CVE-2012-4822
11.01.2013, 00:55
Multiple unspecified vulnerabilities in the JRE component in IBM Java 7 SR2 and earlier, Java 6.0.1 SR3 and earlier, Java 6 SR11 and earlier, Java 5 SR14 and earlier, and Java 142 SR13 FP13 and earlier; as used in IBM Rational Host On-Demand, Rational Change, Tivoli Monitoring, Smart Analytics System 5600, Tivoli Remote Control 5.1.2, WebSphere Real Time, Lotus Notes & Domino, Tivoli Storage Productivity Center, and Service Deliver Manager; and other products from other vendors such as Red Hat, allow remote attackers to execute arbitrary code via vectors related to "insecure use [of] multiple methods in the java.lang.class class."Enginsight
Vendor | Product | Version |
---|---|---|
ibm | java | 1.4.2 ≤ 𝑥 ≤ 1.4.2.13.13 |
ibm | java | 5.0.0.0 ≤ 𝑥 ≤ 5.0.14.0 |
ibm | java | 6.0.0.0 ≤ 𝑥 ≤ 6.0.11.0 |
ibm | java | 7.0.0.0 ≤ 𝑥 ≤ 7.0.2.0 |
ibm | lotus_domino | 8.0 |
ibm | lotus_domino | 8.0.1 |
ibm | lotus_domino | 8.0.2 |
ibm | lotus_domino | 8.0.2.1 |
ibm | lotus_domino | 8.0.2.2 |
ibm | lotus_domino | 8.0.2.3 |
ibm | lotus_domino | 8.0.2.4 |
ibm | lotus_domino | 8.5.0 |
ibm | lotus_domino | 8.5.0.1 |
ibm | lotus_domino | 8.5.1 |
ibm | lotus_domino | 8.5.1.1 |
ibm | lotus_domino | 8.5.1.2 |
ibm | lotus_domino | 8.5.1.3 |
ibm | lotus_domino | 8.5.1.4 |
ibm | lotus_domino | 8.5.1.5 |
ibm | lotus_domino | 8.5.2.0 |
ibm | lotus_domino | 8.5.2.1 |
ibm | lotus_domino | 8.5.2.2 |
ibm | lotus_domino | 8.5.2.3 |
ibm | lotus_domino | 8.5.2.4 |
ibm | lotus_domino | 8.5.3.0 |
ibm | lotus_domino | 8.5.3.1 |
ibm | lotus_domino | 8.5.3.2 |
ibm | lotus_notes | 8.0 |
ibm | lotus_notes | 8.0.0 |
ibm | lotus_notes | 8.0.1 |
ibm | lotus_notes | 8.0.2 |
ibm | lotus_notes | 8.0.2.0 |
ibm | lotus_notes | 8.0.2.1 |
ibm | lotus_notes | 8.0.2.2 |
ibm | lotus_notes | 8.0.2.3 |
ibm | lotus_notes | 8.0.2.4 |
ibm | lotus_notes | 8.0.2.5 |
ibm | lotus_notes | 8.0.2.6 |
ibm | lotus_notes | 8.5 |
ibm | lotus_notes | 8.5.0.0 |
ibm | lotus_notes | 8.5.0.1 |
ibm | lotus_notes | 8.5.1 |
ibm | lotus_notes | 8.5.1.0 |
ibm | lotus_notes | 8.5.1.1 |
ibm | lotus_notes | 8.5.1.2 |
ibm | lotus_notes | 8.5.1.3 |
ibm | lotus_notes | 8.5.1.4 |
ibm | lotus_notes | 8.5.1.5 |
ibm | lotus_notes | 8.5.2.0 |
ibm | lotus_notes | 8.5.2.1 |
ibm | lotus_notes | 8.5.2.2 |
ibm | lotus_notes | 8.5.2.3 |
ibm | lotus_notes | 8.5.3 |
ibm | lotus_notes | 8.5.3.1 |
ibm | lotus_notes | 8.5.3.2 |
ibm | lotus_notes | 8.5.4 |
ibm | lotus_notes_sametime | 8.0.80407 |
ibm | lotus_notes_sametime | 8.0.80822 |
ibm | lotus_notes_sametime | 8.5.1.20100709-1631 |
ibm | lotus_notes_traveler | 8.0 |
ibm | lotus_notes_traveler | 8.0.1 |
ibm | lotus_notes_traveler | 8.0.1.2 |
ibm | lotus_notes_traveler | 8.0.1.3 |
ibm | lotus_notes_traveler | 8.5.0.0 |
ibm | lotus_notes_traveler | 8.5.0.1 |
ibm | lotus_notes_traveler | 8.5.0.2 |
ibm | lotus_notes_traveler | 8.5.1.1 |
ibm | lotus_notes_traveler | 8.5.1.2 |
ibm | lotus_notes_traveler | 8.5.1.3 |
ibm | lotus_notes_traveler | 8.5.2.1 |
ibm | lotus_notes_traveler | 8.5.3 |
ibm | lotus_notes_traveler | 8.5.3.1 |
ibm | lotus_notes_traveler | 8.5.3.2 |
ibm | lotus_notes_traveler | 8.5.3.3 |
ibm | lotus_notes_traveler | 8.5.3.3:interim_fix_1 |
ibm | rational_change | 4.7 |
ibm | rational_change | 5.1 |
ibm | rational_change | 5.2 |
ibm | rational_change | 5.3 |
ibm | rational_host_on-demand | 1.6.0.12 |
ibm | rational_host_on-demand | 8.0.8.0 |
ibm | rational_host_on-demand | 9.0.8.0 |
ibm | rational_host_on-demand | 10.0.9.0 |
ibm | rational_host_on-demand | 10.0.10.0 |
ibm | rational_host_on-demand | 11.0.3.0 |
ibm | rational_host_on-demand | 11.0.4.0 |
ibm | rational_host_on-demand | 11.0.5.0 |
ibm | rational_host_on-demand | 11.0.5.1 |
ibm | rational_host_on-demand | 11.0.6.0 |
ibm | rational_host_on-demand | 11.0.6.1 |
ibm | service_delivery_manager | 7.2.1.0 |
ibm | service_delivery_manager | 7.2.2.0 |
ibm | smart_analytics_system_5600_software | - |
ibm | smart_analytics_system_5600_software | 9.7 |
ibm | tivoli_monitoring | 6.1.0 |
ibm | tivoli_monitoring | 6.1.0.7 |
ibm | tivoli_monitoring | 6.2.0 |
ibm | tivoli_monitoring | 6.2.0.1 |
ibm | tivoli_monitoring | 6.2.0.2 |
ibm | tivoli_monitoring | 6.2.0.3 |
ibm | tivoli_monitoring | 6.2.1 |
ibm | tivoli_monitoring | 6.2.1.0 |
ibm | tivoli_monitoring | 6.2.1.1 |
ibm | tivoli_monitoring | 6.2.1.2 |
ibm | tivoli_monitoring | 6.2.1.3 |
ibm | tivoli_monitoring | 6.2.1.4 |
ibm | tivoli_monitoring | 6.2.2 |
ibm | tivoli_monitoring | 6.2.2.0 |
ibm | tivoli_monitoring | 6.2.2.1 |
ibm | tivoli_monitoring | 6.2.2.2 |
ibm | tivoli_monitoring | 6.2.2.3 |
ibm | tivoli_monitoring | 6.2.2.4 |
ibm | tivoli_monitoring | 6.2.2.5 |
ibm | tivoli_monitoring | 6.2.2.6 |
ibm | tivoli_monitoring | 6.2.2.7 |
ibm | tivoli_monitoring | 6.2.2.8 |
ibm | tivoli_monitoring | 6.2.2.9 |
ibm | tivoli_monitoring | 6.2.3 |
ibm | tivoli_monitoring | 6.2.3.0 |
ibm | tivoli_monitoring | 6.2.3.1 |
ibm | tivoli_monitoring | 6.2.3.2 |
ibm | tivoli_remote_control | 5.1.2 |
ibm | websphere_real_time | 2.0 |
ibm | websphere_real_time | 3.0 |
tivoli_storage_productivity_center | 5.0 | * |
tivoli_storage_productivity_center | 5.1 | * |
tivoli_storage_productivity_center | 5.1.1 | * |
𝑥
= Vulnerable software versions
References