{"api_version":"1","generated_at":"2026-04-23T06:07:25+00:00","cve":"CVE-2013-2465","urls":{"html":"https://cve.report/CVE-2013-2465","api":"https://cve.report/api/cve/CVE-2013-2465.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2013-2465","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2013-2465"},"summary":{"title":"CVE-2013-2465","description":"Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to \"Incorrect image channel verification\" in 2D.","state":"PUBLISHED","assigner":"oracle","published_at":"2013-06-18 22:55:02","updated_at":"2026-04-22 13:08:16"},"problem_types":["NVD-CWE-noinfo","CWE-693","n/a","CWE-693 CWE-693 Protection Mechanism Failure"],"metrics":[{"version":"3.1","source":"ADP","type":"DECLARED","score":"9.8","severity":"CRITICAL","vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","data":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":9.8,"baseSeverity":"CRITICAL","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","version":"3.1"}},{"version":"3.1","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","score":"9.8","severity":"CRITICAL","vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"}},{"version":"2.0","source":"nvd@nist.gov","type":"Primary","score":"10","severity":"","vector":"AV:N/AC:L/Au:N/C:C/I:C/A:C","data":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"}}],"references":[{"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19455","name":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19455","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link"],"title":"Repository  /  Oval Repository","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00029.html","name":"http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00029.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"],"title":"[security-announce] SUSE-SU-2013:1263-1: important: Security update for","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03898880","name":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03898880","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link"],"title":"","mime":"","httpstatus":"-1","archivestatus":"404"},{"url":"http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html","name":"http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"Oracle Java Critical Patch Update - June 2013","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/bid/60657","name":"http://www.securityfocus.com/bid/60657","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link","Third Party Advisory","VDB Entry"],"title":"Oracle Java SE CVE-2013-2465 Memory Corruption Vulnerability","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"http://rhn.redhat.com/errata/RHSA-2013-1081.html","name":"http://rhn.redhat.com/errata/RHSA-2013-1081.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"],"title":"Red Hat Customer Portal","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"http://advisories.mageia.org/MGASA-2013-0185.html","name":"http://advisories.mageia.org/MGASA-2013-0185.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link"],"title":"Mageia Advisory: MGASA-2013-0185 - Updated java-1.7.0-openjdk packages fix multiple security vulnerabilities","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00026.html","name":"http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00026.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"],"title":"[security-announce] SUSE-SU-2013:1255-1: important: Security update for","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2013-2465","name":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2013-2465","refsource":"134c704f-9b21-4f2e-91b3-4a467353bcc0","tags":["US Government Resource"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"http://www-01.ibm.com/support/docview.wss?uid=swg21642336","name":"http://www-01.ibm.com/support/docview.wss?uid=swg21642336","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"],"title":"IBM Security Bulletin: Multiple vulnerabilities in IBM WebSphere Real Time - United States","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://rhn.redhat.com/errata/RHSA-2013-1059.html","name":"http://rhn.redhat.com/errata/RHSA-2013-1059.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"],"title":"Red Hat Customer Portal","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"http://rhn.redhat.com/errata/RHSA-2013-1060.html","name":"http://rhn.redhat.com/errata/RHSA-2013-1060.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"],"title":"Red Hat Customer Portal","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"http://rhn.redhat.com/errata/RHSA-2013-1455.html","name":"http://rhn.redhat.com/errata/RHSA-2013-1455.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"],"title":"Red Hat Customer Portal","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17106","name":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17106","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link"],"title":"Repository  /  Oval Repository","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00000.html","name":"http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00000.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"],"title":"[security-announce] SUSE-SU-2013:1293-1: important: Security update for","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://rhn.redhat.com/errata/RHSA-2013-0963.html","name":"http://rhn.redhat.com/errata/RHSA-2013-0963.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"],"title":"Red Hat Customer Portal","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00031.html","name":"http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00031.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"],"title":"[security-announce] SUSE-SU-2013:1264-1: important: Security update for","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/54154","name":"http://secunia.com/advisories/54154","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Not Applicable"],"title":"About Secunia Research | Flexera","mime":"text/plain","httpstatus":"200","archivestatus":"200"},{"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19703","name":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19703","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link"],"title":"Repository  /  Oval Repository","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://access.redhat.com/errata/RHSA-2014:0414","name":"https://access.redhat.com/errata/RHSA-2014:0414","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"],"title":"Red Hat Customer Portal","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.vicarius.io/vsociety/posts/cve-2013-2465-detect-java-vulnerability","name":"https://www.vicarius.io/vsociety/posts/cve-2013-2465-detect-java-vulnerability","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Third Party Advisory"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"http://www.us-cert.gov/ncas/alerts/TA13-169A","name":"http://www.us-cert.gov/ncas/alerts/TA13-169A","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","US Government Resource"],"title":"Oracle Releases Updates for Javadoc and Other Java SE Vulnerabilities | US-CERT","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00003.html","name":"http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00003.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"],"title":"[security-announce] SUSE-SU-2013:1305-1: important: Security update for","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://security.gentoo.org/glsa/glsa-201406-32.xml","name":"http://security.gentoo.org/glsa/glsa-201406-32.xml","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"],"title":"Gentoo Linux Documentation\n--\n  IcedTea JDK: Multiple vulnerabilities","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=137545505800971&w=2","name":"http://marc.info/?l=bugtraq&m=137545505800971&w=2","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"],"title":"'[security bulletin] HPSBUX02907 rev.1 - HP-UX Running Java7, Remote Unauthorized Access, Disclosure' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=975118","name":"https://bugzilla.redhat.com/show_bug.cgi?id=975118","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Issue Tracking"],"title":"Bug 975118 – CVE-2013-2465 OpenJDK: Incorrect image channel verification (2D, 8012597)","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19074","name":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19074","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link"],"title":"Repository  /  Oval Repository","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=137545592101387&w=2","name":"http://marc.info/?l=bugtraq&m=137545592101387&w=2","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"],"title":"'[security bulletin] HPSBUX02908 rev.1 - HP-UX Running Java6, Remote Unauthorized Access, Disclosure' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://hg.openjdk.java.net/jdk7u/jdk7u-dev/jdk/rev/2a9c79db0040","name":"http://hg.openjdk.java.net/jdk7u/jdk7u-dev/jdk/rev/2a9c79db0040","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"],"title":"jdk7u/jdk7u-dev/jdk: changeset 6381:2a9c79db0040","mime":"text/xml","httpstatus":"200","archivestatus":"200"},{"url":"https://www.vicarius.io/vsociety/posts/cve-2013-2465-mitigate-java-vulnerability","name":"https://www.vicarius.io/vsociety/posts/cve-2013-2465-mitigate-java-vulnerability","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Third Party Advisory"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00027.html","name":"http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00027.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"],"title":"[security-announce] SUSE-SU-2013:1256-1: important: Security update for","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2013:183","name":"http://www.mandriva.com/security/advisories?name=MDVSA-2013:183","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Not Applicable"],"title":"Support / Security / Advisories /  / MDVSA-2013:183 | Mandriva","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://rhn.redhat.com/errata/RHSA-2013-1456.html","name":"http://rhn.redhat.com/errata/RHSA-2013-1456.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"],"title":"Red Hat Customer Portal","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00028.html","name":"http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00028.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"],"title":"[security-announce] SUSE-SU-2013:1257-1: important: Security update for","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2013-2465","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2013-2465","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"n/a","product":"n/a","version":"affected n/a","platforms":[]}],"timeline":[{"source":"ADP","time":"2022-03-28T00:00:00.000Z","lang":"en","value":"CVE-2013-2465 added to CISA KEV"}],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2013","cve_id":"2465","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"oracle","cpe5":"jre","cpe6":"1.5.0","cpe7":"-","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2013","cve_id":"2465","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"oracle","cpe5":"jre","cpe6":"1.5.0","cpe7":"update36","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2013","cve_id":"2465","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"oracle","cpe5":"jre","cpe6":"1.5.0","cpe7":"update38","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2013","cve_id":"2465","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"oracle","cpe5":"jre","cpe6":"1.5.0","cpe7":"update39","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2013","cve_id":"2465","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"oracle","cpe5":"jre","cpe6":"1.5.0","cpe7":"update40","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2013","cve_id":"2465","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"oracle","cpe5":"jre","cpe6":"1.5.0","cpe7":"update41","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2013","cve_id":"2465","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"oracle","cpe5":"jre","cpe6":"1.5.0","cpe7":"update45","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2013","cve_id":"2465","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"oracle","cpe5":"jre","cpe6":"1.6.0","cpe7":"-","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2013","cve_id":"2465","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"oracle","cpe5":"jre","cpe6":"1.6.0","cpe7":"update22","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2013","cve_id":"2465","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"oracle","cpe5":"jre","cpe6":"1.6.0","cpe7":"update23","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2013","cve_id":"2465","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"oracle","cpe5":"jre","cpe6":"1.6.0","cpe7":"update24","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2013","cve_id":"2465","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"oracle","cpe5":"jre","cpe6":"1.6.0","cpe7":"update25","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2013","cve_id":"2465","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"oracle","cpe5":"jre","cpe6":"1.6.0","cpe7":"update26","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2013","cve_id":"2465","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"oracle","cpe5":"jre","cpe6":"1.6.0","cpe7":"update27","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2013","cve_id":"2465","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"oracle","cpe5":"jre","cpe6":"1.6.0","cpe7":"update29","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2013","cve_id":"2465","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"oracle","cpe5":"jre","cpe6":"1.6.0","cpe7":"update30","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2013","cve_id":"2465","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"oracle","cpe5":"jre","cpe6":"1.6.0","cpe7":"update31","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2013","cve_id":"2465","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"oracle","cpe5":"jre","cpe6":"1.6.0","cpe7":"update32","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2013","cve_id":"2465","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"oracle","cpe5":"jre","cpe6":"1.6.0","cpe7":"update33","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2013","cve_id":"2465","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"oracle","cpe5":"jre","cpe6":"1.6.0","cpe7":"update34","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2013","cve_id":"2465","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"oracle","cpe5":"jre","cpe6":"1.6.0","cpe7":"update35","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2013","cve_id":"2465","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"oracle","cpe5":"jre","cpe6":"1.6.0","cpe7":"update37","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2013","cve_id":"2465","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"oracle","cpe5":"jre","cpe6":"1.6.0","cpe7":"update38","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2013","cve_id":"2465","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"oracle","cpe5":"jre","cpe6":"1.6.0","cpe7":"update39","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2013","cve_id":"2465","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"oracle","cpe5":"jre","cpe6":"1.6.0","cpe7":"update41","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2013","cve_id":"2465","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"oracle","cpe5":"jre","cpe6":"1.6.0","cpe7":"update43","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2013","cve_id":"2465","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"oracle","cpe5":"jre","cpe6":"1.6.0","cpe7":"update45","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2013","cve_id":"2465","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"oracle","cpe5":"jre","cpe6":"1.7.0","cpe7":"-","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2013","cve_id":"2465","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"oracle","cpe5":"jre","cpe6":"1.7.0","cpe7":"update1","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2013","cve_id":"2465","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"oracle","cpe5":"jre","cpe6":"1.7.0","cpe7":"update10","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2013","cve_id":"2465","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"oracle","cpe5":"jre","cpe6":"1.7.0","cpe7":"update11","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2013","cve_id":"2465","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"oracle","cpe5":"jre","cpe6":"1.7.0","cpe7":"update13","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2013","cve_id":"2465","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"oracle","cpe5":"jre","cpe6":"1.7.0","cpe7":"update15","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2013","cve_id":"2465","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"oracle","cpe5":"jre","cpe6":"1.7.0","cpe7":"update17","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2013","cve_id":"2465","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"oracle","cpe5":"jre","cpe6":"1.7.0","cpe7":"update2","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2013","cve_id":"2465","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"oracle","cpe5":"jre","cpe6":"1.7.0","cpe7":"update21","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2013","cve_id":"2465","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"oracle","cpe5":"jre","cpe6":"1.7.0","cpe7":"update3","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2013","cve_id":"2465","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"oracle","cpe5":"jre","cpe6":"1.7.0","cpe7":"update4","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2013","cve_id":"2465","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"oracle","cpe5":"jre","cpe6":"1.7.0","cpe7":"update5","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2013","cve_id":"2465","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"oracle","cpe5":"jre","cpe6":"1.7.0","cpe7":"update6","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2013","cve_id":"2465","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"oracle","cpe5":"jre","cpe6":"1.7.0","cpe7":"update7","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2013","cve_id":"2465","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"oracle","cpe5":"jre","cpe6":"1.7.0","cpe7":"update9","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2013","cve_id":"2465","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"sun","cpe5":"jre","cpe6":"1.5.0","cpe7":"update1","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2013","cve_id":"2465","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"sun","cpe5":"jre","cpe6":"1.5.0","cpe7":"update10","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2013","cve_id":"2465","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"sun","cpe5":"jre","cpe6":"1.5.0","cpe7":"update11","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2013","cve_id":"2465","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"sun","cpe5":"jre","cpe6":"1.5.0","cpe7":"update12","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2013","cve_id":"2465","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"sun","cpe5":"jre","cpe6":"1.5.0","cpe7":"update13","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2013","cve_id":"2465","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"sun","cpe5":"jre","cpe6":"1.5.0","cpe7":"update14","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2013","cve_id":"2465","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"sun","cpe5":"jre","cpe6":"1.5.0","cpe7":"update15","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2013","cve_id":"2465","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"sun","cpe5":"jre","cpe6":"1.5.0","cpe7":"update16","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2013","cve_id":"2465","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"sun","cpe5":"jre","cpe6":"1.5.0","cpe7":"update17","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2013","cve_id":"2465","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"sun","cpe5":"jre","cpe6":"1.5.0","cpe7":"update18","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2013","cve_id":"2465","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"sun","cpe5":"jre","cpe6":"1.5.0","cpe7":"update19","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2013","cve_id":"2465","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"sun","cpe5":"jre","cpe6":"1.5.0","cpe7":"update2","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2013","cve_id":"2465","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"sun","cpe5":"jre","cpe6":"1.5.0","cpe7":"update20","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2013","cve_id":"2465","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"sun","cpe5":"jre","cpe6":"1.5.0","cpe7":"update21","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2013","cve_id":"2465","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"sun","cpe5":"jre","cpe6":"1.5.0","cpe7":"update22","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2013","cve_id":"2465","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"sun","cpe5":"jre","cpe6":"1.5.0","cpe7":"update23","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2013","cve_id":"2465","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"sun","cpe5":"jre","cpe6":"1.5.0","cpe7":"update24","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2013","cve_id":"2465","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"sun","cpe5":"jre","cpe6":"1.5.0","cpe7":"update25","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2013","cve_id":"2465","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"sun","cpe5":"jre","cpe6":"1.5.0","cpe7":"update26","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2013","cve_id":"2465","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"sun","cpe5":"jre","cpe6":"1.5.0","cpe7":"update27","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2013","cve_id":"2465","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"sun","cpe5":"jre","cpe6":"1.5.0","cpe7":"update28","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2013","cve_id":"2465","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"sun","cpe5":"jre","cpe6":"1.5.0","cpe7":"update29","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2013","cve_id":"2465","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"sun","cpe5":"jre","cpe6":"1.5.0","cpe7":"update3","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2013","cve_id":"2465","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"sun","cpe5":"jre","cpe6":"1.5.0","cpe7":"update31","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2013","cve_id":"2465","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"sun","cpe5":"jre","cpe6":"1.5.0","cpe7":"update33","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2013","cve_id":"2465","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"sun","cpe5":"jre","cpe6":"1.5.0","cpe7":"update4","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2013","cve_id":"2465","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"sun","cpe5":"jre","cpe6":"1.5.0","cpe7":"update5","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2013","cve_id":"2465","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"sun","cpe5":"jre","cpe6":"1.5.0","cpe7":"update6","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2013","cve_id":"2465","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"sun","cpe5":"jre","cpe6":"1.5.0","cpe7":"update7","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2013","cve_id":"2465","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"sun","cpe5":"jre","cpe6":"1.5.0","cpe7":"update8","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2013","cve_id":"2465","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"sun","cpe5":"jre","cpe6":"1.5.0","cpe7":"update9","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2013","cve_id":"2465","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"sun","cpe5":"jre","cpe6":"1.6.0","cpe7":"update_1","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2013","cve_id":"2465","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"sun","cpe5":"jre","cpe6":"1.6.0","cpe7":"update_10","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2013","cve_id":"2465","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"sun","cpe5":"jre","cpe6":"1.6.0","cpe7":"update_11","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2013","cve_id":"2465","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"sun","cpe5":"jre","cpe6":"1.6.0","cpe7":"update_12","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2013","cve_id":"2465","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"sun","cpe5":"jre","cpe6":"1.6.0","cpe7":"update_13","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2013","cve_id":"2465","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"sun","cpe5":"jre","cpe6":"1.6.0","cpe7":"update_14","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2013","cve_id":"2465","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"sun","cpe5":"jre","cpe6":"1.6.0","cpe7":"update_15","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2013","cve_id":"2465","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"sun","cpe5":"jre","cpe6":"1.6.0","cpe7":"update_16","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2013","cve_id":"2465","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"sun","cpe5":"jre","cpe6":"1.6.0","cpe7":"update_17","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2013","cve_id":"2465","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"sun","cpe5":"jre","cpe6":"1.6.0","cpe7":"update_18","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2013","cve_id":"2465","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"sun","cpe5":"jre","cpe6":"1.6.0","cpe7":"update_19","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2013","cve_id":"2465","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"sun","cpe5":"jre","cpe6":"1.6.0","cpe7":"update_20","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2013","cve_id":"2465","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"sun","cpe5":"jre","cpe6":"1.6.0","cpe7":"update_21","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2013","cve_id":"2465","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"sun","cpe5":"jre","cpe6":"1.6.0","cpe7":"update_3","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2013","cve_id":"2465","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"sun","cpe5":"jre","cpe6":"1.6.0","cpe7":"update_4","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2013","cve_id":"2465","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"sun","cpe5":"jre","cpe6":"1.6.0","cpe7":"update_5","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2013","cve_id":"2465","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"sun","cpe5":"jre","cpe6":"1.6.0","cpe7":"update_6","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2013","cve_id":"2465","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"sun","cpe5":"jre","cpe6":"1.6.0","cpe7":"update_7","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2013","cve_id":"2465","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"sun","cpe5":"jre","cpe6":"1.6.0","cpe7":"update_9","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2013","cve_id":"2465","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"suse","cpe5":"linux_enterprise_desktop","cpe6":"10","cpe7":"sp4","cpe8":"*","cpe9":"*","cpe10":"-","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2013","cve_id":"2465","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"suse","cpe5":"linux_enterprise_java","cpe6":"10","cpe7":"sp4","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2013","cve_id":"2465","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"suse","cpe5":"linux_enterprise_java","cpe6":"11","cpe7":"sp2","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2013","cve_id":"2465","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"suse","cpe5":"linux_enterprise_java","cpe6":"11","cpe7":"sp3","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2013","cve_id":"2465","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"suse","cpe5":"linux_enterprise_server","cpe6":"10","cpe7":"sp3","cpe8":"*","cpe9":"*","cpe10":"ltss","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2013","cve_id":"2465","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"suse","cpe5":"linux_enterprise_server","cpe6":"10","cpe7":"sp4","cpe8":"*","cpe9":"*","cpe10":"-","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2013","cve_id":"2465","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"suse","cpe5":"linux_enterprise_server","cpe6":"11","cpe7":"sp2","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"-","cpe12":"*","cpe13":"*"},{"cve_year":"2013","cve_id":"2465","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"suse","cpe5":"linux_enterprise_server","cpe6":"11","cpe7":"sp2","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"vmware","cpe12":"*","cpe13":"*"},{"cve_year":"2013","cve_id":"2465","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"suse","cpe5":"linux_enterprise_server","cpe6":"11","cpe7":"sp3","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"-","cpe12":"*","cpe13":"*"},{"cve_year":"2013","cve_id":"2465","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"suse","cpe5":"linux_enterprise_server","cpe6":"11","cpe7":"sp3","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"vmware","cpe12":"*","cpe13":"*"},{"cve_year":"2013","cve_id":"2465","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"suse","cpe5":"linux_enterprise_software_development_kit","cpe6":"11","cpe7":"sp2","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2013","cve_id":"2465","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"suse","cpe5":"linux_enterprise_software_development_kit","cpe6":"11","cpe7":"sp3","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":{"cve_year":"2013","cve_id":"2465","cve":"CVE-2013-2465","vendorProject":"Oracle","product":"Java SE","vulnerabilityName":"Oracle Java SE Unspecified Vulnerability","dateAdded":"2022-03-28","shortDescription":"Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE allows remote attackers to affect confidentiality, integrity, and availability via Unknown vectors related to 2D","requiredAction":"Apply updates per vendor instructions.","dueDate":"2022-04-18","knownRansomwareCampaignUse":"Known","notes":"https://nvd.nist.gov/vuln/detail/CVE-2013-2465","cwes":"","catalogVersion":"2026.04.22","updated_at":"2026-04-22 20:03:10"},"epss":{"cve_year":"2013","cve_id":"2465","cve":"CVE-2013-2465","epss":"0.932200000","percentile":"0.998020000","score_date":"2026-04-22","updated_at":"2026-04-23 00:03:15"},"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"providerMetadata":{"dateUpdated":"2025-05-06T17:15:03.175Z","orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE"},"references":[{"url":"https://www.vicarius.io/vsociety/posts/cve-2013-2465-detect-java-vulnerability"},{"url":"https://www.vicarius.io/vsociety/posts/cve-2013-2465-mitigate-java-vulnerability"},{"name":"RHSA-2013:1060","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"],"url":"http://rhn.redhat.com/errata/RHSA-2013-1060.html"},{"name":"HPSBUX02908","tags":["vendor-advisory","x_refsource_HP","x_transferred"],"url":"http://marc.info/?l=bugtraq&m=137545592101387&w=2"},{"name":"RHSA-2014:0414","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"],"url":"https://access.redhat.com/errata/RHSA-2014:0414"},{"name":"GLSA-201406-32","tags":["vendor-advisory","x_refsource_GENTOO","x_transferred"],"url":"http://security.gentoo.org/glsa/glsa-201406-32.xml"},{"name":"60657","tags":["vdb-entry","x_refsource_BID","x_transferred"],"url":"http://www.securityfocus.com/bid/60657"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html"},{"name":"SUSE-SU-2013:1264","tags":["vendor-advisory","x_refsource_SUSE","x_transferred"],"url":"http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00031.html"},{"name":"SUSE-SU-2013:1257","tags":["vendor-advisory","x_refsource_SUSE","x_transferred"],"url":"http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00028.html"},{"name":"HPSBUX02907","tags":["vendor-advisory","x_refsource_HP","x_transferred"],"url":"http://marc.info/?l=bugtraq&m=137545505800971&w=2"},{"name":"SUSE-SU-2013:1256","tags":["vendor-advisory","x_refsource_SUSE","x_transferred"],"url":"http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00027.html"},{"name":"54154","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/54154"},{"name":"RHSA-2013:1455","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"],"url":"http://rhn.redhat.com/errata/RHSA-2013-1455.html"},{"name":"SSRT101305","tags":["vendor-advisory","x_refsource_HP","x_transferred"],"url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03898880"},{"name":"oval:org.mitre.oval:def:19455","tags":["vdb-entry","signature","x_refsource_OVAL","x_transferred"],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19455"},{"name":"oval:org.mitre.oval:def:19703","tags":["vdb-entry","signature","x_refsource_OVAL","x_transferred"],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19703"},{"name":"HPSBUX02922","tags":["vendor-advisory","x_refsource_HP","x_transferred"],"url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03898880"},{"tags":["x_refsource_MISC","x_transferred"],"url":"http://hg.openjdk.java.net/jdk7u/jdk7u-dev/jdk/rev/2a9c79db0040"},{"name":"oval:org.mitre.oval:def:19074","tags":["vdb-entry","signature","x_refsource_OVAL","x_transferred"],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19074"},{"name":"SUSE-SU-2013:1263","tags":["vendor-advisory","x_refsource_SUSE","x_transferred"],"url":"http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00029.html"},{"name":"RHSA-2013:1059","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"],"url":"http://rhn.redhat.com/errata/RHSA-2013-1059.html"},{"name":"SUSE-SU-2013:1293","tags":["vendor-advisory","x_refsource_SUSE","x_transferred"],"url":"http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00000.html"},{"name":"oval:org.mitre.oval:def:17106","tags":["vdb-entry","signature","x_refsource_OVAL","x_transferred"],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17106"},{"name":"RHSA-2013:1081","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"],"url":"http://rhn.redhat.com/errata/RHSA-2013-1081.html"},{"name":"TA13-169A","tags":["third-party-advisory","x_refsource_CERT","x_transferred"],"url":"http://www.us-cert.gov/ncas/alerts/TA13-169A"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://advisories.mageia.org/MGASA-2013-0185.html"},{"name":"RHSA-2013:0963","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"],"url":"http://rhn.redhat.com/errata/RHSA-2013-0963.html"},{"name":"SUSE-SU-2013:1255","tags":["vendor-advisory","x_refsource_SUSE","x_transferred"],"url":"http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00026.html"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=975118"},{"name":"RHSA-2013:1456","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"],"url":"http://rhn.redhat.com/errata/RHSA-2013-1456.html"},{"name":"MDVSA-2013:183","tags":["vendor-advisory","x_refsource_MANDRIVA","x_transferred"],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2013:183"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://www-01.ibm.com/support/docview.wss?uid=swg21642336"},{"name":"SUSE-SU-2013:1305","tags":["vendor-advisory","x_refsource_SUSE","x_transferred"],"url":"http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00003.html"}],"title":"CVE Program Container","x_generator":{"engine":"ADPogram 0.0.1"}},{"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":9.8,"baseSeverity":"CRITICAL","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","version":"3.1"}},{"other":{"content":{"id":"CVE-2013-2465","options":[{"Exploitation":"active"},{"Automatable":"yes"},{"Technical Impact":"total"}],"role":"CISA Coordinator","timestamp":"2025-02-10T19:00:39.857228Z","version":"2.0.3"},"type":"ssvc"}},{"other":{"content":{"dateAdded":"2022-03-28","reference":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2013-2465"},"type":"kev"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-693","description":"CWE-693 Protection Mechanism Failure","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2025-10-22T00:05:41.755Z","orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP"},"references":[{"tags":["government-resource"],"url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2013-2465"}],"timeline":[{"lang":"en","time":"2022-03-28T00:00:00.000Z","value":"CVE-2013-2465 added to CISA KEV"}],"title":"CISA ADP Vulnrichment"}],"cna":{"affected":[{"product":"n/a","vendor":"n/a","versions":[{"status":"affected","version":"n/a"}]}],"datePublic":"2013-06-18T00:00:00.000Z","descriptions":[{"lang":"en","value":"Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to \"Incorrect image channel verification\" in 2D."}],"problemTypes":[{"descriptions":[{"description":"n/a","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2018-01-04T19:57:01.000Z","orgId":"43595867-4340-4103-b7a2-9a5208d29a85","shortName":"oracle"},"references":[{"name":"RHSA-2013:1060","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"http://rhn.redhat.com/errata/RHSA-2013-1060.html"},{"name":"HPSBUX02908","tags":["vendor-advisory","x_refsource_HP"],"url":"http://marc.info/?l=bugtraq&m=137545592101387&w=2"},{"name":"RHSA-2014:0414","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"https://access.redhat.com/errata/RHSA-2014:0414"},{"name":"GLSA-201406-32","tags":["vendor-advisory","x_refsource_GENTOO"],"url":"http://security.gentoo.org/glsa/glsa-201406-32.xml"},{"name":"60657","tags":["vdb-entry","x_refsource_BID"],"url":"http://www.securityfocus.com/bid/60657"},{"tags":["x_refsource_CONFIRM"],"url":"http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html"},{"name":"SUSE-SU-2013:1264","tags":["vendor-advisory","x_refsource_SUSE"],"url":"http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00031.html"},{"name":"SUSE-SU-2013:1257","tags":["vendor-advisory","x_refsource_SUSE"],"url":"http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00028.html"},{"name":"HPSBUX02907","tags":["vendor-advisory","x_refsource_HP"],"url":"http://marc.info/?l=bugtraq&m=137545505800971&w=2"},{"name":"SUSE-SU-2013:1256","tags":["vendor-advisory","x_refsource_SUSE"],"url":"http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00027.html"},{"name":"54154","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/54154"},{"name":"RHSA-2013:1455","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"http://rhn.redhat.com/errata/RHSA-2013-1455.html"},{"name":"SSRT101305","tags":["vendor-advisory","x_refsource_HP"],"url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03898880"},{"name":"oval:org.mitre.oval:def:19455","tags":["vdb-entry","signature","x_refsource_OVAL"],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19455"},{"name":"oval:org.mitre.oval:def:19703","tags":["vdb-entry","signature","x_refsource_OVAL"],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19703"},{"name":"HPSBUX02922","tags":["vendor-advisory","x_refsource_HP"],"url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03898880"},{"tags":["x_refsource_MISC"],"url":"http://hg.openjdk.java.net/jdk7u/jdk7u-dev/jdk/rev/2a9c79db0040"},{"name":"oval:org.mitre.oval:def:19074","tags":["vdb-entry","signature","x_refsource_OVAL"],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19074"},{"name":"SUSE-SU-2013:1263","tags":["vendor-advisory","x_refsource_SUSE"],"url":"http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00029.html"},{"name":"RHSA-2013:1059","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"http://rhn.redhat.com/errata/RHSA-2013-1059.html"},{"name":"SUSE-SU-2013:1293","tags":["vendor-advisory","x_refsource_SUSE"],"url":"http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00000.html"},{"name":"oval:org.mitre.oval:def:17106","tags":["vdb-entry","signature","x_refsource_OVAL"],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17106"},{"name":"RHSA-2013:1081","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"http://rhn.redhat.com/errata/RHSA-2013-1081.html"},{"name":"TA13-169A","tags":["third-party-advisory","x_refsource_CERT"],"url":"http://www.us-cert.gov/ncas/alerts/TA13-169A"},{"tags":["x_refsource_CONFIRM"],"url":"http://advisories.mageia.org/MGASA-2013-0185.html"},{"name":"RHSA-2013:0963","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"http://rhn.redhat.com/errata/RHSA-2013-0963.html"},{"name":"SUSE-SU-2013:1255","tags":["vendor-advisory","x_refsource_SUSE"],"url":"http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00026.html"},{"tags":["x_refsource_CONFIRM"],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=975118"},{"name":"RHSA-2013:1456","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"http://rhn.redhat.com/errata/RHSA-2013-1456.html"},{"name":"MDVSA-2013:183","tags":["vendor-advisory","x_refsource_MANDRIVA"],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2013:183"},{"tags":["x_refsource_CONFIRM"],"url":"http://www-01.ibm.com/support/docview.wss?uid=swg21642336"},{"name":"SUSE-SU-2013:1305","tags":["vendor-advisory","x_refsource_SUSE"],"url":"http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00003.html"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"secalert_us@oracle.com","ID":"CVE-2013-2465","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to \"Incorrect image channel verification\" in 2D."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"RHSA-2013:1060","refsource":"REDHAT","url":"http://rhn.redhat.com/errata/RHSA-2013-1060.html"},{"name":"HPSBUX02908","refsource":"HP","url":"http://marc.info/?l=bugtraq&m=137545592101387&w=2"},{"name":"RHSA-2014:0414","refsource":"REDHAT","url":"https://access.redhat.com/errata/RHSA-2014:0414"},{"name":"GLSA-201406-32","refsource":"GENTOO","url":"http://security.gentoo.org/glsa/glsa-201406-32.xml"},{"name":"60657","refsource":"BID","url":"http://www.securityfocus.com/bid/60657"},{"name":"http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html","refsource":"CONFIRM","url":"http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html"},{"name":"SUSE-SU-2013:1264","refsource":"SUSE","url":"http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00031.html"},{"name":"SUSE-SU-2013:1257","refsource":"SUSE","url":"http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00028.html"},{"name":"HPSBUX02907","refsource":"HP","url":"http://marc.info/?l=bugtraq&m=137545505800971&w=2"},{"name":"SUSE-SU-2013:1256","refsource":"SUSE","url":"http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00027.html"},{"name":"54154","refsource":"SECUNIA","url":"http://secunia.com/advisories/54154"},{"name":"RHSA-2013:1455","refsource":"REDHAT","url":"http://rhn.redhat.com/errata/RHSA-2013-1455.html"},{"name":"SSRT101305","refsource":"HP","url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03898880"},{"name":"oval:org.mitre.oval:def:19455","refsource":"OVAL","url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19455"},{"name":"oval:org.mitre.oval:def:19703","refsource":"OVAL","url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19703"},{"name":"HPSBUX02922","refsource":"HP","url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03898880"},{"name":"http://hg.openjdk.java.net/jdk7u/jdk7u-dev/jdk/rev/2a9c79db0040","refsource":"MISC","url":"http://hg.openjdk.java.net/jdk7u/jdk7u-dev/jdk/rev/2a9c79db0040"},{"name":"oval:org.mitre.oval:def:19074","refsource":"OVAL","url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19074"},{"name":"SUSE-SU-2013:1263","refsource":"SUSE","url":"http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00029.html"},{"name":"RHSA-2013:1059","refsource":"REDHAT","url":"http://rhn.redhat.com/errata/RHSA-2013-1059.html"},{"name":"SUSE-SU-2013:1293","refsource":"SUSE","url":"http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00000.html"},{"name":"oval:org.mitre.oval:def:17106","refsource":"OVAL","url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17106"},{"name":"RHSA-2013:1081","refsource":"REDHAT","url":"http://rhn.redhat.com/errata/RHSA-2013-1081.html"},{"name":"TA13-169A","refsource":"CERT","url":"http://www.us-cert.gov/ncas/alerts/TA13-169A"},{"name":"http://advisories.mageia.org/MGASA-2013-0185.html","refsource":"CONFIRM","url":"http://advisories.mageia.org/MGASA-2013-0185.html"},{"name":"RHSA-2013:0963","refsource":"REDHAT","url":"http://rhn.redhat.com/errata/RHSA-2013-0963.html"},{"name":"SUSE-SU-2013:1255","refsource":"SUSE","url":"http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00026.html"},{"name":"https://bugzilla.redhat.com/show_bug.cgi?id=975118","refsource":"CONFIRM","url":"https://bugzilla.redhat.com/show_bug.cgi?id=975118"},{"name":"RHSA-2013:1456","refsource":"REDHAT","url":"http://rhn.redhat.com/errata/RHSA-2013-1456.html"},{"name":"MDVSA-2013:183","refsource":"MANDRIVA","url":"http://www.mandriva.com/security/advisories?name=MDVSA-2013:183"},{"name":"http://www-01.ibm.com/support/docview.wss?uid=swg21642336","refsource":"CONFIRM","url":"http://www-01.ibm.com/support/docview.wss?uid=swg21642336"},{"name":"SUSE-SU-2013:1305","refsource":"SUSE","url":"http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00003.html"}]}}}},"cveMetadata":{"assignerOrgId":"43595867-4340-4103-b7a2-9a5208d29a85","assignerShortName":"oracle","cveId":"CVE-2013-2465","datePublished":"2013-06-18T22:00:00.000Z","dateReserved":"2013-03-05T00:00:00.000Z","dateUpdated":"2025-10-22T00:05:41.755Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"},"nvd":{"publishedDate":"2013-06-18 22:55:02","lastModifiedDate":"2026-04-22 13:08:16","problem_types":["NVD-CWE-noinfo","CWE-693","n/a","CWE-693 CWE-693 Protection Mechanism Failure"],"metrics":{"cvssMetricV31":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10,"impactScore":10,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:jre:1.7.0:-:*:*:*:*:*:*","matchCriteriaId":"DFAA351A-93CD-46A8-A480-CE2783CCD620"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:jre:1.7.0:update1:*:*:*:*:*:*","matchCriteriaId":"F4B153FD-E20B-4909-8B10-884E48F5B590"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:jre:1.7.0:update10:*:*:*:*:*:*","matchCriteriaId":"F21933FB-A27C-4AF3-9811-2DE28484A5A6"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:jre:1.7.0:update11:*:*:*:*:*:*","matchCriteriaId":"B2B20041-EB5D-4FA4-AC7D-C35E7878BCFD"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:jre:1.7.0:update13:*:*:*:*:*:*","matchCriteriaId":"F3C3C9C7-73AE-4B1D-AA85-C7F5330A4DE6"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:jre:1.7.0:update15:*:*:*:*:*:*","matchCriteriaId":"1D8BB8D7-D5EC-42D6-BEAA-CB03D1D6513E"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:jre:1.7.0:update17:*:*:*:*:*:*","matchCriteriaId":"37B5B98B-0E41-4397-8AB0-C18C6F10AED1"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:jre:1.7.0:update2:*:*:*:*:*:*","matchCriteriaId":"CB106FA9-26CE-48C5-AEA5-FD1A5454AEE2"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:jre:1.7.0:update21:*:*:*:*:*:*","matchCriteriaId":"4FF6C211-AD55-40FE-9130-77164E586F62"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:jre:1.7.0:update3:*:*:*:*:*:*","matchCriteriaId":"5831D70B-3854-4CB8-B88D-40F1743DAEE0"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:jre:1.7.0:update4:*:*:*:*:*:*","matchCriteriaId":"EEB101C9-CA38-4421-BC0C-C1AD47AA2CC9"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:jre:1.7.0:update5:*:*:*:*:*:*","matchCriteriaId":"BA302DF3-ABBB-4262-B206-4C0F7B5B1E91"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:jre:1.7.0:update6:*:*:*:*:*:*","matchCriteriaId":"F9A8EBCB-5E6A-42F0-8D07-F3A3D1C850F0"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:jre:1.7.0:update7:*:*:*:*:*:*","matchCriteriaId":"0CD8A54E-185B-4D34-82EF-C0C05739EC12"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:jre:1.7.0:update9:*:*:*:*:*:*","matchCriteriaId":"4FFC7F0D-1F32-4235-8359-277CE41382DF"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:jre:1.6.0:-:*:*:*:*:*:*","matchCriteriaId":"EB864346-1429-46B5-A91E-A1126C486421"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:jre:1.6.0:update22:*:*:*:*:*:*","matchCriteriaId":"EF13B96D-1F80-4672-8DA3-F86F6D3BF070"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:jre:1.6.0:update23:*:*:*:*:*:*","matchCriteriaId":"D1A2D440-D966-41A6-955D-38B28DDE0FDB"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:jre:1.6.0:update24:*:*:*:*:*:*","matchCriteriaId":"B1C57774-AD93-4162-8E45-92B09139C808"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:jre:1.6.0:update25:*:*:*:*:*:*","matchCriteriaId":"CD7C4194-D34A-418F-9B00-5C6012844AAE"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:jre:1.6.0:update26:*:*:*:*:*:*","matchCriteriaId":"DAF7D86B-1B4D-4E1F-9EF0-DA7E419D7E99"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:jre:1.6.0:update27:*:*:*:*:*:*","matchCriteriaId":"F0B82FB1-0F0E-44F9-87AE-628517279E4D"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:jre:1.6.0:update29:*:*:*:*:*:*","matchCriteriaId":"A0A67640-2F4A-488A-9D8F-3FE1F4DA8DEF"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:jre:1.6.0:update30:*:*:*:*:*:*","matchCriteriaId":"0D60D98D-4363-44A0-AAB4-B61BA623EE21"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:jre:1.6.0:update31:*:*:*:*:*:*","matchCriteriaId":"23CDA4F0-C32B-4B08-A377-7D4426C2F569"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:jre:1.6.0:update32:*:*:*:*:*:*","matchCriteriaId":"8E76476E-4120-46A9-90A8-A95FE89636CD"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:jre:1.6.0:update33:*:*:*:*:*:*","matchCriteriaId":"97A84689-0CED-404F-8DC3-708BEB37D2CE"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:jre:1.6.0:update34:*:*:*:*:*:*","matchCriteriaId":"738EC3E5-A4EB-47FE-9C9A-7C8E8C669765"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:jre:1.6.0:update35:*:*:*:*:*:*","matchCriteriaId":"FF56E0D9-612D-4215-9C76-560AE0661A05"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:jre:1.6.0:update37:*:*:*:*:*:*","matchCriteriaId":"BA717604-4BB0-4968-B258-7C9F884016FF"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:jre:1.6.0:update38:*:*:*:*:*:*","matchCriteriaId":"AA71FCF4-580F-432D-AADC-65A2A92CEBC8"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:jre:1.6.0:update39:*:*:*:*:*:*","matchCriteriaId":"F1E1A8F3-5A63-401E-9BDA-ACCA30FF6AC8"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:jre:1.6.0:update41:*:*:*:*:*:*","matchCriteriaId":"5C91517E-4C81-4D09-9FCB-B7AC769C7107"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:jre:1.6.0:update43:*:*:*:*:*:*","matchCriteriaId":"8B276B96-66BE-4C09-BE9F-11FA7461CBDF"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:jre:1.6.0:update45:*:*:*:*:*:*","matchCriteriaId":"626E11CA-20EE-4AB0-84D7-8DAE7A9D8960"},{"vulnerable":true,"criteria":"cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:*","matchCriteriaId":"09027C19-D442-446F-B7A8-21DB6787CF43"},{"vulnerable":true,"criteria":"cpe:2.3:a:sun:jre:1.6.0:update_10:*:*:*:*:*:*","matchCriteriaId":"0A0FEC28-0707-4F42-9740-78F3D2D551EE"},{"vulnerable":true,"criteria":"cpe:2.3:a:sun:jre:1.6.0:update_11:*:*:*:*:*:*","matchCriteriaId":"C3C5879A-A608-4230-9DC1-C27F0F48A13B"},{"vulnerable":true,"criteria":"cpe:2.3:a:sun:jre:1.6.0:update_12:*:*:*:*:*:*","matchCriteriaId":"0C71089A-BDDE-41FC-9DF9-9AEF4C2374DF"},{"vulnerable":true,"criteria":"cpe:2.3:a:sun:jre:1.6.0:update_13:*:*:*:*:*:*","matchCriteriaId":"2DBB6B73-8D6B-41FF-BEE0-E0C7F5F1EB41"},{"vulnerable":true,"criteria":"cpe:2.3:a:sun:jre:1.6.0:update_14:*:*:*:*:*:*","matchCriteriaId":"12A3B254-8580-45DB-BDE4-5B5A29CBFFB3"},{"vulnerable":true,"criteria":"cpe:2.3:a:sun:jre:1.6.0:update_15:*:*:*:*:*:*","matchCriteriaId":"1DB1DE6A-66AE-499B-AD92-9E6ACE474C6D"},{"vulnerable":true,"criteria":"cpe:2.3:a:sun:jre:1.6.0:update_16:*:*:*:*:*:*","matchCriteriaId":"AADBB4F9-E43E-428B-9979-F47A15696C85"},{"vulnerable":true,"criteria":"cpe:2.3:a:sun:jre:1.6.0:update_17:*:*:*:*:*:*","matchCriteriaId":"49260B94-05DE-4B78-9068-6F5F6BFDD19E"},{"vulnerable":true,"criteria":"cpe:2.3:a:sun:jre:1.6.0:update_18:*:*:*:*:*:*","matchCriteriaId":"C4FDE9EB-08FE-436E-A265-30E83B15DB23"},{"vulnerable":true,"criteria":"cpe:2.3:a:sun:jre:1.6.0:update_19:*:*:*:*:*:*","matchCriteriaId":"BE409D5C-8F9F-4DE9-ACB7-0E0B813F6399"},{"vulnerable":true,"criteria":"cpe:2.3:a:sun:jre:1.6.0:update_20:*:*:*:*:*:*","matchCriteriaId":"B08C075B-9FC0-4381-A9E4-FFF0362BD308"},{"vulnerable":true,"criteria":"cpe:2.3:a:sun:jre:1.6.0:update_21:*:*:*:*:*:*","matchCriteriaId":"F587E635-3A15-4186-B6A1-F99BE0A56820"},{"vulnerable":true,"criteria":"cpe:2.3:a:sun:jre:1.6.0:update_3:*:*:*:*:*:*","matchCriteriaId":"90EC6C13-4B37-48E5-8199-A702A944D5A6"},{"vulnerable":true,"criteria":"cpe:2.3:a:sun:jre:1.6.0:update_4:*:*:*:*:*:*","matchCriteriaId":"2528152C-E20A-4D97-931C-A5EC3CEAA06D"},{"vulnerable":true,"criteria":"cpe:2.3:a:sun:jre:1.6.0:update_5:*:*:*:*:*:*","matchCriteriaId":"A99DAB4C-272B-4C91-BC70-7729E1152590"},{"vulnerable":true,"criteria":"cpe:2.3:a:sun:jre:1.6.0:update_6:*:*:*:*:*:*","matchCriteriaId":"30DFC10A-A4D9-4F89-B17C-AB9260087D29"},{"vulnerable":true,"criteria":"cpe:2.3:a:sun:jre:1.6.0:update_7:*:*:*:*:*:*","matchCriteriaId":"272A5C44-18EC-41A9-8233-E9D4D0734EA6"},{"vulnerable":true,"criteria":"cpe:2.3:a:sun:jre:1.6.0:update_9:*:*:*:*:*:*","matchCriteriaId":"81C2C04D-D4BA-4C87-9609-C53AA63BFF19"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:jre:1.5.0:-:*:*:*:*:*:*","matchCriteriaId":"D8730889-A618-4CF9-888C-BF95802DD00F"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:jre:1.5.0:update36:*:*:*:*:*:*","matchCriteriaId":"CC062AE6-515B-4D40-9B86-46F7A1D7FF1C"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:jre:1.5.0:update38:*:*:*:*:*:*","matchCriteriaId":"B4A2D725-A7DC-4802-A377-5C3963AD9941"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:jre:1.5.0:update39:*:*:*:*:*:*","matchCriteriaId":"A47E0A76-D6A3-445E-84C8-038497655BBC"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:jre:1.5.0:update40:*:*:*:*:*:*","matchCriteriaId":"A3C6E1D8-B96E-40FB-9E66-9B3A5325E78B"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:jre:1.5.0:update41:*:*:*:*:*:*","matchCriteriaId":"F08A5AAD-84CA-491F-83D3-CEFFD16212E0"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:jre:1.5.0:update45:*:*:*:*:*:*","matchCriteriaId":"A13547EA-EF77-493A-A863-F09E2AEE8BD4"},{"vulnerable":true,"criteria":"cpe:2.3:a:sun:jre:1.5.0:update1:*:*:*:*:*:*","matchCriteriaId":"A7FC09E8-7F30-4FE4-912E-588AA250E2A3"},{"vulnerable":true,"criteria":"cpe:2.3:a:sun:jre:1.5.0:update10:*:*:*:*:*:*","matchCriteriaId":"A586DE4E-8A46-41DE-9FDB-5FDB81DCC87B"},{"vulnerable":true,"criteria":"cpe:2.3:a:sun:jre:1.5.0:update11:*:*:*:*:*:*","matchCriteriaId":"9919D091-73D7-465A-80FF-F37D6CAF9F46"},{"vulnerable":true,"criteria":"cpe:2.3:a:sun:jre:1.5.0:update12:*:*:*:*:*:*","matchCriteriaId":"02565D6F-4CB2-4671-A4EF-3169BCFA6154"},{"vulnerable":true,"criteria":"cpe:2.3:a:sun:jre:1.5.0:update13:*:*:*:*:*:*","matchCriteriaId":"452A3E51-9EAC-451D-BA04-A1E7B7D917EB"},{"vulnerable":true,"criteria":"cpe:2.3:a:sun:jre:1.5.0:update14:*:*:*:*:*:*","matchCriteriaId":"3E8C6AAC-C90B-4220-A69B-2A886A35CF5D"},{"vulnerable":true,"criteria":"cpe:2.3:a:sun:jre:1.5.0:update15:*:*:*:*:*:*","matchCriteriaId":"55231B6B-9298-4363-9B5A-14C2DA7B1F50"},{"vulnerable":true,"criteria":"cpe:2.3:a:sun:jre:1.5.0:update16:*:*:*:*:*:*","matchCriteriaId":"E42CF0F7-418C-4BB6-9B73-FA3B9171D092"},{"vulnerable":true,"criteria":"cpe:2.3:a:sun:jre:1.5.0:update17:*:*:*:*:*:*","matchCriteriaId":"A5467E9D-07D8-4BEB-84D5-A3136C133519"},{"vulnerable":true,"criteria":"cpe:2.3:a:sun:jre:1.5.0:update18:*:*:*:*:*:*","matchCriteriaId":"B83B2CE1-45D7-47AD-BC0A-6EC74D5F8F5A"},{"vulnerable":true,"criteria":"cpe:2.3:a:sun:jre:1.5.0:update19:*:*:*:*:*:*","matchCriteriaId":"8A32F326-EA92-43CD-930E-E527B60CDD3B"},{"vulnerable":true,"criteria":"cpe:2.3:a:sun:jre:1.5.0:update2:*:*:*:*:*:*","matchCriteriaId":"7EA5B9E9-654D-44F7-AE98-3D8B382804AC"},{"vulnerable":true,"criteria":"cpe:2.3:a:sun:jre:1.5.0:update20:*:*:*:*:*:*","matchCriteriaId":"04344167-530E-4A4D-90EF-74C684943DF1"},{"vulnerable":true,"criteria":"cpe:2.3:a:sun:jre:1.5.0:update21:*:*:*:*:*:*","matchCriteriaId":"B0E0373B-201D-408F-9234-A7EFE8B4970D"},{"vulnerable":true,"criteria":"cpe:2.3:a:sun:jre:1.5.0:update22:*:*:*:*:*:*","matchCriteriaId":"15EAD76D-D5D0-4984-9D07-C1451D791083"},{"vulnerable":true,"criteria":"cpe:2.3:a:sun:jre:1.5.0:update23:*:*:*:*:*:*","matchCriteriaId":"DE949EBF-2BC0-4355-8B28-B494023D45FE"},{"vulnerable":true,"criteria":"cpe:2.3:a:sun:jre:1.5.0:update24:*:*:*:*:*:*","matchCriteriaId":"7E0A0A2D-62B9-4A00-84EF-90C15E47A632"},{"vulnerable":true,"criteria":"cpe:2.3:a:sun:jre:1.5.0:update25:*:*:*:*:*:*","matchCriteriaId":"A070A282-CBD6-4041-B149-5E310BD12E7B"},{"vulnerable":true,"criteria":"cpe:2.3:a:sun:jre:1.5.0:update26:*:*:*:*:*:*","matchCriteriaId":"3ECAE71B-C549-4EFB-A509-BFD599F5917A"},{"vulnerable":true,"criteria":"cpe:2.3:a:sun:jre:1.5.0:update27:*:*:*:*:*:*","matchCriteriaId":"044BADDD-A80B-4AE2-8595-5F8186314550"},{"vulnerable":true,"criteria":"cpe:2.3:a:sun:jre:1.5.0:update28:*:*:*:*:*:*","matchCriteriaId":"B7FC11BE-8CF7-4D45-BB4A-3EFA1DDBB10D"},{"vulnerable":true,"criteria":"cpe:2.3:a:sun:jre:1.5.0:update29:*:*:*:*:*:*","matchCriteriaId":"1D75C40D-62AE-47F2-A6E0-53F3495260BD"},{"vulnerable":true,"criteria":"cpe:2.3:a:sun:jre:1.5.0:update3:*:*:*:*:*:*","matchCriteriaId":"44051CFE-D15D-4416-A123-F3E49C67A9E7"},{"vulnerable":true,"criteria":"cpe:2.3:a:sun:jre:1.5.0:update31:*:*:*:*:*:*","matchCriteriaId":"4C061911-FB19-45EB-8E88-7450224F4023"},{"vulnerable":true,"criteria":"cpe:2.3:a:sun:jre:1.5.0:update33:*:*:*:*:*:*","matchCriteriaId":"0E8009BC-F5A8-4D00-9F5F-8635475C6065"},{"vulnerable":true,"criteria":"cpe:2.3:a:sun:jre:1.5.0:update4:*:*:*:*:*:*","matchCriteriaId":"F296ACF3-1373-429D-B991-8B5BA704A7EF"},{"vulnerable":true,"criteria":"cpe:2.3:a:sun:jre:1.5.0:update5:*:*:*:*:*:*","matchCriteriaId":"B863420B-DE16-416A-9640-1A1340A9B855"},{"vulnerable":true,"criteria":"cpe:2.3:a:sun:jre:1.5.0:update6:*:*:*:*:*:*","matchCriteriaId":"724C972F-74FE-4044-BBC4-7E0E61FC9002"},{"vulnerable":true,"criteria":"cpe:2.3:a:sun:jre:1.5.0:update7:*:*:*:*:*:*","matchCriteriaId":"46F41C15-0EF4-4115-BFAA-EEAD56FAEEDB"},{"vulnerable":true,"criteria":"cpe:2.3:a:sun:jre:1.5.0:update8:*:*:*:*:*:*","matchCriteriaId":"EBE909DE-E55A-4BD3-A5BF-ADE407432193"},{"vulnerable":true,"criteria":"cpe:2.3:a:sun:jre:1.5.0:update9:*:*:*:*:*:*","matchCriteriaId":"5DAC04D2-68FD-4793-A8E7-4690A543D7D4"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:suse:linux_enterprise_desktop:10:sp4:*:*:-:*:*:*","matchCriteriaId":"4339DE06-19FB-4B8E-B6AE-3495F605AD05"},{"vulnerable":true,"criteria":"cpe:2.3:o:suse:linux_enterprise_java:10:sp4:*:*:*:*:*:*","matchCriteriaId":"3CF5C5B9-2CB9-4CD8-B94F-A674ED909CC3"},{"vulnerable":true,"criteria":"cpe:2.3:o:suse:linux_enterprise_java:11:sp2:*:*:*:*:*:*","matchCriteriaId":"252CF7A7-3FEB-4503-AEE8-B67139C5B0D5"},{"vulnerable":true,"criteria":"cpe:2.3:o:suse:linux_enterprise_java:11:sp3:*:*:*:*:*:*","matchCriteriaId":"79D7DBBA-6849-45F7-AFEF-C765569C481A"},{"vulnerable":true,"criteria":"cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:ltss:*:*:*","matchCriteriaId":"CED02712-1031-4206-AC4D-E68710F46EC9"},{"vulnerable":true,"criteria":"cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:-:*:*:*","matchCriteriaId":"D1D7B467-58DD-45F1-9F1F-632620DF072A"},{"vulnerable":true,"criteria":"cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:-:*:*","matchCriteriaId":"88D6E858-FD8F-4C55-B7D5-CEEDA2BBA898"},{"vulnerable":true,"criteria":"cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:vmware:*:*","matchCriteriaId":"DB4D6749-81A1-41D7-BF4F-1C45A7F49A22"},{"vulnerable":true,"criteria":"cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:-:*:*","matchCriteriaId":"E534C201-BCC5-473C-AAA7-AAB97CEB5437"},{"vulnerable":true,"criteria":"cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*","matchCriteriaId":"2470C6E8-2024-4CF5-9982-CFF50E88EAE9"},{"vulnerable":true,"criteria":"cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp2:*:*:*:*:*:*","matchCriteriaId":"5AA37837-3083-4DC7-94F4-54FD5D7CB53C"},{"vulnerable":true,"criteria":"cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp3:*:*:*:*:*:*","matchCriteriaId":"2F7F8866-DEAD-44D1-AB10-21EE611AA026"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2013","CveId":"2465","Ordinal":"1","Title":"CVE-2013-2465","CVE":"CVE-2013-2465","Year":"2013"},"notes":[{"CveYear":"2013","CveId":"2465","Ordinal":"1","NoteData":"Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to \"Incorrect image channel verification\" in 2D.","Type":"Description","Title":"CVE-2013-2465"},{"CveYear":"2013","CveId":"2465","Ordinal":"2","NoteData":"2013-06-18","Type":"Other","Title":"Published"},{"CveYear":"2013","CveId":"2465","Ordinal":"3","NoteData":"2018-01-04","Type":"Other","Title":"Modified"}]}}}