{"api_version":"1","generated_at":"2026-04-23T06:08:02+00:00","cve":"CVE-2012-0507","urls":{"html":"https://cve.report/CVE-2012-0507","api":"https://cve.report/api/cve/CVE-2012-0507.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2012-0507","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2012-0507"},"summary":{"title":"CVE-2012-0507","description":"Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, and 5.0 Update 33 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Concurrency.  NOTE: the previous information was obtained from the February 2012 Oracle CPU. Oracle has not commented on claims from a downstream vendor and third party researchers that this issue occurs because the AtomicReferenceArray class implementation does not ensure that the array is of the Object[] type, which allows attackers to cause a denial of service (JVM crash) or bypass Java sandbox restrictions.  NOTE: this issue was originally mapped to CVE-2011-3571, but that identifier was already assigned to a different issue.","state":"PUBLISHED","assigner":"oracle","published_at":"2012-06-07 22:55:17","updated_at":"2026-04-22 13:21:21"},"problem_types":["NVD-CWE-noinfo","CWE-843","n/a","CWE-843 CWE-843 Access of Resource Using Incompatible Type ('Type Confusion')"],"metrics":[{"version":"3.1","source":"ADP","type":"DECLARED","score":"9.8","severity":"CRITICAL","vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","data":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":9.8,"baseSeverity":"CRITICAL","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","version":"3.1"}},{"version":"3.1","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","score":"9.8","severity":"CRITICAL","vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"}},{"version":"2.0","source":"nvd@nist.gov","type":"Primary","score":"10","severity":"","vector":"AV:N/AC:L/Au:N/C:C/I:C/A:C","data":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"}}],"references":[{"url":"http://marc.info/?l=bugtraq&m=133365109612558&w=2","name":"http://marc.info/?l=bugtraq&m=133365109612558&w=2","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"],"title":"'[security bulletin] HPSBUX02760 SSRT100805 rev.1 - HP-UX Running Java, Remote Unauthorized Access, D' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html","name":"http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Issue Tracking","Third Party Advisory"],"title":"[security-announce] SUSE-SU-2012:0602-1: important: Security update for","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=133847939902305&w=2","name":"http://marc.info/?l=bugtraq&m=133847939902305&w=2","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"],"title":"'[security bulletin] HPSBUX02784 SSRT100871 rev.1 - HP-UX Running Java, Remote Unauthorized Access, D' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html","name":"http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"Oracle Java Critical Patch Update - February 2012","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://blogs.technet.com/b/mmpc/archive/2012/03/20/an-interesting-case-of-jre-sandbox-breach-cve-2012-0507.aspx","name":"http://blogs.technet.com/b/mmpc/archive/2012/03/20/an-interesting-case-of-jre-sandbox-breach-cve-2012-0507.aspx","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link","Third Party Advisory"],"title":"404 - Content Not Found | Microsoft Docs","mime":"text/html","httpstatus":"404","archivestatus":"404"},{"url":"http://weblog.ikvm.net/PermaLink.aspx?guid=cd48169a-9405-4f63-9087-798c4a1866d3","name":"http://weblog.ikvm.net/PermaLink.aspx?guid=cd48169a-9405-4f63-9087-798c4a1866d3","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link","Exploit"],"title":"IKVM.NET Weblog - February 2012 Java Critical Patch Update Vulnerability Details","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://krebsonsecurity.com/2012/03/new-java-attack-rolled-into-exploit-packs/","name":"http://krebsonsecurity.com/2012/03/new-java-attack-rolled-into-exploit-packs/","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"],"title":"New Java Attack Rolled into Exploit Packs —  Krebs on Security","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://rhn.redhat.com/errata/RHSA-2013-1455.html","name":"http://rhn.redhat.com/errata/RHSA-2013-1455.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"],"title":"Red Hat Customer Portal","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=133364885411663&w=2","name":"http://marc.info/?l=bugtraq&m=133364885411663&w=2","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"],"title":"'[security bulletin] HPSBUX02757 SSRT100779 rev.2 - HP-UX Running Java, Remote Unauthorized Access, D' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/48692","name":"http://secunia.com/advisories/48692","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link","Not Applicable"],"title":"About Secunia Research | Flexera","mime":"text/plain","httpstatus":"200","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=134254866602253&w=2","name":"http://marc.info/?l=bugtraq&m=134254866602253&w=2","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"],"title":"'[security bulletin] HPSBMU02799 SSRT100867 rev.1 - HP Network Node Manager i (NNMi) v9.0x Running JD' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/48950","name":"http://secunia.com/advisories/48950","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link","Not Applicable"],"title":"Security Advisory SA48950 - Red Hat update for java-1.6.0-ibm - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=788994","name":"https://bugzilla.redhat.com/show_bug.cgi?id=788994","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Issue Tracking"],"title":"Bug 788994 – CVE-2012-0507 OpenJDK: AtomicReferenceArray insufficient array type check (Concurrency, 7082299)","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00010.html","name":"http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00010.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"],"title":"[security-announce] SUSE-SU-2012:0603-1: important: Security update for","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://rhn.redhat.com/errata/RHSA-2012-0514.html","name":"http://rhn.redhat.com/errata/RHSA-2012-0514.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"],"title":"Red Hat Customer Portal","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"http://www.securityfocus.com/bid/52161","name":"http://www.securityfocus.com/bid/52161","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link","Exploit","Third Party Advisory","VDB Entry"],"title":"Oracle Java SE Remote Java Runtime Environment Code Execution Vulnerability","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2012-0507","name":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2012-0507","refsource":"134c704f-9b21-4f2e-91b3-4a467353bcc0","tags":["US Government Resource"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"http://secunia.com/advisories/48948","name":"http://secunia.com/advisories/48948","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link","Not Applicable"],"title":"About Secunia Research | Flexera","mime":"text/plain","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/48589","name":"http://secunia.com/advisories/48589","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link","Not Applicable"],"title":"About Secunia Research | Flexera","mime":"text/plain","httpstatus":"200","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=134254957702612&w=2","name":"http://marc.info/?l=bugtraq&m=134254957702612&w=2","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"],"title":"'[security bulletin] HPSBMU02797 SSRT100867 rev.1 - HP Network Node Manager i (NNMi) v9.1x Running JD' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://rhn.redhat.com/errata/RHSA-2012-0508.html","name":"http://rhn.redhat.com/errata/RHSA-2012-0508.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"],"title":"Red Hat Customer Portal","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"http://secunia.com/advisories/48915","name":"http://secunia.com/advisories/48915","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link","Not Applicable"],"title":"About Secunia Research | Flexera","mime":"text/plain","httpstatus":"200","archivestatus":"200"},{"url":"http://www.debian.org/security/2012/dsa-2420","name":"http://www.debian.org/security/2012/dsa-2420","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"],"title":"Debian -- Security Information -- DSA-2420-1 openjdk-6","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2012-0507","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2012-0507","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"n/a","product":"n/a","version":"affected n/a","platforms":[]}],"timeline":[{"source":"ADP","time":"2022-03-03T00:00:00.000Z","lang":"en","value":"CVE-2012-0507 added to CISA KEV"}],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2012","cve_id":"507","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"6.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2012","cve_id":"507","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"7.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2012","cve_id":"507","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"oracle","cpe5":"jre","cpe6":"1.6.0","cpe7":"update22","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2012","cve_id":"507","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"oracle","cpe5":"jre","cpe6":"1.6.0","cpe7":"update23","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2012","cve_id":"507","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"oracle","cpe5":"jre","cpe6":"1.6.0","cpe7":"update24","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2012","cve_id":"507","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"oracle","cpe5":"jre","cpe6":"1.6.0","cpe7":"update25","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2012","cve_id":"507","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"oracle","cpe5":"jre","cpe6":"1.6.0","cpe7":"update26","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2012","cve_id":"507","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"oracle","cpe5":"jre","cpe6":"1.6.0","cpe7":"update27","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2012","cve_id":"507","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"oracle","cpe5":"jre","cpe6":"1.6.0","cpe7":"update29","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2012","cve_id":"507","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"oracle","cpe5":"jre","cpe6":"1.6.0","cpe7":"update30","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2012","cve_id":"507","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"oracle","cpe5":"jre","cpe6":"1.7.0","cpe7":"-","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2012","cve_id":"507","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"oracle","cpe5":"jre","cpe6":"1.7.0","cpe7":"update1","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2012","cve_id":"507","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"oracle","cpe5":"jre","cpe6":"1.7.0","cpe7":"update2","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2012","cve_id":"507","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"sun","cpe5":"jre","cpe6":"1.5.0","cpe7":"-","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2012","cve_id":"507","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"sun","cpe5":"jre","cpe6":"1.5.0","cpe7":"update1","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2012","cve_id":"507","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"sun","cpe5":"jre","cpe6":"1.5.0","cpe7":"update10","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2012","cve_id":"507","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"sun","cpe5":"jre","cpe6":"1.5.0","cpe7":"update11","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2012","cve_id":"507","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"sun","cpe5":"jre","cpe6":"1.5.0","cpe7":"update12","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2012","cve_id":"507","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"sun","cpe5":"jre","cpe6":"1.5.0","cpe7":"update13","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2012","cve_id":"507","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"sun","cpe5":"jre","cpe6":"1.5.0","cpe7":"update14","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2012","cve_id":"507","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"sun","cpe5":"jre","cpe6":"1.5.0","cpe7":"update15","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2012","cve_id":"507","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"sun","cpe5":"jre","cpe6":"1.5.0","cpe7":"update16","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2012","cve_id":"507","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"sun","cpe5":"jre","cpe6":"1.5.0","cpe7":"update17","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2012","cve_id":"507","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"sun","cpe5":"jre","cpe6":"1.5.0","cpe7":"update18","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2012","cve_id":"507","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"sun","cpe5":"jre","cpe6":"1.5.0","cpe7":"update19","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2012","cve_id":"507","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"sun","cpe5":"jre","cpe6":"1.5.0","cpe7":"update2","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2012","cve_id":"507","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"sun","cpe5":"jre","cpe6":"1.5.0","cpe7":"update20","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2012","cve_id":"507","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"sun","cpe5":"jre","cpe6":"1.5.0","cpe7":"update21","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2012","cve_id":"507","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"sun","cpe5":"jre","cpe6":"1.5.0","cpe7":"update22","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2012","cve_id":"507","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"sun","cpe5":"jre","cpe6":"1.5.0","cpe7":"update23","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2012","cve_id":"507","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"sun","cpe5":"jre","cpe6":"1.5.0","cpe7":"update24","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2012","cve_id":"507","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"sun","cpe5":"jre","cpe6":"1.5.0","cpe7":"update25","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2012","cve_id":"507","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"sun","cpe5":"jre","cpe6":"1.5.0","cpe7":"update26","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2012","cve_id":"507","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"sun","cpe5":"jre","cpe6":"1.5.0","cpe7":"update27","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2012","cve_id":"507","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"sun","cpe5":"jre","cpe6":"1.5.0","cpe7":"update28","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2012","cve_id":"507","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"sun","cpe5":"jre","cpe6":"1.5.0","cpe7":"update29","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2012","cve_id":"507","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"sun","cpe5":"jre","cpe6":"1.5.0","cpe7":"update3","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2012","cve_id":"507","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"sun","cpe5":"jre","cpe6":"1.5.0","cpe7":"update31","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2012","cve_id":"507","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"sun","cpe5":"jre","cpe6":"1.5.0","cpe7":"update33","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2012","cve_id":"507","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"sun","cpe5":"jre","cpe6":"1.5.0","cpe7":"update4","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2012","cve_id":"507","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"sun","cpe5":"jre","cpe6":"1.5.0","cpe7":"update5","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2012","cve_id":"507","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"sun","cpe5":"jre","cpe6":"1.5.0","cpe7":"update6","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2012","cve_id":"507","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"sun","cpe5":"jre","cpe6":"1.5.0","cpe7":"update7","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2012","cve_id":"507","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"sun","cpe5":"jre","cpe6":"1.5.0","cpe7":"update8","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2012","cve_id":"507","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"sun","cpe5":"jre","cpe6":"1.5.0","cpe7":"update9","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2012","cve_id":"507","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"sun","cpe5":"jre","cpe6":"1.6.0","cpe7":"-","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2012","cve_id":"507","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"sun","cpe5":"jre","cpe6":"1.6.0","cpe7":"update_1","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2012","cve_id":"507","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"sun","cpe5":"jre","cpe6":"1.6.0","cpe7":"update_10","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2012","cve_id":"507","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"sun","cpe5":"jre","cpe6":"1.6.0","cpe7":"update_11","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2012","cve_id":"507","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"sun","cpe5":"jre","cpe6":"1.6.0","cpe7":"update_12","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2012","cve_id":"507","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"sun","cpe5":"jre","cpe6":"1.6.0","cpe7":"update_13","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2012","cve_id":"507","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"sun","cpe5":"jre","cpe6":"1.6.0","cpe7":"update_14","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2012","cve_id":"507","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"sun","cpe5":"jre","cpe6":"1.6.0","cpe7":"update_15","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2012","cve_id":"507","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"sun","cpe5":"jre","cpe6":"1.6.0","cpe7":"update_16","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2012","cve_id":"507","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"sun","cpe5":"jre","cpe6":"1.6.0","cpe7":"update_17","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2012","cve_id":"507","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"sun","cpe5":"jre","cpe6":"1.6.0","cpe7":"update_18","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2012","cve_id":"507","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"sun","cpe5":"jre","cpe6":"1.6.0","cpe7":"update_19","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2012","cve_id":"507","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"sun","cpe5":"jre","cpe6":"1.6.0","cpe7":"update_2","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2012","cve_id":"507","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"sun","cpe5":"jre","cpe6":"1.6.0","cpe7":"update_20","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2012","cve_id":"507","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"sun","cpe5":"jre","cpe6":"1.6.0","cpe7":"update_21","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2012","cve_id":"507","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"sun","cpe5":"jre","cpe6":"1.6.0","cpe7":"update_3","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2012","cve_id":"507","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"sun","cpe5":"jre","cpe6":"1.6.0","cpe7":"update_4","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2012","cve_id":"507","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"sun","cpe5":"jre","cpe6":"1.6.0","cpe7":"update_5","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2012","cve_id":"507","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"sun","cpe5":"jre","cpe6":"1.6.0","cpe7":"update_6","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2012","cve_id":"507","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"sun","cpe5":"jre","cpe6":"1.6.0","cpe7":"update_7","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2012","cve_id":"507","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"suse","cpe5":"linux_enterprise_desktop","cpe6":"10","cpe7":"sp4","cpe8":"*","cpe9":"*","cpe10":"-","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2012","cve_id":"507","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"suse","cpe5":"linux_enterprise_java","cpe6":"10","cpe7":"sp4","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2012","cve_id":"507","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"suse","cpe5":"linux_enterprise_java","cpe6":"11","cpe7":"sp1","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2012","cve_id":"507","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"suse","cpe5":"linux_enterprise_server","cpe6":"10","cpe7":"sp4","cpe8":"*","cpe9":"*","cpe10":"-","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2012","cve_id":"507","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"suse","cpe5":"linux_enterprise_server","cpe6":"11","cpe7":"sp1","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"-","cpe12":"*","cpe13":"*"},{"cve_year":"2012","cve_id":"507","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"suse","cpe5":"linux_enterprise_server","cpe6":"11","cpe7":"sp1","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"vmware","cpe12":"*","cpe13":"*"},{"cve_year":"2012","cve_id":"507","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"suse","cpe5":"linux_enterprise_server","cpe6":"11","cpe7":"sp2","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"-","cpe12":"*","cpe13":"*"},{"cve_year":"2012","cve_id":"507","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"suse","cpe5":"linux_enterprise_software_development_kit","cpe6":"11","cpe7":"sp1","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2012","cve_id":"507","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"suse","cpe5":"linux_enterprise_software_development_kit","cpe6":"11","cpe7":"sp2","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":{"cve_year":"2012","cve_id":"507","cve":"CVE-2012-0507","vendorProject":"Oracle","product":"Java SE","vulnerabilityName":"Oracle Java SE Runtime Environment (JRE) Arbitrary Code Execution Vulnerability","dateAdded":"2022-03-03","shortDescription":"An incorrect type vulnerability exists in the Concurrency component of Oracle's Java Runtime Environment allows an attacker to remotely execute arbitrary code.","requiredAction":"Apply updates per vendor instructions.","dueDate":"2022-03-24","knownRansomwareCampaignUse":"Known","notes":"https://nvd.nist.gov/vuln/detail/CVE-2012-0507","cwes":"","catalogVersion":"2026.04.22","updated_at":"2026-04-22 20:03:11"},"epss":{"cve_year":"2012","cve_id":"507","cve":"CVE-2012-0507","epss":"0.935680000","percentile":"0.998340000","score_date":"2026-04-22","updated_at":"2026-04-23 00:03:15"},"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"providerMetadata":{"dateUpdated":"2024-08-06T18:23:31.104Z","orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE"},"references":[{"name":"HPSBUX02784","tags":["vendor-advisory","x_refsource_HP","x_transferred"],"url":"http://marc.info/?l=bugtraq&m=133847939902305&w=2"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html"},{"name":"48692","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/48692"},{"name":"HPSBMU02799","tags":["vendor-advisory","x_refsource_HP","x_transferred"],"url":"http://marc.info/?l=bugtraq&m=134254866602253&w=2"},{"tags":["x_refsource_MISC","x_transferred"],"url":"http://krebsonsecurity.com/2012/03/new-java-attack-rolled-into-exploit-packs/"},{"name":"48589","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/48589"},{"name":"SSRT100805","tags":["vendor-advisory","x_refsource_HP","x_transferred"],"url":"http://marc.info/?l=bugtraq&m=133365109612558&w=2"},{"tags":["x_refsource_MISC","x_transferred"],"url":"http://weblog.ikvm.net/PermaLink.aspx?guid=cd48169a-9405-4f63-9087-798c4a1866d3"},{"name":"SUSE-SU-2012:0602","tags":["vendor-advisory","x_refsource_SUSE","x_transferred"],"url":"http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html"},{"name":"RHSA-2013:1455","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"],"url":"http://rhn.redhat.com/errata/RHSA-2013-1455.html"},{"name":"SUSE-SU-2012:0603","tags":["vendor-advisory","x_refsource_SUSE","x_transferred"],"url":"http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00010.html"},{"name":"48950","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/48950"},{"name":"48948","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/48948"},{"tags":["x_refsource_MISC","x_transferred"],"url":"http://blogs.technet.com/b/mmpc/archive/2012/03/20/an-interesting-case-of-jre-sandbox-breach-cve-2012-0507.aspx"},{"name":"SSRT100871","tags":["vendor-advisory","x_refsource_HP","x_transferred"],"url":"http://marc.info/?l=bugtraq&m=133847939902305&w=2"},{"name":"48915","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/48915"},{"name":"HPSBUX02757","tags":["vendor-advisory","x_refsource_HP","x_transferred"],"url":"http://marc.info/?l=bugtraq&m=133364885411663&w=2"},{"name":"DSA-2420","tags":["vendor-advisory","x_refsource_DEBIAN","x_transferred"],"url":"http://www.debian.org/security/2012/dsa-2420"},{"name":"RHSA-2012:0508","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"],"url":"http://rhn.redhat.com/errata/RHSA-2012-0508.html"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=788994"},{"name":"SSRT100867","tags":["vendor-advisory","x_refsource_HP","x_transferred"],"url":"http://marc.info/?l=bugtraq&m=134254957702612&w=2"},{"name":"RHSA-2012:0514","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"],"url":"http://rhn.redhat.com/errata/RHSA-2012-0514.html"},{"name":"52161","tags":["vdb-entry","x_refsource_BID","x_transferred"],"url":"http://www.securityfocus.com/bid/52161"},{"name":"HPSBUX02760","tags":["vendor-advisory","x_refsource_HP","x_transferred"],"url":"http://marc.info/?l=bugtraq&m=133365109612558&w=2"},{"name":"SSRT100779","tags":["vendor-advisory","x_refsource_HP","x_transferred"],"url":"http://marc.info/?l=bugtraq&m=133364885411663&w=2"},{"name":"HPSBMU02797","tags":["vendor-advisory","x_refsource_HP","x_transferred"],"url":"http://marc.info/?l=bugtraq&m=134254957702612&w=2"}],"title":"CVE Program Container"},{"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":9.8,"baseSeverity":"CRITICAL","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","version":"3.1"}},{"other":{"content":{"id":"CVE-2012-0507","options":[{"Exploitation":"active"},{"Automatable":"yes"},{"Technical Impact":"total"}],"role":"CISA Coordinator","timestamp":"2025-02-10T19:54:57.403498Z","version":"2.0.3"},"type":"ssvc"}},{"other":{"content":{"dateAdded":"2022-03-03","reference":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2012-0507"},"type":"kev"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-843","description":"CWE-843 Access of Resource Using Incompatible Type ('Type Confusion')","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2025-10-22T00:05:47.423Z","orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP"},"references":[{"tags":["government-resource"],"url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2012-0507"}],"timeline":[{"lang":"en","time":"2022-03-03T00:00:00.000Z","value":"CVE-2012-0507 added to CISA KEV"}],"title":"CISA ADP Vulnrichment"}],"cna":{"affected":[{"product":"n/a","vendor":"n/a","versions":[{"status":"affected","version":"n/a"}]}],"datePublic":"2012-02-14T00:00:00.000Z","descriptions":[{"lang":"en","value":"Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, and 5.0 Update 33 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Concurrency.  NOTE: the previous information was obtained from the February 2012 Oracle CPU. Oracle has not commented on claims from a downstream vendor and third party researchers that this issue occurs because the AtomicReferenceArray class implementation does not ensure that the array is of the Object[] type, which allows attackers to cause a denial of service (JVM crash) or bypass Java sandbox restrictions.  NOTE: this issue was originally mapped to CVE-2011-3571, but that identifier was already assigned to a different issue."}],"problemTypes":[{"descriptions":[{"description":"n/a","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2017-12-28T20:57:01.000Z","orgId":"43595867-4340-4103-b7a2-9a5208d29a85","shortName":"oracle"},"references":[{"name":"HPSBUX02784","tags":["vendor-advisory","x_refsource_HP"],"url":"http://marc.info/?l=bugtraq&m=133847939902305&w=2"},{"tags":["x_refsource_CONFIRM"],"url":"http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html"},{"name":"48692","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/48692"},{"name":"HPSBMU02799","tags":["vendor-advisory","x_refsource_HP"],"url":"http://marc.info/?l=bugtraq&m=134254866602253&w=2"},{"tags":["x_refsource_MISC"],"url":"http://krebsonsecurity.com/2012/03/new-java-attack-rolled-into-exploit-packs/"},{"name":"48589","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/48589"},{"name":"SSRT100805","tags":["vendor-advisory","x_refsource_HP"],"url":"http://marc.info/?l=bugtraq&m=133365109612558&w=2"},{"tags":["x_refsource_MISC"],"url":"http://weblog.ikvm.net/PermaLink.aspx?guid=cd48169a-9405-4f63-9087-798c4a1866d3"},{"name":"SUSE-SU-2012:0602","tags":["vendor-advisory","x_refsource_SUSE"],"url":"http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html"},{"name":"RHSA-2013:1455","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"http://rhn.redhat.com/errata/RHSA-2013-1455.html"},{"name":"SUSE-SU-2012:0603","tags":["vendor-advisory","x_refsource_SUSE"],"url":"http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00010.html"},{"name":"48950","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/48950"},{"name":"48948","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/48948"},{"tags":["x_refsource_MISC"],"url":"http://blogs.technet.com/b/mmpc/archive/2012/03/20/an-interesting-case-of-jre-sandbox-breach-cve-2012-0507.aspx"},{"name":"SSRT100871","tags":["vendor-advisory","x_refsource_HP"],"url":"http://marc.info/?l=bugtraq&m=133847939902305&w=2"},{"name":"48915","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/48915"},{"name":"HPSBUX02757","tags":["vendor-advisory","x_refsource_HP"],"url":"http://marc.info/?l=bugtraq&m=133364885411663&w=2"},{"name":"DSA-2420","tags":["vendor-advisory","x_refsource_DEBIAN"],"url":"http://www.debian.org/security/2012/dsa-2420"},{"name":"RHSA-2012:0508","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"http://rhn.redhat.com/errata/RHSA-2012-0508.html"},{"tags":["x_refsource_CONFIRM"],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=788994"},{"name":"SSRT100867","tags":["vendor-advisory","x_refsource_HP"],"url":"http://marc.info/?l=bugtraq&m=134254957702612&w=2"},{"name":"RHSA-2012:0514","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"http://rhn.redhat.com/errata/RHSA-2012-0514.html"},{"name":"52161","tags":["vdb-entry","x_refsource_BID"],"url":"http://www.securityfocus.com/bid/52161"},{"name":"HPSBUX02760","tags":["vendor-advisory","x_refsource_HP"],"url":"http://marc.info/?l=bugtraq&m=133365109612558&w=2"},{"name":"SSRT100779","tags":["vendor-advisory","x_refsource_HP"],"url":"http://marc.info/?l=bugtraq&m=133364885411663&w=2"},{"name":"HPSBMU02797","tags":["vendor-advisory","x_refsource_HP"],"url":"http://marc.info/?l=bugtraq&m=134254957702612&w=2"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"secalert_us@oracle.com","ID":"CVE-2012-0507","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, and 5.0 Update 33 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Concurrency.  NOTE: the previous information was obtained from the February 2012 Oracle CPU. Oracle has not commented on claims from a downstream vendor and third party researchers that this issue occurs because the AtomicReferenceArray class implementation does not ensure that the array is of the Object[] type, which allows attackers to cause a denial of service (JVM crash) or bypass Java sandbox restrictions.  NOTE: this issue was originally mapped to CVE-2011-3571, but that identifier was already assigned to a different issue."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"HPSBUX02784","refsource":"HP","url":"http://marc.info/?l=bugtraq&m=133847939902305&w=2"},{"name":"http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html","refsource":"CONFIRM","url":"http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html"},{"name":"48692","refsource":"SECUNIA","url":"http://secunia.com/advisories/48692"},{"name":"HPSBMU02799","refsource":"HP","url":"http://marc.info/?l=bugtraq&m=134254866602253&w=2"},{"name":"http://krebsonsecurity.com/2012/03/new-java-attack-rolled-into-exploit-packs/","refsource":"MISC","url":"http://krebsonsecurity.com/2012/03/new-java-attack-rolled-into-exploit-packs/"},{"name":"48589","refsource":"SECUNIA","url":"http://secunia.com/advisories/48589"},{"name":"SSRT100805","refsource":"HP","url":"http://marc.info/?l=bugtraq&m=133365109612558&w=2"},{"name":"http://weblog.ikvm.net/PermaLink.aspx?guid=cd48169a-9405-4f63-9087-798c4a1866d3","refsource":"MISC","url":"http://weblog.ikvm.net/PermaLink.aspx?guid=cd48169a-9405-4f63-9087-798c4a1866d3"},{"name":"SUSE-SU-2012:0602","refsource":"SUSE","url":"http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html"},{"name":"RHSA-2013:1455","refsource":"REDHAT","url":"http://rhn.redhat.com/errata/RHSA-2013-1455.html"},{"name":"SUSE-SU-2012:0603","refsource":"SUSE","url":"http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00010.html"},{"name":"48950","refsource":"SECUNIA","url":"http://secunia.com/advisories/48950"},{"name":"48948","refsource":"SECUNIA","url":"http://secunia.com/advisories/48948"},{"name":"http://blogs.technet.com/b/mmpc/archive/2012/03/20/an-interesting-case-of-jre-sandbox-breach-cve-2012-0507.aspx","refsource":"MISC","url":"http://blogs.technet.com/b/mmpc/archive/2012/03/20/an-interesting-case-of-jre-sandbox-breach-cve-2012-0507.aspx"},{"name":"SSRT100871","refsource":"HP","url":"http://marc.info/?l=bugtraq&m=133847939902305&w=2"},{"name":"48915","refsource":"SECUNIA","url":"http://secunia.com/advisories/48915"},{"name":"HPSBUX02757","refsource":"HP","url":"http://marc.info/?l=bugtraq&m=133364885411663&w=2"},{"name":"DSA-2420","refsource":"DEBIAN","url":"http://www.debian.org/security/2012/dsa-2420"},{"name":"RHSA-2012:0508","refsource":"REDHAT","url":"http://rhn.redhat.com/errata/RHSA-2012-0508.html"},{"name":"https://bugzilla.redhat.com/show_bug.cgi?id=788994","refsource":"CONFIRM","url":"https://bugzilla.redhat.com/show_bug.cgi?id=788994"},{"name":"SSRT100867","refsource":"HP","url":"http://marc.info/?l=bugtraq&m=134254957702612&w=2"},{"name":"RHSA-2012:0514","refsource":"REDHAT","url":"http://rhn.redhat.com/errata/RHSA-2012-0514.html"},{"name":"52161","refsource":"BID","url":"http://www.securityfocus.com/bid/52161"},{"name":"HPSBUX02760","refsource":"HP","url":"http://marc.info/?l=bugtraq&m=133365109612558&w=2"},{"name":"SSRT100779","refsource":"HP","url":"http://marc.info/?l=bugtraq&m=133364885411663&w=2"},{"name":"HPSBMU02797","refsource":"HP","url":"http://marc.info/?l=bugtraq&m=134254957702612&w=2"}]}}}},"cveMetadata":{"assignerOrgId":"43595867-4340-4103-b7a2-9a5208d29a85","assignerShortName":"oracle","cveId":"CVE-2012-0507","datePublished":"2012-06-07T22:00:00.000Z","dateReserved":"2012-01-11T00:00:00.000Z","dateUpdated":"2025-10-22T00:05:47.423Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"},"nvd":{"publishedDate":"2012-06-07 22:55:17","lastModifiedDate":"2026-04-22 13:21:21","problem_types":["NVD-CWE-noinfo","CWE-843","n/a","CWE-843 CWE-843 Access of Resource Using Incompatible Type ('Type Confusion')"],"metrics":{"cvssMetricV31":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10,"impactScore":10,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:sun:jre:1.5.0:-:*:*:*:*:*:*","matchCriteriaId":"5F0AD0F9-E797-4E16-95F3-C1AFDA557D78"},{"vulnerable":true,"criteria":"cpe:2.3:a:sun:jre:1.5.0:update1:*:*:*:*:*:*","matchCriteriaId":"A7FC09E8-7F30-4FE4-912E-588AA250E2A3"},{"vulnerable":true,"criteria":"cpe:2.3:a:sun:jre:1.5.0:update10:*:*:*:*:*:*","matchCriteriaId":"A586DE4E-8A46-41DE-9FDB-5FDB81DCC87B"},{"vulnerable":true,"criteria":"cpe:2.3:a:sun:jre:1.5.0:update11:*:*:*:*:*:*","matchCriteriaId":"9919D091-73D7-465A-80FF-F37D6CAF9F46"},{"vulnerable":true,"criteria":"cpe:2.3:a:sun:jre:1.5.0:update12:*:*:*:*:*:*","matchCriteriaId":"02565D6F-4CB2-4671-A4EF-3169BCFA6154"},{"vulnerable":true,"criteria":"cpe:2.3:a:sun:jre:1.5.0:update13:*:*:*:*:*:*","matchCriteriaId":"452A3E51-9EAC-451D-BA04-A1E7B7D917EB"},{"vulnerable":true,"criteria":"cpe:2.3:a:sun:jre:1.5.0:update14:*:*:*:*:*:*","matchCriteriaId":"3E8C6AAC-C90B-4220-A69B-2A886A35CF5D"},{"vulnerable":true,"criteria":"cpe:2.3:a:sun:jre:1.5.0:update15:*:*:*:*:*:*","matchCriteriaId":"55231B6B-9298-4363-9B5A-14C2DA7B1F50"},{"vulnerable":true,"criteria":"cpe:2.3:a:sun:jre:1.5.0:update16:*:*:*:*:*:*","matchCriteriaId":"E42CF0F7-418C-4BB6-9B73-FA3B9171D092"},{"vulnerable":true,"criteria":"cpe:2.3:a:sun:jre:1.5.0:update17:*:*:*:*:*:*","matchCriteriaId":"A5467E9D-07D8-4BEB-84D5-A3136C133519"},{"vulnerable":true,"criteria":"cpe:2.3:a:sun:jre:1.5.0:update18:*:*:*:*:*:*","matchCriteriaId":"B83B2CE1-45D7-47AD-BC0A-6EC74D5F8F5A"},{"vulnerable":true,"criteria":"cpe:2.3:a:sun:jre:1.5.0:update19:*:*:*:*:*:*","matchCriteriaId":"8A32F326-EA92-43CD-930E-E527B60CDD3B"},{"vulnerable":true,"criteria":"cpe:2.3:a:sun:jre:1.5.0:update2:*:*:*:*:*:*","matchCriteriaId":"7EA5B9E9-654D-44F7-AE98-3D8B382804AC"},{"vulnerable":true,"criteria":"cpe:2.3:a:sun:jre:1.5.0:update20:*:*:*:*:*:*","matchCriteriaId":"04344167-530E-4A4D-90EF-74C684943DF1"},{"vulnerable":true,"criteria":"cpe:2.3:a:sun:jre:1.5.0:update21:*:*:*:*:*:*","matchCriteriaId":"B0E0373B-201D-408F-9234-A7EFE8B4970D"},{"vulnerable":true,"criteria":"cpe:2.3:a:sun:jre:1.5.0:update22:*:*:*:*:*:*","matchCriteriaId":"15EAD76D-D5D0-4984-9D07-C1451D791083"},{"vulnerable":true,"criteria":"cpe:2.3:a:sun:jre:1.5.0:update23:*:*:*:*:*:*","matchCriteriaId":"DE949EBF-2BC0-4355-8B28-B494023D45FE"},{"vulnerable":true,"criteria":"cpe:2.3:a:sun:jre:1.5.0:update24:*:*:*:*:*:*","matchCriteriaId":"7E0A0A2D-62B9-4A00-84EF-90C15E47A632"},{"vulnerable":true,"criteria":"cpe:2.3:a:sun:jre:1.5.0:update25:*:*:*:*:*:*","matchCriteriaId":"A070A282-CBD6-4041-B149-5E310BD12E7B"},{"vulnerable":true,"criteria":"cpe:2.3:a:sun:jre:1.5.0:update26:*:*:*:*:*:*","matchCriteriaId":"3ECAE71B-C549-4EFB-A509-BFD599F5917A"},{"vulnerable":true,"criteria":"cpe:2.3:a:sun:jre:1.5.0:update27:*:*:*:*:*:*","matchCriteriaId":"044BADDD-A80B-4AE2-8595-5F8186314550"},{"vulnerable":true,"criteria":"cpe:2.3:a:sun:jre:1.5.0:update28:*:*:*:*:*:*","matchCriteriaId":"B7FC11BE-8CF7-4D45-BB4A-3EFA1DDBB10D"},{"vulnerable":true,"criteria":"cpe:2.3:a:sun:jre:1.5.0:update29:*:*:*:*:*:*","matchCriteriaId":"1D75C40D-62AE-47F2-A6E0-53F3495260BD"},{"vulnerable":true,"criteria":"cpe:2.3:a:sun:jre:1.5.0:update3:*:*:*:*:*:*","matchCriteriaId":"44051CFE-D15D-4416-A123-F3E49C67A9E7"},{"vulnerable":true,"criteria":"cpe:2.3:a:sun:jre:1.5.0:update31:*:*:*:*:*:*","matchCriteriaId":"4C061911-FB19-45EB-8E88-7450224F4023"},{"vulnerable":true,"criteria":"cpe:2.3:a:sun:jre:1.5.0:update33:*:*:*:*:*:*","matchCriteriaId":"0E8009BC-F5A8-4D00-9F5F-8635475C6065"},{"vulnerable":true,"criteria":"cpe:2.3:a:sun:jre:1.5.0:update4:*:*:*:*:*:*","matchCriteriaId":"F296ACF3-1373-429D-B991-8B5BA704A7EF"},{"vulnerable":true,"criteria":"cpe:2.3:a:sun:jre:1.5.0:update5:*:*:*:*:*:*","matchCriteriaId":"B863420B-DE16-416A-9640-1A1340A9B855"},{"vulnerable":true,"criteria":"cpe:2.3:a:sun:jre:1.5.0:update6:*:*:*:*:*:*","matchCriteriaId":"724C972F-74FE-4044-BBC4-7E0E61FC9002"},{"vulnerable":true,"criteria":"cpe:2.3:a:sun:jre:1.5.0:update7:*:*:*:*:*:*","matchCriteriaId":"46F41C15-0EF4-4115-BFAA-EEAD56FAEEDB"},{"vulnerable":true,"criteria":"cpe:2.3:a:sun:jre:1.5.0:update8:*:*:*:*:*:*","matchCriteriaId":"EBE909DE-E55A-4BD3-A5BF-ADE407432193"},{"vulnerable":true,"criteria":"cpe:2.3:a:sun:jre:1.5.0:update9:*:*:*:*:*:*","matchCriteriaId":"5DAC04D2-68FD-4793-A8E7-4690A543D7D4"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:jre:1.6.0:update22:*:*:*:*:*:*","matchCriteriaId":"EF13B96D-1F80-4672-8DA3-F86F6D3BF070"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:jre:1.6.0:update23:*:*:*:*:*:*","matchCriteriaId":"D1A2D440-D966-41A6-955D-38B28DDE0FDB"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:jre:1.6.0:update24:*:*:*:*:*:*","matchCriteriaId":"B1C57774-AD93-4162-8E45-92B09139C808"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:jre:1.6.0:update25:*:*:*:*:*:*","matchCriteriaId":"CD7C4194-D34A-418F-9B00-5C6012844AAE"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:jre:1.6.0:update26:*:*:*:*:*:*","matchCriteriaId":"DAF7D86B-1B4D-4E1F-9EF0-DA7E419D7E99"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:jre:1.6.0:update27:*:*:*:*:*:*","matchCriteriaId":"F0B82FB1-0F0E-44F9-87AE-628517279E4D"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:jre:1.6.0:update29:*:*:*:*:*:*","matchCriteriaId":"A0A67640-2F4A-488A-9D8F-3FE1F4DA8DEF"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:jre:1.6.0:update30:*:*:*:*:*:*","matchCriteriaId":"0D60D98D-4363-44A0-AAB4-B61BA623EE21"},{"vulnerable":true,"criteria":"cpe:2.3:a:sun:jre:1.6.0:-:*:*:*:*:*:*","matchCriteriaId":"9AF0780E-830E-4971-8F79-8FCF5D2EBC20"},{"vulnerable":true,"criteria":"cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:*","matchCriteriaId":"09027C19-D442-446F-B7A8-21DB6787CF43"},{"vulnerable":true,"criteria":"cpe:2.3:a:sun:jre:1.6.0:update_10:*:*:*:*:*:*","matchCriteriaId":"0A0FEC28-0707-4F42-9740-78F3D2D551EE"},{"vulnerable":true,"criteria":"cpe:2.3:a:sun:jre:1.6.0:update_11:*:*:*:*:*:*","matchCriteriaId":"C3C5879A-A608-4230-9DC1-C27F0F48A13B"},{"vulnerable":true,"criteria":"cpe:2.3:a:sun:jre:1.6.0:update_12:*:*:*:*:*:*","matchCriteriaId":"0C71089A-BDDE-41FC-9DF9-9AEF4C2374DF"},{"vulnerable":true,"criteria":"cpe:2.3:a:sun:jre:1.6.0:update_13:*:*:*:*:*:*","matchCriteriaId":"2DBB6B73-8D6B-41FF-BEE0-E0C7F5F1EB41"},{"vulnerable":true,"criteria":"cpe:2.3:a:sun:jre:1.6.0:update_14:*:*:*:*:*:*","matchCriteriaId":"12A3B254-8580-45DB-BDE4-5B5A29CBFFB3"},{"vulnerable":true,"criteria":"cpe:2.3:a:sun:jre:1.6.0:update_15:*:*:*:*:*:*","matchCriteriaId":"1DB1DE6A-66AE-499B-AD92-9E6ACE474C6D"},{"vulnerable":true,"criteria":"cpe:2.3:a:sun:jre:1.6.0:update_16:*:*:*:*:*:*","matchCriteriaId":"AADBB4F9-E43E-428B-9979-F47A15696C85"},{"vulnerable":true,"criteria":"cpe:2.3:a:sun:jre:1.6.0:update_17:*:*:*:*:*:*","matchCriteriaId":"49260B94-05DE-4B78-9068-6F5F6BFDD19E"},{"vulnerable":true,"criteria":"cpe:2.3:a:sun:jre:1.6.0:update_18:*:*:*:*:*:*","matchCriteriaId":"C4FDE9EB-08FE-436E-A265-30E83B15DB23"},{"vulnerable":true,"criteria":"cpe:2.3:a:sun:jre:1.6.0:update_19:*:*:*:*:*:*","matchCriteriaId":"BE409D5C-8F9F-4DE9-ACB7-0E0B813F6399"},{"vulnerable":true,"criteria":"cpe:2.3:a:sun:jre:1.6.0:update_2:*:*:*:*:*:*","matchCriteriaId":"7158D2C0-E9AC-4CD6-B777-EA7B7A181997"},{"vulnerable":true,"criteria":"cpe:2.3:a:sun:jre:1.6.0:update_20:*:*:*:*:*:*","matchCriteriaId":"B08C075B-9FC0-4381-A9E4-FFF0362BD308"},{"vulnerable":true,"criteria":"cpe:2.3:a:sun:jre:1.6.0:update_21:*:*:*:*:*:*","matchCriteriaId":"F587E635-3A15-4186-B6A1-F99BE0A56820"},{"vulnerable":true,"criteria":"cpe:2.3:a:sun:jre:1.6.0:update_3:*:*:*:*:*:*","matchCriteriaId":"90EC6C13-4B37-48E5-8199-A702A944D5A6"},{"vulnerable":true,"criteria":"cpe:2.3:a:sun:jre:1.6.0:update_4:*:*:*:*:*:*","matchCriteriaId":"2528152C-E20A-4D97-931C-A5EC3CEAA06D"},{"vulnerable":true,"criteria":"cpe:2.3:a:sun:jre:1.6.0:update_5:*:*:*:*:*:*","matchCriteriaId":"A99DAB4C-272B-4C91-BC70-7729E1152590"},{"vulnerable":true,"criteria":"cpe:2.3:a:sun:jre:1.6.0:update_6:*:*:*:*:*:*","matchCriteriaId":"30DFC10A-A4D9-4F89-B17C-AB9260087D29"},{"vulnerable":true,"criteria":"cpe:2.3:a:sun:jre:1.6.0:update_7:*:*:*:*:*:*","matchCriteriaId":"272A5C44-18EC-41A9-8233-E9D4D0734EA6"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:jre:1.7.0:-:*:*:*:*:*:*","matchCriteriaId":"DFAA351A-93CD-46A8-A480-CE2783CCD620"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:jre:1.7.0:update1:*:*:*:*:*:*","matchCriteriaId":"F4B153FD-E20B-4909-8B10-884E48F5B590"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:jre:1.7.0:update2:*:*:*:*:*:*","matchCriteriaId":"CB106FA9-26CE-48C5-AEA5-FD1A5454AEE2"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*","matchCriteriaId":"036E8A89-7A16-411F-9D31-676313BB7244"},{"vulnerable":true,"criteria":"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","matchCriteriaId":"16F59A04-14CF-49E2-9973-645477EA09DA"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:suse:linux_enterprise_desktop:10:sp4:*:*:-:*:*:*","matchCriteriaId":"4339DE06-19FB-4B8E-B6AE-3495F605AD05"},{"vulnerable":true,"criteria":"cpe:2.3:o:suse:linux_enterprise_java:10:sp4:*:*:*:*:*:*","matchCriteriaId":"3CF5C5B9-2CB9-4CD8-B94F-A674ED909CC3"},{"vulnerable":true,"criteria":"cpe:2.3:o:suse:linux_enterprise_java:11:sp1:*:*:*:*:*:*","matchCriteriaId":"6C92E342-B485-49E3-BC3A-4397D3CA8453"},{"vulnerable":true,"criteria":"cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:-:*:*:*","matchCriteriaId":"D1D7B467-58DD-45F1-9F1F-632620DF072A"},{"vulnerable":true,"criteria":"cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:-:*:*","matchCriteriaId":"A44C3422-0D42-473E-ABB4-279D7494EE2F"},{"vulnerable":true,"criteria":"cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:vmware:*:*","matchCriteriaId":"A6B7CDCA-6F39-4113-B5D3-3AA9D7F3D809"},{"vulnerable":true,"criteria":"cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:-:*:*","matchCriteriaId":"88D6E858-FD8F-4C55-B7D5-CEEDA2BBA898"},{"vulnerable":true,"criteria":"cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp1:*:*:*:*:*:*","matchCriteriaId":"E8C91701-DF37-4F7B-AB9A-B1BFDB4991F8"},{"vulnerable":true,"criteria":"cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp2:*:*:*:*:*:*","matchCriteriaId":"5AA37837-3083-4DC7-94F4-54FD5D7CB53C"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2012","CveId":"507","Ordinal":"1","Title":"CVE-2012-0507","CVE":"CVE-2012-0507","Year":"2012"},"notes":[{"CveYear":"2012","CveId":"507","Ordinal":"1","NoteData":"Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, and 5.0 Update 33 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Concurrency.  NOTE: the previous information was obtained from the February 2012 Oracle CPU. Oracle has not commented on claims from a downstream vendor and third party researchers that this issue occurs because the AtomicReferenceArray class implementation does not ensure that the array is of the Object[] type, which allows attackers to cause a denial of service (JVM crash) or bypass Java sandbox restrictions.  NOTE: this issue was originally mapped to CVE-2011-3571, but that identifier was already assigned to a different issue.","Type":"Description","Title":"CVE-2012-0507"},{"CveYear":"2012","CveId":"507","Ordinal":"2","NoteData":"2012-06-07","Type":"Other","Title":"Published"},{"CveYear":"2012","CveId":"507","Ordinal":"3","NoteData":"2017-12-28","Type":"Other","Title":"Modified"}]}}}