CVE-2012-1723
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
16/06/2012
Last modified:
22/10/2025
Description
Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, 6 update 32 and earlier, 5 update 35 and earlier, and 1.4.2_37 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Hotspot.
Impact
Base Score 3.x
9.80
Severity 3.x
CRITICAL
Base Score 2.0
10.00
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:oracle:jdk:*:*:*:*:*:*:*:* | 1.4.2_37 (including) | |
| cpe:2.3:a:oracle:jdk:1.5.0:-:*:*:*:*:*:* | ||
| cpe:2.3:a:oracle:jdk:1.5.0:update1:*:*:*:*:*:* | ||
| cpe:2.3:a:oracle:jdk:1.5.0:update10:*:*:*:*:*:* | ||
| cpe:2.3:a:oracle:jdk:1.5.0:update11:*:*:*:*:*:* | ||
| cpe:2.3:a:oracle:jdk:1.5.0:update12:*:*:*:*:*:* | ||
| cpe:2.3:a:oracle:jdk:1.5.0:update13:*:*:*:*:*:* | ||
| cpe:2.3:a:oracle:jdk:1.5.0:update14:*:*:*:*:*:* | ||
| cpe:2.3:a:oracle:jdk:1.5.0:update15:*:*:*:*:*:* | ||
| cpe:2.3:a:oracle:jdk:1.5.0:update16:*:*:*:*:*:* | ||
| cpe:2.3:a:oracle:jdk:1.5.0:update17:*:*:*:*:*:* | ||
| cpe:2.3:a:oracle:jdk:1.5.0:update18:*:*:*:*:*:* | ||
| cpe:2.3:a:oracle:jdk:1.5.0:update19:*:*:*:*:*:* | ||
| cpe:2.3:a:oracle:jdk:1.5.0:update2:*:*:*:*:*:* | ||
| cpe:2.3:a:oracle:jdk:1.5.0:update20:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://mail.openjdk.java.net/pipermail/distro-pkg-dev/2012-June/019076.html
- http://marc.info/?l=bugtraq&m=134496371727681&w=2
- http://marc.info/?l=bugtraq&m=134496371727681&w=2
- http://marc.info/?l=bugtraq&m=134496371727681&w=2
- http://marc.info/?l=bugtraq&m=134496371727681&w=2
- http://marc.info/?l=bugtraq&m=134496371727681&w=2
- http://marc.info/?l=bugtraq&m=134496371727681&w=2
- http://marc.info/?l=bugtraq&m=134496371727681&w=2
- http://marc.info/?l=bugtraq&m=134496371727681&w=2
- http://marc.info/?l=bugtraq&m=134496371727681&w=2
- http://marc.info/?l=bugtraq&m=134496371727681&w=2
- http://marc.info/?l=bugtraq&m=134496371727681&w=2
- http://marc.info/?l=bugtraq&m=134496371727681&w=2
- http://marc.info/?l=bugtraq&m=134496371727681&w=2
- http://marc.info/?l=bugtraq&m=134496371727681&w=2
- http://marc.info/?l=bugtraq&m=134496371727681&w=2
- http://marc.info/?l=bugtraq&m=134496371727681&w=2
- http://marc.info/?l=bugtraq&m=134496371727681&w=2
- http://marc.info/?l=bugtraq&m=134496371727681&w=2
- http://marc.info/?l=bugtraq&m=134496371727681&w=2
- http://marc.info/?l=bugtraq&m=134496371727681&w=2
- http://marc.info/?l=bugtraq&m=134496371727681&w=2
- http://marc.info/?l=bugtraq&m=134496371727681&w=2
- http://marc.info/?l=bugtraq&m=134496371727681&w=2
- http://marc.info/?l=bugtraq&m=134496371727681&w=2
- http://marc.info/?l=bugtraq&m=134496371727681&w=2
- http://marc.info/?l=bugtraq&m=134496371727681&w=2
- http://marc.info/?l=bugtraq&m=134496371727681&w=2
- http://marc.info/?l=bugtraq&m=134496371727681&w=2
- http://marc.info/?l=bugtraq&m=134496371727681&w=2
- http://marc.info/?l=bugtraq&m=134496371727681&w=2
- http://marc.info/?l=bugtraq&m=134496371727681&w=2
- http://marc.info/?l=bugtraq&m=134496371727681&w=2
- http://rhn.redhat.com/errata/RHSA-2012-0734.html
- http://secunia.com/advisories/51080
- http://security.gentoo.org/glsa/glsa-201406-32.xml
- http://www.ibm.com/support/docview.wss?uid=swg21615246
- http://www.mandriva.com/security/advisories?name=MDVSA-2012%3A095
- http://www.oracle.com/technetwork/topics/security/javacpujun2012-1515912.html
- http://www.securityfocus.com/bid/53960
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16259
- http://mail.openjdk.java.net/pipermail/distro-pkg-dev/2012-June/019076.html
- http://marc.info/?l=bugtraq&m=134496371727681&w=2
- http://marc.info/?l=bugtraq&m=134496371727681&w=2
- http://marc.info/?l=bugtraq&m=134496371727681&w=2
- http://marc.info/?l=bugtraq&m=134496371727681&w=2
- http://marc.info/?l=bugtraq&m=134496371727681&w=2
- http://marc.info/?l=bugtraq&m=134496371727681&w=2
- http://marc.info/?l=bugtraq&m=134496371727681&w=2
- http://marc.info/?l=bugtraq&m=134496371727681&w=2
- http://marc.info/?l=bugtraq&m=134496371727681&w=2
- http://marc.info/?l=bugtraq&m=134496371727681&w=2
- http://marc.info/?l=bugtraq&m=134496371727681&w=2
- http://marc.info/?l=bugtraq&m=134496371727681&w=2
- http://marc.info/?l=bugtraq&m=134496371727681&w=2
- http://marc.info/?l=bugtraq&m=134496371727681&w=2
- http://marc.info/?l=bugtraq&m=134496371727681&w=2
- http://marc.info/?l=bugtraq&m=134496371727681&w=2
- http://marc.info/?l=bugtraq&m=134496371727681&w=2
- http://marc.info/?l=bugtraq&m=134496371727681&w=2
- http://marc.info/?l=bugtraq&m=134496371727681&w=2
- http://marc.info/?l=bugtraq&m=134496371727681&w=2
- http://marc.info/?l=bugtraq&m=134496371727681&w=2
- http://marc.info/?l=bugtraq&m=134496371727681&w=2
- http://marc.info/?l=bugtraq&m=134496371727681&w=2
- http://marc.info/?l=bugtraq&m=134496371727681&w=2
- http://marc.info/?l=bugtraq&m=134496371727681&w=2
- http://marc.info/?l=bugtraq&m=134496371727681&w=2
- http://marc.info/?l=bugtraq&m=134496371727681&w=2
- http://marc.info/?l=bugtraq&m=134496371727681&w=2
- http://marc.info/?l=bugtraq&m=134496371727681&w=2
- http://marc.info/?l=bugtraq&m=134496371727681&w=2
- http://marc.info/?l=bugtraq&m=134496371727681&w=2
- http://marc.info/?l=bugtraq&m=134496371727681&w=2
- http://rhn.redhat.com/errata/RHSA-2012-0734.html
- http://secunia.com/advisories/51080
- http://security.gentoo.org/glsa/glsa-201406-32.xml
- http://www.ibm.com/support/docview.wss?uid=swg21615246
- http://www.mandriva.com/security/advisories?name=MDVSA-2012%3A095
- http://www.oracle.com/technetwork/topics/security/javacpujun2012-1515912.html
- http://www.securityfocus.com/bid/53960
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16259
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2012-1723



