
|
cpe:/a:oracle:java_se:7u141
|
7u141 | |
|
Xerox FreeFlow Print Server 9
Xerox / FreeFlow Print Server
|
cpe:/a:xerox:freeflow_print_server:9
|
9 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Java SE 6u151
Oracle / Java SE
|
cpe:/a:oracle:java_se:6u151
|
6u151 | |
|
Oracle JRockit 28.3.14
Oracle / JRockit
|
cpe:/a:oracle:jrockit:28.3.14
|
28.3.14 | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
F5 Enterprise Manager
F5
|
cpe:/a:f5:enterprise_manager:-
|
— | |
|
Open Source CentOS
Open Source
|
cpe:/o:centos:centos:-
|
— | |
|
Xerox FreeFlow Print Server
Xerox / FreeFlow Print Server
|
cpe:/a:xerox:freeflow_print_server:-
|
— |
Affected products
Known affected
14 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Oracle Java SE Embedded 8u131
Oracle / Java SE Embedded
|
cpe:/a:oracle:java_se_embedded:8u131
|
8u131 | |
|
Oracle Java SE 8u131
Oracle / Java SE
|
cpe:/a:oracle:java_se:8u131
|
8u131 | |
|
Oracle Java SE 7u141
Oracle / Java SE
|
cpe:/a:oracle:java_se:7u141
|
7u141 | |
|
Xerox FreeFlow Print Server 9
Xerox / FreeFlow Print Server
|
cpe:/a:xerox:freeflow_print_server:9
|
9 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Java SE 6u151
Oracle / Java SE
|
cpe:/a:oracle:java_se:6u151
|
6u151 | |
|
Oracle JRockit 28.3.14
Oracle / JRockit
|
cpe:/a:oracle:jrockit:28.3.14
|
28.3.14 | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
F5 Enterprise Manager
F5
|
cpe:/a:f5:enterprise_manager:-
|
— | |
|
Open Source CentOS
Open Source
|
cpe:/o:centos:centos:-
|
— | |
|
Xerox FreeFlow Print Server
Xerox / FreeFlow Print Server
|
cpe:/a:xerox:freeflow_print_server:-
|
— |
Affected products
Known affected
14 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Oracle Java SE Embedded 8u131
Oracle / Java SE Embedded
|
cpe:/a:oracle:java_se_embedded:8u131
|
8u131 | |
|
Oracle Java SE 8u131
Oracle / Java SE
|
cpe:/a:oracle:java_se:8u131
|
8u131 | |
|
Oracle Java SE 7u141
Oracle / Java SE
|
cpe:/a:oracle:java_se:7u141
|
7u141 | |
|
Xerox FreeFlow Print Server 9
Xerox / FreeFlow Print Server
|
cpe:/a:xerox:freeflow_print_server:9
|
9 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Java SE 6u151
Oracle / Java SE
|
cpe:/a:oracle:java_se:6u151
|
6u151 | |
|
Oracle JRockit 28.3.14
Oracle / JRockit
|
cpe:/a:oracle:jrockit:28.3.14
|
28.3.14 | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
F5 Enterprise Manager
F5
|
cpe:/a:f5:enterprise_manager:-
|
— | |
|
Open Source CentOS
Open Source
|
cpe:/o:centos:centos:-
|
— | |
|
Xerox FreeFlow Print Server
Xerox / FreeFlow Print Server
|
cpe:/a:xerox:freeflow_print_server:-
|
— |
Affected products
Known affected
14 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Oracle Java SE Embedded 8u131
Oracle / Java SE Embedded
|
cpe:/a:oracle:java_se_embedded:8u131
|
8u131 | |
|
Oracle Java SE 8u131
Oracle / Java SE
|
cpe:/a:oracle:java_se:8u131
|
8u131 | |
|
Oracle Java SE 7u141
Oracle / Java SE
|
cpe:/a:oracle:java_se:7u141
|
7u141 | |
|
Xerox FreeFlow Print Server 9
Xerox / FreeFlow Print Server
|
cpe:/a:xerox:freeflow_print_server:9
|
9 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Java SE 6u151
Oracle / Java SE
|
cpe:/a:oracle:java_se:6u151
|
6u151 | |
|
Oracle JRockit 28.3.14
Oracle / JRockit
|
cpe:/a:oracle:jrockit:28.3.14
|
28.3.14 | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
F5 Enterprise Manager
F5
|
cpe:/a:f5:enterprise_manager:-
|
— | |
|
Open Source CentOS
Open Source
|
cpe:/o:centos:centos:-
|
— | |
|
Xerox FreeFlow Print Server
Xerox / FreeFlow Print Server
|
cpe:/a:xerox:freeflow_print_server:-
|
— |
References
45 references
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Die Java Platform, Standard Edition (SE) ist eine Sammlung von Java-APIs (JDK) und der Java Laufzeit Umgebung (JRE).\r\nJava Standard Edition (SE) Embedded ist die Laufzeitumgebung f\u00fcr die Java-Plattform des US-Unternehmens Oracle Corporation f\u00fcr Embedded Systems.\r\nOracle JRockit JVM ist eine leistungsf\u00e4hige Java Virtual Machine, die in Oracle Fusion Middleware enthalten ist.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Oracle Java SE, Oracle Java SE Embedded und Oracle JRockit ausnutzen,um Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden.",
"title": "Angriff"
},
{
"category": "general",
"text": "- F5 Networks\n- Linux\n- UNIX\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2025-1210 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2017/wid-sec-w-2025-1210.json"
},
{
"category": "self",
"summary": "WID-SEC-2025-1210 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1210"
},
{
"category": "external",
"summary": "Oracle Critical Patch Update Advisory - July 2017 - Appendix - Oracle Java SE vom 2017-07-18",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html#AppendixJAVA"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2017:1792 vom 2017-07-20",
"url": "https://access.redhat.com/errata/RHSA-2017:1792"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2017:1791 vom 2017-07-20",
"url": "https://access.redhat.com/errata/RHSA-2017:1791"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2017:1790 vom 2017-07-20",
"url": "https://access.redhat.com/errata/RHSA-2017:1790"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2017:1789 vom 2017-07-20",
"url": "https://access.redhat.com/errata/RHSA-2017:1789"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2017-1789 vom 2017-07-21",
"url": "http://linux.oracle.com/errata/ELSA-2017-1789.html"
},
{
"category": "external",
"summary": "CentOS-announce CESA-2017:1789 vom 2017-07-23",
"url": "https://lists.centos.org/pipermail/centos-announce/2017-July/022508.html"
},
{
"category": "external",
"summary": "CentOS-announce CESA-2017:1789 vom 2017-07-23",
"url": "https://lists.centos.org/pipermail/centos-announce/2017-July/022509.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-3919-1 vom 2017-07-25",
"url": "https://lists.debian.org/debian-security-announce/2017/msg00181.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-3366-1 vom 2017-07-27",
"url": "http://www.ubuntu.com/usn/usn-3366-1/"
},
{
"category": "external",
"summary": "Xerox Security Bulletin XRX17-018 vom 2017-08-02",
"url": "https://security.business.xerox.com/wp-content/uploads/2017/08/cert_XRX17-018_FFPS2-1_Standalone_Aug2017-1.pdf"
},
{
"category": "external",
"summary": "RedHat Security Advisory RHSA-2017:2424",
"url": "https://access.redhat.com/errata/RHSA-2017:2424"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2017-2424 vom 2017-08-09",
"url": "http://linux.oracle.com/errata/ELSA-2017-2424.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2017:2469 vom 2017-08-14",
"url": "https://access.redhat.com/errata/RHSA-2017:2469"
},
{
"category": "external",
"summary": "Xerox Security Bulletin XRX17-020",
"url": "https://security.business.xerox.com/wp-content/uploads/2017/08/cert_XRX17-020_FFPSv8_UpdateManager_Aug2017-1.pdf"
},
{
"category": "external",
"summary": "Xerox Security Bulletin XRX17-019",
"url": "https://security.business.xerox.com/wp-content/uploads/2017/08/cert_XRX17-019_FFPSv8_MediaDelivery_Aug2017-1.pdf"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2017:2481 vom 2017-08-16",
"url": "https://access.redhat.com/errata/RHSA-2017:2481"
},
{
"category": "external",
"summary": "CentOS-announce CESA-2017:2424 vom 2017-08-15",
"url": "https://lists.centos.org/pipermail/centos-announce/2017-August/022517.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2017:2175-1 vom 2017-08-16",
"url": "https://www.suse.com/de-de/support/update/announcement/2017/suse-su-20172175-1/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-3396-1 vom 2017-08-18",
"url": "http://www.ubuntu.com/usn/usn-3396-1/"
},
{
"category": "external",
"summary": "Xerox Security Bulletin XRX17-022 vom 2017-08-18",
"url": "https://security.business.xerox.com/wp-content/uploads/2017/08/cert_XRX17-022_FFPSv7_v9_UpdateManager_Aug2017.pdf"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2017:2530 vom 2017-08-23",
"url": "https://access.redhat.com/errata/RHSA-2017:2530"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2017:2263-1 vom 2017-08-25",
"url": "https://www.suse.com/support/update/announcement/2017/suse-su-20172263-1.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-3954 vom 2017-08-26",
"url": "https://www.debian.org/security/2017/dsa-3954"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2017:2280-1 vom 2017-08-29",
"url": "https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00069.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2017:2281-1 vom 2017-08-29",
"url": "https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00070.html"
},
{
"category": "external",
"summary": "F5 Security Advisory K91024405 vom 2017-10-12",
"url": "https://support.f5.com/csp/article/K91024405"
},
{
"category": "external",
"summary": "F5 Security Advisory K52342540 vom 2017-10-12",
"url": "https://support.f5.com/csp/article/K52342540"
},
{
"category": "external",
"summary": "F5 Security Advisory K11936401 vom 2017-10-12",
"url": "https://support.f5.com/csp/article/K11936401"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-4005 vom 2017-10-21",
"url": "https://www.debian.org/security/2017/dsa-4005"
},
{
"category": "external",
"summary": "F5 Security Advisory K35104614 vom 2017-11-01",
"url": "https://support.f5.com/csp/article/K35104614"
},
{
"category": "external",
"summary": "F5 Security Advisory K04734043 vom 2017-11-13",
"url": "https://support.f5.com/csp/article/K04734043"
},
{
"category": "external",
"summary": "F5 Security Advisory K23489380 vom 2017-11-13",
"url": "https://support.f5.com/csp/article/K23489380"
},
{
"category": "external",
"summary": "F5 Security Advisory K05911127 vom 2017-11-16",
"url": "https://support.f5.com/csp/article/K05911127"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2017:3392 vom 2017-12-06",
"url": "https://access.redhat.com/errata/RHSA-2017:3392"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2017-3392 vom 2017-12-07",
"url": "http://linux.oracle.com/errata/ELSA-2017-3392.html"
},
{
"category": "external",
"summary": "CentOS-announce CESA-2017:3392 vom 2017-12-06",
"url": "https://lists.centos.org/pipermail/centos-announce/2017-December/022688.html"
},
{
"category": "external",
"summary": "CentOS-announce CESA-2017:3392 vom 2017-12-06",
"url": "https://lists.centos.org/pipermail/centos-announce/2017-December/022689.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2017:3453 vom 2017-12-13",
"url": "https://access.redhat.com/errata/RHSA-2017:3453"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:0005-1 vom 2018-01-04",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180005-1.html"
},
{
"category": "external",
"summary": "NetApp Security Advisory NTAP-20170720-0001 vom 2018-01-19",
"url": "https://security.netapp.com/advisory/ntap-20170720-0001/"
},
{
"category": "external",
"summary": "F5 Security Advisory K28418435 vom 2018-03-10",
"url": "https://support.f5.com/csp/article/K28418435"
},
{
"category": "external",
"summary": "XEROX Security Advisory XRX25-012 vom 2025-06-02",
"url": "https://security.business.xerox.com/wp-content/uploads/2025/06/Xerox-Security-Bulletin-XRX25-012-for-Xerox-FreeFlow-Print-Server-v9.pdf"
}
],
"source_lang": "en-US",
"title": "Oracle Java SE: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2025-06-02T22:00:00.000+00:00",
"generator": {
"date": "2025-06-03T09:23:34.409+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.12"
}
},
"id": "WID-SEC-W-2025-1210",
"initial_release_date": "2017-07-18T22:00:00.000+00:00",
"revision_history": [
{
"date": "2017-07-18T22:00:00.000+00:00",
"number": "1",
"summary": "Initial Release"
},
{
"date": "2017-07-18T22:00:00.000+00:00",
"number": "2",
"summary": "Version nicht vorhanden"
},
{
"date": "2017-07-20T22:00:00.000+00:00",
"number": "3",
"summary": "New remediations available"
},
{
"date": "2017-07-25T22:00:00.000+00:00",
"number": "4",
"summary": "New remediations available"
},
{
"date": "2017-07-25T22:00:00.000+00:00",
"number": "5",
"summary": "Version nicht vorhanden"
},
{
"date": "2017-07-26T22:00:00.000+00:00",
"number": "6",
"summary": "New remediations available"
},
{
"date": "2017-08-06T22:00:00.000+00:00",
"number": "7",
"summary": "New remediations available"
},
{
"date": "2017-08-06T22:00:00.000+00:00",
"number": "8",
"summary": "Version nicht vorhanden"
},
{
"date": "2017-08-07T22:00:00.000+00:00",
"number": "9",
"summary": "New remediations available"
},
{
"date": "2017-08-09T22:00:00.000+00:00",
"number": "10",
"summary": "New remediations available"
},
{
"date": "2017-08-14T22:00:00.000+00:00",
"number": "11",
"summary": "New remediations available"
},
{
"date": "2017-08-14T22:00:00.000+00:00",
"number": "12",
"summary": "New remediations available"
},
{
"date": "2017-08-14T22:00:00.000+00:00",
"number": "13",
"summary": "New remediations available"
},
{
"date": "2017-08-15T22:00:00.000+00:00",
"number": "14",
"summary": "New remediations available"
},
{
"date": "2017-08-15T22:00:00.000+00:00",
"number": "15",
"summary": "New remediations available"
},
{
"date": "2017-08-16T22:00:00.000+00:00",
"number": "16",
"summary": "New remediations available"
},
{
"date": "2017-08-17T22:00:00.000+00:00",
"number": "17",
"summary": "New remediations available"
},
{
"date": "2017-08-22T22:00:00.000+00:00",
"number": "18",
"summary": "New remediations available"
},
{
"date": "2017-08-22T22:00:00.000+00:00",
"number": "19",
"summary": "Version nicht vorhanden"
},
{
"date": "2017-08-23T22:00:00.000+00:00",
"number": "20",
"summary": "New remediations available"
},
{
"date": "2017-08-27T22:00:00.000+00:00",
"number": "21",
"summary": "New remediations available"
},
{
"date": "2017-08-28T22:00:00.000+00:00",
"number": "22",
"summary": "New remediations available"
},
{
"date": "2017-08-28T22:00:00.000+00:00",
"number": "23",
"summary": "Version nicht vorhanden"
},
{
"date": "2017-08-28T22:00:00.000+00:00",
"number": "24",
"summary": "Version nicht vorhanden"
},
{
"date": "2017-10-22T22:00:00.000+00:00",
"number": "25",
"summary": "New remediations available"
},
{
"date": "2017-10-22T22:00:00.000+00:00",
"number": "26",
"summary": "Version nicht vorhanden"
},
{
"date": "2017-11-13T23:00:00.000+00:00",
"number": "27",
"summary": "New remediations available"
},
{
"date": "2017-11-15T23:00:00.000+00:00",
"number": "28",
"summary": "New remediations available"
},
{
"date": "2017-12-06T23:00:00.000+00:00",
"number": "29",
"summary": "New remediations available"
},
{
"date": "2017-12-06T23:00:00.000+00:00",
"number": "30",
"summary": "New remediations available"
},
{
"date": "2017-12-06T23:00:00.000+00:00",
"number": "31",
"summary": "Version nicht vorhanden"
},
{
"date": "2017-12-13T23:00:00.000+00:00",
"number": "32",
"summary": "New remediations available"
},
{
"date": "2018-01-03T23:00:00.000+00:00",
"number": "33",
"summary": "New remediations available"
},
{
"date": "2018-01-21T23:00:00.000+00:00",
"number": "34",
"summary": "New remediations available"
},
{
"date": "2018-03-11T23:00:00.000+00:00",
"number": "35",
"summary": "New remediations available"
},
{
"date": "2025-06-02T22:00:00.000+00:00",
"number": "36",
"summary": "Neue Updates von XEROX aufgenommen"
}
],
"status": "final",
"version": "36"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Debian Linux",
"product": {
"name": "Debian Linux",
"product_id": "2951",
"product_identification_helper": {
"cpe": "cpe:/o:debian:debian_linux:-"
}
}
}
],
"category": "vendor",
"name": "Debian"
},
{
"branches": [
{
"category": "product_name",
"name": "F5 Enterprise Manager",
"product": {
"name": "F5 Enterprise Manager",
"product_id": "T000125",
"product_identification_helper": {
"cpe": "cpe:/a:f5:enterprise_manager:-"
}
}
}
],
"category": "vendor",
"name": "F5"
},
{
"branches": [
{
"category": "product_name",
"name": "Open Source CentOS",
"product": {
"name": "Open Source CentOS",
"product_id": "1727",
"product_identification_helper": {
"cpe": "cpe:/o:centos:centos:-"
}
}
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "28.3.14",
"product": {
"name": "Oracle JRockit 28.3.14",
"product_id": "T010382",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:jrockit:28.3.14"
}
}
}
],
"category": "product_name",
"name": "JRockit"
},
{
"branches": [
{
"category": "product_version",
"name": "6u151",
"product": {
"name": "Oracle Java SE 6u151",
"product_id": "T010371",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:java_se:6u151"
}
}
},
{
"category": "product_version",
"name": "7u141",
"product": {
"name": "Oracle Java SE 7u141",
"product_id": "T010373",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:java_se:7u141"
}
}
},
{
"category": "product_version",
"name": "8u131",
"product": {
"name": "Oracle Java SE 8u131",
"product_id": "T010374",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:java_se:8u131"
}
}
}
],
"category": "product_name",
"name": "Java SE"
},
{
"branches": [
{
"category": "product_version",
"name": "8u131",
"product": {
"name": "Oracle Java SE Embedded 8u131",
"product_id": "T010379",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:java_se_embedded:8u131"
}
}
}
],
"category": "product_name",
"name": "Java SE Embedded"
},
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
},
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "9",
"product": {
"name": "Xerox FreeFlow Print Server 9",
"product_id": "T002977",
"product_identification_helper": {
"cpe": "cpe:/a:xerox:freeflow_print_server:9"
}
}
},
{
"category": "product_name",
"name": "Xerox FreeFlow Print Server",
"product": {
"name": "Xerox FreeFlow Print Server",
"product_id": "T010509",
"product_identification_helper": {
"cpe": "cpe:/a:xerox:freeflow_print_server:-"
}
}
}
],
"category": "product_name",
"name": "FreeFlow Print Server"
}
],
"category": "vendor",
"name": "Xerox"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-10053",
"product_status": {
"known_affected": [
"67646",
"T010379",
"T010374",
"T010373",
"T002977",
"T004914",
"T010371",
"T010382",
"2951",
"T002207",
"T000126",
"T000125",
"1727",
"T010509"
]
},
"release_date": "2017-07-18T22:00:00.000+00:00",
"title": "CVE-2017-10053"
},
{
"cve": "CVE-2017-10067",
"product_status": {
"known_affected": [
"67646",
"T010379",
"T010374",
"T010373",
"T002977",
"T004914",
"T010371",
"T010382",
"2951",
"T002207",
"T000126",
"T000125",
"1727",
"T010509"
]
},
"release_date": "2017-07-18T22:00:00.000+00:00",
"title": "CVE-2017-10067"
},
{
"cve": "CVE-2017-10074",
"product_status": {
"known_affected": [
"67646",
"T010379",
"T010374",
"T010373",
"T002977",
"T004914",
"T010371",
"T010382",
"2951",
"T002207",
"T000126",
"T000125",
"1727",
"T010509"
]
},
"release_date": "2017-07-18T22:00:00.000+00:00",
"title": "CVE-2017-10074"
},
{
"cve": "CVE-2017-10078",
"product_status": {
"known_affected": [
"67646",
"T010379",
"T010374",
"T010373",
"T002977",
"T004914",
"T010371",
"T010382",
"2951",
"T002207",
"T000126",
"T000125",
"1727",
"T010509"
]
},
"release_date": "2017-07-18T22:00:00.000+00:00",
"title": "CVE-2017-10078"
},
{
"cve": "CVE-2017-10081",
"product_status": {
"known_affected": [
"67646",
"T010379",
"T010374",
"T010373",
"T002977",
"T004914",
"T010371",
"T010382",
"2951",
"T002207",
"T000126",
"T000125",
"1727",
"T010509"
]
},
"release_date": "2017-07-18T22:00:00.000+00:00",
"title": "CVE-2017-10081"
},
{
"cve": "CVE-2017-10086",
"product_status": {
"known_affected": [
"67646",
"T010379",
"T010374",
"T010373",
"T002977",
"T004914",
"T010371",
"T010382",
"2951",
"T002207",
"T000126",
"T000125",
"1727",
"T010509"
]
},
"release_date": "2017-07-18T22:00:00.000+00:00",
"title": "CVE-2017-10086"
},
{
"cve": "CVE-2017-10087",
"product_status": {
"known_affected": [
"67646",
"T010379",
"T010374",
"T010373",
"T002977",
"T004914",
"T010371",
"T010382",
"2951",
"T002207",
"T000126",
"T000125",
"1727",
"T010509"
]
},
"release_date": "2017-07-18T22:00:00.000+00:00",
"title": "CVE-2017-10087"
},
{
"cve": "CVE-2017-10089",
"product_status": {
"known_affected": [
"67646",
"T010379",
"T010374",
"T010373",
"T002977",
"T004914",
"T010371",
"T010382",
"2951",
"T002207",
"T000126",
"T000125",
"1727",
"T010509"
]
},
"release_date": "2017-07-18T22:00:00.000+00:00",
"title": "CVE-2017-10089"
},
{
"cve": "CVE-2017-10090",
"product_status": {
"known_affected": [
"67646",
"T010379",
"T010374",
"T010373",
"T002977",
"T004914",
"T010371",
"T010382",
"2951",
"T002207",
"T000126",
"T000125",
"1727",
"T010509"
]
},
"release_date": "2017-07-18T22:00:00.000+00:00",
"title": "CVE-2017-10090"
},
{
"cve": "CVE-2017-10096",
"product_status": {
"known_affected": [
"67646",
"T010379",
"T010374",
"T010373",
"T002977",
"T004914",
"T010371",
"T010382",
"2951",
"T002207",
"T000126",
"T000125",
"1727",
"T010509"
]
},
"release_date": "2017-07-18T22:00:00.000+00:00",
"title": "CVE-2017-10096"
},
{
"cve": "CVE-2017-10101",
"product_status": {
"known_affected": [
"67646",
"T010379",
"T010374",
"T010373",
"T002977",
"T004914",
"T010371",
"T010382",
"2951",
"T002207",
"T000126",
"T000125",
"1727",
"T010509"
]
},
"release_date": "2017-07-18T22:00:00.000+00:00",
"title": "CVE-2017-10101"
},
{
"cve": "CVE-2017-10102",
"product_status": {
"known_affected": [
"67646",
"T010379",
"T010374",
"T010373",
"T002977",
"T004914",
"T010371",
"T010382",
"2951",
"T002207",
"T000126",
"T000125",
"1727",
"T010509"
]
},
"release_date": "2017-07-18T22:00:00.000+00:00",
"title": "CVE-2017-10102"
},
{
"cve": "CVE-2017-10104",
"product_status": {
"known_affected": [
"67646",
"T010379",
"T010374",
"T010373",
"T002977",
"T004914",
"T010371",
"T010382",
"2951",
"T002207",
"T000126",
"T000125",
"1727",
"T010509"
]
},
"release_date": "2017-07-18T22:00:00.000+00:00",
"title": "CVE-2017-10104"
},
{
"cve": "CVE-2017-10105",
"product_status": {
"known_affected": [
"67646",
"T010379",
"T010374",
"T010373",
"T002977",
"T004914",
"T010371",
"T010382",
"2951",
"T002207",
"T000126",
"T000125",
"1727",
"T010509"
]
},
"release_date": "2017-07-18T22:00:00.000+00:00",
"title": "CVE-2017-10105"
},
{
"cve": "CVE-2017-10107",
"product_status": {
"known_affected": [
"67646",
"T010379",
"T010374",
"T010373",
"T002977",
"T004914",
"T010371",
"T010382",
"2951",
"T002207",
"T000126",
"T000125",
"1727",
"T010509"
]
},
"release_date": "2017-07-18T22:00:00.000+00:00",
"title": "CVE-2017-10107"
},
{
"cve": "CVE-2017-10108",
"product_status": {
"known_affected": [
"67646",
"T010379",
"T010374",
"T010373",
"T002977",
"T004914",
"T010371",
"T010382",
"2951",
"T002207",
"T000126",
"T000125",
"1727",
"T010509"
]
},
"release_date": "2017-07-18T22:00:00.000+00:00",
"title": "CVE-2017-10108"
},
{
"cve": "CVE-2017-10109",
"product_status": {
"known_affected": [
"67646",
"T010379",
"T010374",
"T010373",
"T002977",
"T004914",
"T010371",
"T010382",
"2951",
"T002207",
"T000126",
"T000125",
"1727",
"T010509"
]
},
"release_date": "2017-07-18T22:00:00.000+00:00",
"title": "CVE-2017-10109"
},
{
"cve": "CVE-2017-10110",
"product_status": {
"known_affected": [
"67646",
"T010379",
"T010374",
"T010373",
"T002977",
"T004914",
"T010371",
"T010382",
"2951",
"T002207",
"T000126",
"T000125",
"1727",
"T010509"
]
},
"release_date": "2017-07-18T22:00:00.000+00:00",
"title": "CVE-2017-10110"
},
{
"cve": "CVE-2017-10111",
"product_status": {
"known_affected": [
"67646",
"T010379",
"T010374",
"T010373",
"T002977",
"T004914",
"T010371",
"T010382",
"2951",
"T002207",
"T000126",
"T000125",
"1727",
"T010509"
]
},
"release_date": "2017-07-18T22:00:00.000+00:00",
"title": "CVE-2017-10111"
},
{
"cve": "CVE-2017-10114",
"product_status": {
"known_affected": [
"67646",
"T010379",
"T010374",
"T010373",
"T002977",
"T004914",
"T010371",
"T010382",
"2951",
"T002207",
"T000126",
"T000125",
"1727",
"T010509"
]
},
"release_date": "2017-07-18T22:00:00.000+00:00",
"title": "CVE-2017-10114"
},
{
"cve": "CVE-2017-10115",
"product_status": {
"known_affected": [
"67646",
"T010379",
"T010374",
"T010373",
"T002977",
"T004914",
"T010371",
"T010382",
"2951",
"T002207",
"T000126",
"T000125",
"1727",
"T010509"
]
},
"release_date": "2017-07-18T22:00:00.000+00:00",
"title": "CVE-2017-10115"
},
{
"cve": "CVE-2017-10116",
"product_status": {
"known_affected": [
"67646",
"T010379",
"T010374",
"T010373",
"T002977",
"T004914",
"T010371",
"T010382",
"2951",
"T002207",
"T000126",
"T000125",
"1727",
"T010509"
]
},
"release_date": "2017-07-18T22:00:00.000+00:00",
"title": "CVE-2017-10116"
},
{
"cve": "CVE-2017-10117",
"product_status": {
"known_affected": [
"67646",
"T010379",
"T010374",
"T010373",
"T002977",
"T004914",
"T010371",
"T010382",
"2951",
"T002207",
"T000126",
"T000125",
"1727",
"T010509"
]
},
"release_date": "2017-07-18T22:00:00.000+00:00",
"title": "CVE-2017-10117"
},
{
"cve": "CVE-2017-10118",
"product_status": {
"known_affected": [
"67646",
"T010379",
"T010374",
"T010373",
"T002977",
"T004914",
"T010371",
"T010382",
"2951",
"T002207",
"T000126",
"T000125",
"1727",
"T010509"
]
},
"release_date": "2017-07-18T22:00:00.000+00:00",
"title": "CVE-2017-10118"
},
{
"cve": "CVE-2017-10121",
"product_status": {
"known_affected": [
"67646",
"T010379",
"T010374",
"T010373",
"T002977",
"T004914",
"T010371",
"T010382",
"2951",
"T002207",
"T000126",
"T000125",
"1727",
"T010509"
]
},
"release_date": "2017-07-18T22:00:00.000+00:00",
"title": "CVE-2017-10121"
},
{
"cve": "CVE-2017-10125",
"product_status": {
"known_affected": [
"67646",
"T010379",
"T010374",
"T010373",
"T002977",
"T004914",
"T010371",
"T010382",
"2951",
"T002207",
"T000126",
"T000125",
"1727",
"T010509"
]
},
"release_date": "2017-07-18T22:00:00.000+00:00",
"title": "CVE-2017-10125"
},
{
"cve": "CVE-2017-10135",
"product_status": {
"known_affected": [
"67646",
"T010379",
"T010374",
"T010373",
"T002977",
"T004914",
"T010371",
"T010382",
"2951",
"T002207",
"T000126",
"T000125",
"1727",
"T010509"
]
},
"release_date": "2017-07-18T22:00:00.000+00:00",
"title": "CVE-2017-10135"
},
{
"cve": "CVE-2017-10145",
"product_status": {
"known_affected": [
"67646",
"T010379",
"T010374",
"T010373",
"T002977",
"T004914",
"T010371",
"T010382",
"2951",
"T002207",
"T000126",
"T000125",
"1727",
"T010509"
]
},
"release_date": "2017-07-18T22:00:00.000+00:00",
"title": "CVE-2017-10145"
},
{
"cve": "CVE-2017-10176",
"product_status": {
"known_affected": [
"67646",
"T010379",
"T010374",
"T010373",
"T002977",
"T004914",
"T010371",
"T010382",
"2951",
"T002207",
"T000126",
"T000125",
"1727",
"T010509"
]
},
"release_date": "2017-07-18T22:00:00.000+00:00",
"title": "CVE-2017-10176"
},
{
"cve": "CVE-2017-10193",
"product_status": {
"known_affected": [
"67646",
"T010379",
"T010374",
"T010373",
"T002977",
"T004914",
"T010371",
"T010382",
"2951",
"T002207",
"T000126",
"T000125",
"1727",
"T010509"
]
},
"release_date": "2017-07-18T22:00:00.000+00:00",
"title": "CVE-2017-10193"
},
{
"cve": "CVE-2017-10198",
"product_status": {
"known_affected": [
"67646",
"T010379",
"T010374",
"T010373",
"T002977",
"T004914",
"T010371",
"T010382",
"2951",
"T002207",
"T000126",
"T000125",
"1727",
"T010509"
]
},
"release_date": "2017-07-18T22:00:00.000+00:00",
"title": "CVE-2017-10198"
},
{
"cve": "CVE-2017-10243",
"product_status": {
"known_affected": [
"67646",
"T010379",
"T010374",
"T010373",
"T002977",
"T004914",
"T010371",
"T010382",
"2951",
"T002207",
"T000126",
"T000125",
"1727",
"T010509"
]
},
"release_date": "2017-07-18T22:00:00.000+00:00",
"title": "CVE-2017-10243"
}
]
}
Loading…
Trend slope:
-
(linear fit over daily sighting counts)
Show additional events:
Loading…
Experimental. This forecast is provided for visualization only and may change without notice. Do not use it for operational decisions.
Forecast uses a logistic model when the trend is rising, or an exponential decay model when the trend is falling. Fitted via linearized least squares.
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…