IBM Java SDK Technology Edition 5.0.12.4 (5.0 Service Refresh 12 FixPack 4)

CPE Details

IBM Java SDK Technology Edition 5.0.12.4 (5.0 Service Refresh 12 FixPack 4)
5.0.12.4
2014-05-27
17h12 +00:00
2014-05-27
17h20 +00:00
Alerte pour un CPE
Restez informé de toutes modifications pour un CPE spécifique.
Gestion des notifications

CPE Name: cpe:2.3:a:ibm:java_sdk:5.0.12.4:*:*:*:technology:*:*:*

Informations

Vendor

ibm

Product

java_sdk

Version

5.0.12.4

Software Edition

technology

Related CVE

Open and find in CVE List

CVE ID Publié Description Score Gravité
CVE-2015-1931 2020-01-23 17h42 +00:00 IBM Java Security Components in IBM SDK, Java Technology Edition 8 before SR1 FP10, 7 R1 before SR3 FP10, 7 before SR9 FP10, 6 R1 before SR8 FP7, 6 before SR16 FP7, and 5.0 before SR16 FP13 stores plaintext information in memory dumps, which allows local users to obtain sensitive information by reading a file.
5.5
Moyen
CVE-2014-8891 2015-03-06 22h00 +00:00 Unspecified vulnerability in the Java Virtual Machine (JVM) in IBM SDK, Java Technology Edition 5.0 before SR16-FP9, 6 before SR16-FP3, 6R1 before SR8-FP3, 7 before SR8-FP10, and 7R1 before SR2-FP10 allows remote attackers to escape the Java sandbox and execute arbitrary code via unspecified vectors related to the security manager.
10
CVE-2014-8892 2015-03-06 22h00 +00:00 Unspecified vulnerability in the Java Virtual Machine (JVM) in IBM SDK, Java Technology Edition 5.0 before SR16-FP9, 6 before SR16-FP3, 6R1 before SR8-FP3, 7 before SR8-FP10, and 7R1 before SR2-FP10 allows remote attackers to bypass intended access permissions and obtain sensitive information via unspecified vectors related to the security manager.
7.8
CVE-2014-0878 2014-05-26 17h00 +00:00 The IBMSecureRandom component in the IBMJCE and IBMSecureRandom cryptographic providers in IBM SDK Java Technology Edition 5.0 before Service Refresh 16 FP6, 6 before Service Refresh 16, 6.0.1 before Service Refresh 8, 7 before Service Refresh 7, and 7R1 before Service Refresh 1 makes it easier for context-dependent attackers to defeat cryptographic protection mechanisms by predicting the random number generator's output.
5.8