CVE-2013-2380
Published Apr 17, 2013
Last updated 11 years ago
Overview
- Description
- Unspecified vulnerability in the Oracle JRockit component in Oracle Fusion Middleware R27.7.4 and earlier and R28.2.6 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: this might be a duplicate of CVE-2013-1537 and CVE-2013-2415. If so, then CVE-2013-2380 might be REJECTed in the future.
- Source
- secalert_us@oracle.com
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 10
- Impact score
- 10
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- NVD-CWE-noinfo
Evaluator
- Comment
- 1.Oracle released a Java SE Critical Patch Update on April 16, 2013 to address multiple vulnerabilities affecting the Java Runtime Environment. Oracle CVE-2013-2380 refers to the advisories that are applicable to JRockit from the Java SE Critical Patch Update. The CVSS score of this vulnerability CVE# reflects the highest among those fixed in JRockit. The complete list of all vulnerabilities addressed in JRockit under CVE-2013-2380 is as follows: CVE-2013-1537 and CVE-2013-2415.
- Impact
- -
- Solution
- -
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:fusion_middleware:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1828F4F0-FB4B-4E19-9F6D-77E7D017A21D" }, { "criteria": "cpe:2.3:a:oracle:jrockit:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "53150C54-F2BB-491C-A8C8-AD4C74BD07C7", "versionEndIncluding": "r27.4" }, { "criteria": "cpe:2.3:a:oracle:jrockit:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "67958DB2-50AD-4F2A-91AB-CC8623DD7935", "versionEndIncluding": "r28.2.6" }, { "criteria": "cpe:2.3:a:oracle:jrockit:r27.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4873B9FF-0BA4-45AE-834A-C23AE80A2B48" }, { "criteria": "cpe:2.3:a:oracle:jrockit:r27.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "39274558-2ECB-43CE-BAEF-DBD3AAC1BD05" }, { "criteria": "cpe:2.3:a:oracle:jrockit:r27.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "72DA7B82-EC3B-4458-B040-6F9D1AE23DDE" }, { "criteria": "cpe:2.3:a:oracle:jrockit:r27.3.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "267F16DF-D868-4DD9-8670-01AC3CBCE716" }, { "criteria": "cpe:2.3:a:oracle:jrockit:r28.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BF4A3CEE-CA1A-4381-9C2A-86A08552ECB1" }, { "criteria": "cpe:2.3:a:oracle:jrockit:r28.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4953F74A-EA08-414B-9A5F-0DE7B05C6E4B" }, { "criteria": "cpe:2.3:a:oracle:jrockit:r28.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5E573D88-D435-4BE0-A439-A6ABE7C990CD" }, { "criteria": "cpe:2.3:a:oracle:jrockit:r28.1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5774E87C-9F38-4DB9-9F4F-B88D37BE622C" }, { "criteria": "cpe:2.3:a:oracle:jrockit:r28.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "95746A03-C190-409B-9F3F-F3F7F6B3D419" }, { "criteria": "cpe:2.3:a:oracle:jrockit:r28.1.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CDCC0C38-1660-40BF-8708-B0FDF43069FE" }, { "criteria": "cpe:2.3:a:oracle:jrockit:r28.1.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "723DE1EC-F44A-4362-B885-835784FA7B56" } ], "operator": "OR" } ] } ]