<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet type="text/xsl" href="2967710.xsl"?>
<?xml-stylesheet type="text/css" href="2967708.css"?>
<cvrf:cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
   <DocumentTitle xml:lang="en">Oracle Critical Patch Update Advisory - June 2013 - Beta Oracle CVRF</DocumentTitle>
   <DocumentType xml:lang="en">Oracle Critical Patch Update Advisory</DocumentType>
   <DocumentPublisher Type="Vendor"/>
   <DocumentTracking>
      <Identification>
         <ID>JavaCPUJun2013</ID>
      </Identification>
      <Status>Final</Status>
      <Version>1.0</Version>
      <RevisionHistory>
         <Revision>
            <Number>1.0</Number>
            <Date>2013-06-18T13:00:00-07:00</Date>
            <Description>Initial Distribution</Description>
         </Revision>
      </RevisionHistory>
      <InitialReleaseDate>2013-06-18T13:00:00-07:00</InitialReleaseDate>
      <CurrentReleaseDate>2013-06-18T13:00:00-07:00</CurrentReleaseDate>
   </DocumentTracking>
   <DocumentNotes>
      <Note Audience="All" Ordinal="1" Title="Summary" Type="Summary" xml:lang="en">This document contains descriptions of Oracle product security vulnerabilities which have had fixes released for all supported versions and platforms for the associated product.  Additional information regarding these vulnerabilities including fix distribution information can be found at the Oracle sites referenced in this document.</Note>
   </DocumentNotes>
   <DocumentDistribution>This document is published at: http://www.oracle.com/ocom/groups/public/@otn/documents/webcontent/1841216.xml</DocumentDistribution>
   <DocumentReferences>
      <Reference Type="External">
         <URL>https://www.oracle.com/security-alerts/javacpujun2013.html</URL>
         <Description>URL to html version of Advisory</Description>
      </Reference>
   </DocumentReferences>
   <Acknowledgments>
      <Acknowledgment>
         <Name>Adam Gowdiak</Name>
         <Organization>Security Explorations</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Ben Murphy</Name>
         <Organization>HP's Zero Day Initiative</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Fermin J Serna</Name>
         <Organization>Google</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Hasegawa Yosuke</Name>
         <Organization>HASEGAWA Yosuke</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>James Forshaw</Name>
         <Organization>Context Information Security</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Sam Thomas</Name>
         <Organization>Pentest Limited</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Tim Brown and Tim Varkalis</Name>
         <Organization>Portcullis Computer Security Ltd</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Vitaliy Toropov</Name>
         <Organization>HP's Zero Day Initiative</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Vladimir Krivopalov</Name>
         <Organization>F5 Networks Inc</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Wouter Coekaerts</Name>
         <Organization>Wouter Coekaerts</Organization>
      </Acknowledgment>
   </Acknowledgments>
   <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
      <Branch Name="Oracle" Type="Vendor">
         <Branch Name="Oracle Java SE" Type="Product Family">
            <Branch Name="Sun Java" Type="Product Name">
               <Branch Name="5.0 Update 45 and before" Type="Product Version">
                  <FullProductName ProductID="P-856V-5.0 Update 45 and before">Sun Java Version 5.0 Update 45 and before</FullProductName>
               </Branch>
               <Branch Name="6 Update 45 and before" Type="Product Version">
                  <FullProductName ProductID="P-856V-6 Update 45 and before">Sun Java Version 6 Update 45 and before</FullProductName>
               </Branch>
               <Branch Name="7 Update 21 and before" Type="Product Version">
                  <FullProductName ProductID="P-856V-7 Update 21 and before">Sun Java Version 7 Update 21 and before</FullProductName>
               </Branch>
               <Branch Name="JavaFX 2.2.21 and before" Type="Product Version">
                  <FullProductName ProductID="P-856V-JavaFX 2.2.21 and before">Sun Java Version JavaFX 2.2.21 and before</FullProductName>
               </Branch>
            </Branch>
         </Branch>
      </Branch>
   </ProductTree>
   <Vulnerability Ordinal="1" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-1500</Title>
      <Notes>
         <Note Audience="All" Ordinal="1" Title="Details" Type="Details">Vulnerability in the Java Runtime Environment component of Oracle Java SE (subcomponent: 2D).  Supported versions that are affected are 7 Update 21 and before, 6 Update 45 and before and  5.0 Update 45 and before. Easily exploitable vulnerability requiring logon to Operating System.  Successful attack of this vulnerability can result in unauthorized  update, insert or delete access to some Java Runtime Environment accessible data as well as  read access to a subset of Java Runtime Environment accessible data.   Note: Applies to client deployment of Java only. This issue cannot be exploited through sandboxed Java Web Start applications and sandboxed Java applets. Local access is required to leverage this issue. CVSS Base Score 3.6 (Confidentiality and Integrity impacts).  CVSS V2 Vector: (AV:L/AC:L/Au:N/C:P/I:P/A:N).  Oracle Vector: (AV:L/AC:L/Au:N/C:P/I:P/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-1500</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-856V-7 Update 21 and before</ProductID>
            <ProductID>P-856V-6 Update 45 and before</ProductID>
            <ProductID>P-856V-5.0 Update 45 and before</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>3.6</BaseScore>
            <Vector>AV:L/AC:L/Au:N/C:P/I:P/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>JavaCPUJun2013</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/javacpujun2013.html</URL>
            <ProductID>P-856V-7 Update 21 and before</ProductID>
            <ProductID>P-856V-6 Update 45 and before</ProductID>
            <ProductID>P-856V-5.0 Update 45 and before</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="2" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-1571</Title>
      <Notes>
         <Note Audience="All" Ordinal="2" Title="Details" Type="Details">Vulnerability in the Javadoc component of Oracle Java SE.  Supported versions that are affected are 7 Update 21 and before, 6 Update 45 and before, 5.0 Update 45 and before and  JavaFX 2.2.21 and before. Difficult to exploit vulnerability allows successful unauthenticated network attacks via HTTP.  Successful attack of this vulnerability can result in unauthorized  update, insert or delete access to some Javadoc accessible data.   Note: Applies to the Javadoc tool and documentation generated by the tool. This vulnerability can be exploited only through Javadoc output hosted on a web server. This addresses CERT/CC VU#225657 (See http://www.kb.cert.org/vuls/id/225657). CVSS Base Score 4.3 (Integrity impacts).  CVSS V2 Vector: (AV:N/AC:M/Au:N/C:N/I:P/A:N).  Oracle Vector: (AV:N/AC:M/Au:N/C:N/I:P/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-1571</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-856V-7 Update 21 and before</ProductID>
            <ProductID>P-856V-6 Update 45 and before</ProductID>
            <ProductID>P-856V-5.0 Update 45 and before</ProductID>
            <ProductID>P-856V-JavaFX 2.2.21 and before</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>4.3</BaseScore>
            <Vector>AV:N/AC:M/Au:N/C:N/I:P/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>JavaCPUJun2013</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/javacpujun2013.html</URL>
            <ProductID>P-856V-7 Update 21 and before</ProductID>
            <ProductID>P-856V-6 Update 45 and before</ProductID>
            <ProductID>P-856V-5.0 Update 45 and before</ProductID>
            <ProductID>P-856V-JavaFX 2.2.21 and before</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="3" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-2400</Title>
      <Notes>
         <Note Audience="All" Ordinal="3" Title="Details" Type="Details">Vulnerability in the Java Runtime Environment component of Oracle Java SE (subcomponent: Deployment).  Supported versions that are affected are 7 Update 21 and before. Easily exploitable vulnerability allows successful unauthenticated network attacks via multiple protocols.  Successful attack of this vulnerability can result in unauthorized  update, insert or delete access to some Java Runtime Environment accessible data.   Note: Applies to client deployment of Java only. This vulnerability can be
exploited only through sandboxed Java Web Start applications and
sandboxed Java applets. CVSS Base Score 5.0 (Integrity impacts).  CVSS V2 Vector: (AV:N/AC:L/Au:N/C:N/I:P/A:N).  Oracle Vector: (AV:N/AC:L/Au:N/C:N/I:P/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-2400</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-856V-7 Update 21 and before</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>5.0</BaseScore>
            <Vector>AV:N/AC:L/Au:N/C:N/I:P/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>JavaCPUJun2013</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/javacpujun2013.html</URL>
            <ProductID>P-856V-7 Update 21 and before</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="4" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-2407</Title>
      <Notes>
         <Note Audience="All" Ordinal="4" Title="Details" Type="Details">Vulnerability in the Java Runtime Environment component of Oracle Java SE (subcomponent: Libraries).  Supported versions that are affected are 7 Update 21 and before and  6 Update 45 and before. Easily exploitable vulnerability allows successful unauthenticated network attacks via multiple protocols.  Successful attack of this vulnerability can result in unauthorized  read access to a subset of Java Runtime Environment accessible data and ability to cause a partial denial of service (partial DOS) of Java Runtime Environment.   Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS Base Score 6.4 (Confidentiality and Availability impacts).  CVSS V2 Vector: (AV:N/AC:L/Au:N/C:P/I:N/A:P).  Oracle Vector: (AV:N/AC:L/Au:N/C:P/I:N/A:P).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-2407</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-856V-7 Update 21 and before</ProductID>
            <ProductID>P-856V-6 Update 45 and before</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>6.4</BaseScore>
            <Vector>AV:N/AC:L/Au:N/C:P/I:N/A:P</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>JavaCPUJun2013</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/javacpujun2013.html</URL>
            <ProductID>P-856V-7 Update 21 and before</ProductID>
            <ProductID>P-856V-6 Update 45 and before</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="5" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-2412</Title>
      <Notes>
         <Note Audience="All" Ordinal="5" Title="Details" Type="Details">Vulnerability in the Java Runtime Environment component of Oracle Java SE (subcomponent: Serviceability).  Supported versions that are affected are 7 Update 21 and before and  6 Update 45 and before. Easily exploitable vulnerability allows successful unauthenticated network attacks via multiple protocols.  Successful attack of this vulnerability can result in unauthorized  read access to a subset of Java Runtime Environment accessible data.   Note: Applies to client deployment of Java only. This vulnerability can be
exploited only through sandboxed Java Web Start applications and
sandboxed Java applets. CVSS Base Score 5.0 (Confidentiality impacts).  CVSS V2 Vector: (AV:N/AC:L/Au:N/C:P/I:N/A:N).  Oracle Vector: (AV:N/AC:L/Au:N/C:P/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-2412</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-856V-7 Update 21 and before</ProductID>
            <ProductID>P-856V-6 Update 45 and before</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>5.0</BaseScore>
            <Vector>AV:N/AC:L/Au:N/C:P/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>JavaCPUJun2013</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/javacpujun2013.html</URL>
            <ProductID>P-856V-7 Update 21 and before</ProductID>
            <ProductID>P-856V-6 Update 45 and before</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="6" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-2437</Title>
      <Notes>
         <Note Audience="All" Ordinal="6" Title="Details" Type="Details">Vulnerability in the Java Runtime Environment component of Oracle Java SE (subcomponent: Deployment).  Supported versions that are affected are 7 Update 21 and before and  6 Update 45 and before. Easily exploitable vulnerability allows successful unauthenticated network attacks via multiple protocols.  Successful attack of this vulnerability can result in unauthorized  read access to a subset of Java Runtime Environment accessible data.   Note: Applies to client deployment of Java only. This vulnerability can be
exploited only through sandboxed Java Web Start applications and
sandboxed Java applets. CVSS Base Score 5.0 (Confidentiality impacts).  CVSS V2 Vector: (AV:N/AC:L/Au:N/C:P/I:N/A:N).  Oracle Vector: (AV:N/AC:L/Au:N/C:P/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-2437</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-856V-7 Update 21 and before</ProductID>
            <ProductID>P-856V-6 Update 45 and before</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>5.0</BaseScore>
            <Vector>AV:N/AC:L/Au:N/C:P/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>JavaCPUJun2013</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/javacpujun2013.html</URL>
            <ProductID>P-856V-7 Update 21 and before</ProductID>
            <ProductID>P-856V-6 Update 45 and before</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="7" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-2442</Title>
      <Notes>
         <Note Audience="All" Ordinal="7" Title="Details" Type="Details">Vulnerability in the Java Runtime Environment component of Oracle Java SE (subcomponent: Deployment).  Supported versions that are affected are 7 Update 21 and before and  6 Update 45 and before. Easily exploitable vulnerability allows successful unauthenticated network attacks via multiple protocols.  Successful attack of this vulnerability can result in unauthorized  update, insert or delete access to some Java Runtime Environment accessible data as well as  read access to a subset of Java Runtime Environment accessible data and ability to cause a partial denial of service (partial DOS) of Java Runtime Environment.   Note: Applies to client deployment of Java only. This vulnerability can be
exploited only through sandboxed Java Web Start applications and
sandboxed Java applets. CVSS Base Score 7.5 (Confidentiality, Integrity and Availability impacts).  CVSS V2 Vector: (AV:N/AC:L/Au:N/C:P/I:P/A:P).  Oracle Vector: (AV:N/AC:L/Au:N/C:P/I:P/A:P).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-2442</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-856V-7 Update 21 and before</ProductID>
            <ProductID>P-856V-6 Update 45 and before</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.5</BaseScore>
            <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>JavaCPUJun2013</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/javacpujun2013.html</URL>
            <ProductID>P-856V-7 Update 21 and before</ProductID>
            <ProductID>P-856V-6 Update 45 and before</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="8" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-2443</Title>
      <Notes>
         <Note Audience="All" Ordinal="8" Title="Details" Type="Details">Vulnerability in the Java Runtime Environment component of Oracle Java SE (subcomponent: Libraries).  Supported versions that are affected are 7 Update 21 and before, 6 Update 45 and before and  5.0 Update 45 and before. Easily exploitable vulnerability allows successful unauthenticated network attacks via multiple protocols.  Successful attack of this vulnerability can result in unauthorized  read access to a subset of Java Runtime Environment accessible data.   Note: Applies to client deployment of Java only. This vulnerability can be
exploited only through sandboxed Java Web Start applications and
sandboxed Java applets. CVSS Base Score 5.0 (Confidentiality impacts).  CVSS V2 Vector: (AV:N/AC:L/Au:N/C:P/I:N/A:N).  Oracle Vector: (AV:N/AC:L/Au:N/C:P/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-2443</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-856V-7 Update 21 and before</ProductID>
            <ProductID>P-856V-6 Update 45 and before</ProductID>
            <ProductID>P-856V-5.0 Update 45 and before</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>5.0</BaseScore>
            <Vector>AV:N/AC:L/Au:N/C:P/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>JavaCPUJun2013</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/javacpujun2013.html</URL>
            <ProductID>P-856V-7 Update 21 and before</ProductID>
            <ProductID>P-856V-6 Update 45 and before</ProductID>
            <ProductID>P-856V-5.0 Update 45 and before</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="9" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-2444</Title>
      <Notes>
         <Note Audience="All" Ordinal="9" Title="Details" Type="Details">Vulnerability in the Java Runtime Environment component of Oracle Java SE (subcomponent: AWT).  Supported versions that are affected are 7 Update 21 and before, 6 Update 45 and before, 5.0 Update 45 and before and  JavaFX 2.2.21 and before. Easily exploitable vulnerability allows successful unauthenticated network attacks via multiple protocols.  Successful attack of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java Runtime Environment.   Note: Applies to client deployment of Java only. This vulnerability can be
exploited only through sandboxed Java Web Start applications and
sandboxed Java applets. CVSS Base Score 5.0 (Availability impacts).  CVSS V2 Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:P).  Oracle Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:P).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-2444</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-856V-7 Update 21 and before</ProductID>
            <ProductID>P-856V-6 Update 45 and before</ProductID>
            <ProductID>P-856V-5.0 Update 45 and before</ProductID>
            <ProductID>P-856V-JavaFX 2.2.21 and before</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>5.0</BaseScore>
            <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>JavaCPUJun2013</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/javacpujun2013.html</URL>
            <ProductID>P-856V-7 Update 21 and before</ProductID>
            <ProductID>P-856V-6 Update 45 and before</ProductID>
            <ProductID>P-856V-5.0 Update 45 and before</ProductID>
            <ProductID>P-856V-JavaFX 2.2.21 and before</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="10" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-2445</Title>
      <Notes>
         <Note Audience="All" Ordinal="10" Title="Details" Type="Details">Vulnerability in the Java Runtime Environment component of Oracle Java SE (subcomponent: Hotspot).  Supported versions that are affected are 7 Update 21 and before, 6 Update 45 and before and  5.0 Update 45 and before. Easily exploitable vulnerability allows successful unauthenticated network attacks via multiple protocols.  Successful attack of this vulnerability can result in unauthorized Operating System hang or frequently repeatable crash (complete DOS).   Note: Applies to client deployment of Java only. This vulnerability can be
exploited only through sandboxed Java Web Start applications and
sandboxed Java applets. CVSS Base Score 7.8 (Availability impacts).  CVSS V2 Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:C).  Oracle Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:C).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-2445</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-856V-7 Update 21 and before</ProductID>
            <ProductID>P-856V-6 Update 45 and before</ProductID>
            <ProductID>P-856V-5.0 Update 45 and before</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.8</BaseScore>
            <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:C</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>JavaCPUJun2013</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/javacpujun2013.html</URL>
            <ProductID>P-856V-7 Update 21 and before</ProductID>
            <ProductID>P-856V-6 Update 45 and before</ProductID>
            <ProductID>P-856V-5.0 Update 45 and before</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="11" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-2446</Title>
      <Notes>
         <Note Audience="All" Ordinal="11" Title="Details" Type="Details">Vulnerability in the Java Runtime Environment component of Oracle Java SE (subcomponent: CORBA).  Supported versions that are affected are 7 Update 21 and before, 6 Update 45 and before and  5.0 Update 45 and before. Easily exploitable vulnerability allows successful unauthenticated network attacks via multiple protocols.  Successful attack of this vulnerability can result in unauthorized  read access to a subset of Java Runtime Environment accessible data.   Note: Applies to client deployment of Java only. This vulnerability can be
exploited only through sandboxed Java Web Start applications and
sandboxed Java applets. CVSS Base Score 5.0 (Confidentiality impacts).  CVSS V2 Vector: (AV:N/AC:L/Au:N/C:P/I:N/A:N).  Oracle Vector: (AV:N/AC:L/Au:N/C:P/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-2446</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-856V-7 Update 21 and before</ProductID>
            <ProductID>P-856V-6 Update 45 and before</ProductID>
            <ProductID>P-856V-5.0 Update 45 and before</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>5.0</BaseScore>
            <Vector>AV:N/AC:L/Au:N/C:P/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>JavaCPUJun2013</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/javacpujun2013.html</URL>
            <ProductID>P-856V-7 Update 21 and before</ProductID>
            <ProductID>P-856V-6 Update 45 and before</ProductID>
            <ProductID>P-856V-5.0 Update 45 and before</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="12" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-2447</Title>
      <Notes>
         <Note Audience="All" Ordinal="12" Title="Details" Type="Details">Vulnerability in the Java Runtime Environment component of Oracle Java SE (subcomponent: Networking).  Supported versions that are affected are 7 Update 21 and before, 6 Update 45 and before and  5.0 Update 45 and before. Easily exploitable vulnerability allows successful unauthenticated network attacks via multiple protocols.  Successful attack of this vulnerability can result in unauthorized  read access to a subset of Java Runtime Environment accessible data.   Note: Applies to client deployment of Java only. This vulnerability can be
exploited only through sandboxed Java Web Start applications and
sandboxed Java applets. CVSS Base Score 5.0 (Confidentiality impacts).  CVSS V2 Vector: (AV:N/AC:L/Au:N/C:P/I:N/A:N).  Oracle Vector: (AV:N/AC:L/Au:N/C:P/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-2447</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-856V-7 Update 21 and before</ProductID>
            <ProductID>P-856V-6 Update 45 and before</ProductID>
            <ProductID>P-856V-5.0 Update 45 and before</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>5.0</BaseScore>
            <Vector>AV:N/AC:L/Au:N/C:P/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>JavaCPUJun2013</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/javacpujun2013.html</URL>
            <ProductID>P-856V-7 Update 21 and before</ProductID>
            <ProductID>P-856V-6 Update 45 and before</ProductID>
            <ProductID>P-856V-5.0 Update 45 and before</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="13" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-2448</Title>
      <Notes>
         <Note Audience="All" Ordinal="13" Title="Details" Type="Details">Vulnerability in the Java Runtime Environment component of Oracle Java SE (subcomponent: Sound).  Supported versions that are affected are 7 Update 21 and before, 6 Update 45 and before and  5.0 Update 45 and before. Very difficult to exploit vulnerability allows successful unauthenticated network attacks via multiple protocols.  Successful attack of this vulnerability can result in unauthorized Operating System takeover including arbitrary code execution.   Note: Applies to client deployment of Java only. This vulnerability can be
exploited only through sandboxed Java Web Start applications and
sandboxed Java applets. CVSS Base Score 7.6 (Confidentiality, Integrity and Availability impacts).  CVSS V2 Vector: (AV:N/AC:H/Au:N/C:C/I:C/A:C).  Oracle Vector: (AV:N/AC:H/Au:N/C:C/I:C/A:C).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-2448</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-856V-7 Update 21 and before</ProductID>
            <ProductID>P-856V-6 Update 45 and before</ProductID>
            <ProductID>P-856V-5.0 Update 45 and before</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.6</BaseScore>
            <Vector>AV:N/AC:H/Au:N/C:C/I:C/A:C</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>JavaCPUJun2013</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/javacpujun2013.html</URL>
            <ProductID>P-856V-7 Update 21 and before</ProductID>
            <ProductID>P-856V-6 Update 45 and before</ProductID>
            <ProductID>P-856V-5.0 Update 45 and before</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="14" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-2449</Title>
      <Notes>
         <Note Audience="All" Ordinal="14" Title="Details" Type="Details">Vulnerability in the Java Runtime Environment component of Oracle Java SE (subcomponent: Libraries).  Supported versions that are affected are 7 Update 21 and before. Difficult to exploit vulnerability allows successful unauthenticated network attacks via multiple protocols.  Successful attack of this vulnerability can result in unauthorized  read access to a subset of Java Runtime Environment accessible data.   Note: Applies to client deployment of Java only. This vulnerability can be
exploited only through sandboxed Java Web Start applications and
sandboxed Java applets. CVSS Base Score 4.3 (Confidentiality impacts).  CVSS V2 Vector: (AV:N/AC:M/Au:N/C:P/I:N/A:N).  Oracle Vector: (AV:N/AC:M/Au:N/C:P/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-2449</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-856V-7 Update 21 and before</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>4.3</BaseScore>
            <Vector>AV:N/AC:M/Au:N/C:P/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>JavaCPUJun2013</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/javacpujun2013.html</URL>
            <ProductID>P-856V-7 Update 21 and before</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="15" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-2450</Title>
      <Notes>
         <Note Audience="All" Ordinal="15" Title="Details" Type="Details">Vulnerability in the Java Runtime Environment component of Oracle Java SE (subcomponent: Serialization).  Supported versions that are affected are 7 Update 21 and before, 6 Update 45 and before and  5.0 Update 45 and before. Easily exploitable vulnerability allows successful unauthenticated network attacks via multiple protocols.  Successful attack of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java Runtime Environment.   Note: Applies to client deployment of Java only. This vulnerability can be
exploited only through sandboxed Java Web Start applications and
sandboxed Java applets. CVSS Base Score 5.0 (Availability impacts).  CVSS V2 Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:P).  Oracle Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:P).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-2450</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-856V-7 Update 21 and before</ProductID>
            <ProductID>P-856V-6 Update 45 and before</ProductID>
            <ProductID>P-856V-5.0 Update 45 and before</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>5.0</BaseScore>
            <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>JavaCPUJun2013</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/javacpujun2013.html</URL>
            <ProductID>P-856V-7 Update 21 and before</ProductID>
            <ProductID>P-856V-6 Update 45 and before</ProductID>
            <ProductID>P-856V-5.0 Update 45 and before</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="16" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-2451</Title>
      <Notes>
         <Note Audience="All" Ordinal="16" Title="Details" Type="Details">Vulnerability in the Java Runtime Environment component of Oracle Java SE (subcomponent: Networking).  Supported versions that are affected are 7 Update 21 and before and  6 Update 45 and before. Very difficult to exploit vulnerability requiring logon to Operating System.  Successful attack of this vulnerability can result in unauthorized  update, insert or delete access to some Java Runtime Environment accessible data as well as  read access to a subset of Java Runtime Environment accessible data and ability to cause a partial denial of service (partial DOS) of Java Runtime Environment.   Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS Base Score 3.7 (Confidentiality, Integrity and Availability impacts).  CVSS V2 Vector: (AV:L/AC:H/Au:N/C:P/I:P/A:P).  Oracle Vector: (AV:L/AC:H/Au:N/C:P/I:P/A:P).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-2451</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-856V-7 Update 21 and before</ProductID>
            <ProductID>P-856V-6 Update 45 and before</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>3.7</BaseScore>
            <Vector>AV:L/AC:H/Au:N/C:P/I:P/A:P</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>JavaCPUJun2013</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/javacpujun2013.html</URL>
            <ProductID>P-856V-7 Update 21 and before</ProductID>
            <ProductID>P-856V-6 Update 45 and before</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="17" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-2452</Title>
      <Notes>
         <Note Audience="All" Ordinal="17" Title="Details" Type="Details">Vulnerability in the Java Runtime Environment component of Oracle Java SE (subcomponent: Libraries).  Supported versions that are affected are 7 Update 21 and before, 6 Update 45 and before and  5.0 Update 45 and before. Easily exploitable vulnerability allows successful unauthenticated network attacks via multiple protocols.  Successful attack of this vulnerability can result in unauthorized  read access to a subset of Java Runtime Environment accessible data.   Note: Applies to client deployment of Java only. This vulnerability can be
exploited only through sandboxed Java Web Start applications and
sandboxed Java applets. CVSS Base Score 5.0 (Confidentiality impacts).  CVSS V2 Vector: (AV:N/AC:L/Au:N/C:P/I:N/A:N).  Oracle Vector: (AV:N/AC:L/Au:N/C:P/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-2452</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-856V-7 Update 21 and before</ProductID>
            <ProductID>P-856V-6 Update 45 and before</ProductID>
            <ProductID>P-856V-5.0 Update 45 and before</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>5.0</BaseScore>
            <Vector>AV:N/AC:L/Au:N/C:P/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>JavaCPUJun2013</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/javacpujun2013.html</URL>
            <ProductID>P-856V-7 Update 21 and before</ProductID>
            <ProductID>P-856V-6 Update 45 and before</ProductID>
            <ProductID>P-856V-5.0 Update 45 and before</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="18" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-2453</Title>
      <Notes>
         <Note Audience="All" Ordinal="18" Title="Details" Type="Details">Vulnerability in the Java Runtime Environment component of Oracle Java SE (subcomponent: JMX).  Supported versions that are affected are 7 Update 21 and before and  6 Update 45 and before. Easily exploitable vulnerability allows successful unauthenticated network attacks via multiple protocols.  Successful attack of this vulnerability can result in unauthorized  update, insert or delete access to some Java Runtime Environment accessible data.   Note: Applies to client deployment of Java only. This vulnerability can be
exploited only through sandboxed Java Web Start applications and
sandboxed Java applets. CVSS Base Score 5.0 (Integrity impacts).  CVSS V2 Vector: (AV:N/AC:L/Au:N/C:N/I:P/A:N).  Oracle Vector: (AV:N/AC:L/Au:N/C:N/I:P/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-2453</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-856V-7 Update 21 and before</ProductID>
            <ProductID>P-856V-6 Update 45 and before</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>5.0</BaseScore>
            <Vector>AV:N/AC:L/Au:N/C:N/I:P/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>JavaCPUJun2013</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/javacpujun2013.html</URL>
            <ProductID>P-856V-7 Update 21 and before</ProductID>
            <ProductID>P-856V-6 Update 45 and before</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="19" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-2454</Title>
      <Notes>
         <Note Audience="All" Ordinal="19" Title="Details" Type="Details">Vulnerability in the Java Runtime Environment component of Oracle Java SE (subcomponent: JDBC).  Supported versions that are affected are 7 Update 21 and before, 6 Update 45 and before and  5.0 Update 45 and before. Difficult to exploit vulnerability allows successful unauthenticated network attacks via multiple protocols.  Successful attack of this vulnerability can result in unauthorized  update, insert or delete access to some Java Runtime Environment accessible data as well as  read access to a subset of Java Runtime Environment accessible data.   Note: Applies to client deployment of Java only. This vulnerability can be
exploited only through sandboxed Java Web Start applications and
sandboxed Java applets. CVSS Base Score 5.8 (Confidentiality and Integrity impacts).  CVSS V2 Vector: (AV:N/AC:M/Au:N/C:P/I:P/A:N).  Oracle Vector: (AV:N/AC:M/Au:N/C:P/I:P/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-2454</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-856V-7 Update 21 and before</ProductID>
            <ProductID>P-856V-6 Update 45 and before</ProductID>
            <ProductID>P-856V-5.0 Update 45 and before</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>5.8</BaseScore>
            <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>JavaCPUJun2013</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/javacpujun2013.html</URL>
            <ProductID>P-856V-7 Update 21 and before</ProductID>
            <ProductID>P-856V-6 Update 45 and before</ProductID>
            <ProductID>P-856V-5.0 Update 45 and before</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="20" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-2455</Title>
      <Notes>
         <Note Audience="All" Ordinal="20" Title="Details" Type="Details">Vulnerability in the Java Runtime Environment component of Oracle Java SE (subcomponent: Libraries).  Supported versions that are affected are 7 Update 21 and before, 6 Update 45 and before and  5.0 Update 45 and before. Easily exploitable vulnerability allows successful unauthenticated network attacks via multiple protocols.  Successful attack of this vulnerability can result in unauthorized  read access to a subset of Java Runtime Environment accessible data.   Note: Applies to client deployment of Java only. This vulnerability can be
exploited only through sandboxed Java Web Start applications and
sandboxed Java applets. CVSS Base Score 5.0 (Confidentiality impacts).  CVSS V2 Vector: (AV:N/AC:L/Au:N/C:P/I:N/A:N).  Oracle Vector: (AV:N/AC:L/Au:N/C:P/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-2455</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-856V-7 Update 21 and before</ProductID>
            <ProductID>P-856V-6 Update 45 and before</ProductID>
            <ProductID>P-856V-5.0 Update 45 and before</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>5.0</BaseScore>
            <Vector>AV:N/AC:L/Au:N/C:P/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>JavaCPUJun2013</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/javacpujun2013.html</URL>
            <ProductID>P-856V-7 Update 21 and before</ProductID>
            <ProductID>P-856V-6 Update 45 and before</ProductID>
            <ProductID>P-856V-5.0 Update 45 and before</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="21" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-2456</Title>
      <Notes>
         <Note Audience="All" Ordinal="21" Title="Details" Type="Details">Vulnerability in the Java Runtime Environment component of Oracle Java SE (subcomponent: Serialization).  Supported versions that are affected are 7 Update 21 and before, 6 Update 45 and before and  5.0 Update 45 and before. Easily exploitable vulnerability allows successful unauthenticated network attacks via multiple protocols.  Successful attack of this vulnerability can result in unauthorized  read access to a subset of Java Runtime Environment accessible data.   Note: Applies to client deployment of Java only. This vulnerability can be
exploited only through sandboxed Java Web Start applications and
sandboxed Java applets. CVSS Base Score 5.0 (Confidentiality impacts).  CVSS V2 Vector: (AV:N/AC:L/Au:N/C:P/I:N/A:N).  Oracle Vector: (AV:N/AC:L/Au:N/C:P/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-2456</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-856V-7 Update 21 and before</ProductID>
            <ProductID>P-856V-6 Update 45 and before</ProductID>
            <ProductID>P-856V-5.0 Update 45 and before</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>5.0</BaseScore>
            <Vector>AV:N/AC:L/Au:N/C:P/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>JavaCPUJun2013</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/javacpujun2013.html</URL>
            <ProductID>P-856V-7 Update 21 and before</ProductID>
            <ProductID>P-856V-6 Update 45 and before</ProductID>
            <ProductID>P-856V-5.0 Update 45 and before</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="22" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-2457</Title>
      <Notes>
         <Note Audience="All" Ordinal="22" Title="Details" Type="Details">Vulnerability in the Java Runtime Environment component of Oracle Java SE (subcomponent: JMX).  Supported versions that are affected are 7 Update 21 and before, 6 Update 45 and before and  5.0 Update 45 and before. Easily exploitable vulnerability allows successful unauthenticated network attacks via multiple protocols.  Successful attack of this vulnerability can result in unauthorized  update, insert or delete access to some Java Runtime Environment accessible data.   Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS Base Score 5.0 (Integrity impacts).  CVSS V2 Vector: (AV:N/AC:L/Au:N/C:N/I:P/A:N).  Oracle Vector: (AV:N/AC:L/Au:N/C:N/I:P/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-2457</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-856V-7 Update 21 and before</ProductID>
            <ProductID>P-856V-6 Update 45 and before</ProductID>
            <ProductID>P-856V-5.0 Update 45 and before</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>5.0</BaseScore>
            <Vector>AV:N/AC:L/Au:N/C:N/I:P/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>JavaCPUJun2013</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/javacpujun2013.html</URL>
            <ProductID>P-856V-7 Update 21 and before</ProductID>
            <ProductID>P-856V-6 Update 45 and before</ProductID>
            <ProductID>P-856V-5.0 Update 45 and before</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="23" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-2458</Title>
      <Notes>
         <Note Audience="All" Ordinal="23" Title="Details" Type="Details">Vulnerability in the Java Runtime Environment component of Oracle Java SE (subcomponent: Libraries).  Supported versions that are affected are 7 Update 21 and before. Difficult to exploit vulnerability allows successful unauthenticated network attacks via multiple protocols.  Successful attack of this vulnerability can result in unauthorized  update, insert or delete access to some Java Runtime Environment accessible data as well as  read access to a subset of Java Runtime Environment accessible data.   Note: Applies to client deployment of Java only. This vulnerability can be
exploited only through sandboxed Java Web Start applications and
sandboxed Java applets. CVSS Base Score 5.8 (Confidentiality and Integrity impacts).  CVSS V2 Vector: (AV:N/AC:M/Au:N/C:P/I:P/A:N).  Oracle Vector: (AV:N/AC:M/Au:N/C:P/I:P/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-2458</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-856V-7 Update 21 and before</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>5.8</BaseScore>
            <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>JavaCPUJun2013</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/javacpujun2013.html</URL>
            <ProductID>P-856V-7 Update 21 and before</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="24" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-2459</Title>
      <Notes>
         <Note Audience="All" Ordinal="24" Title="Details" Type="Details">Vulnerability in the Java Runtime Environment component of Oracle Java SE (subcomponent: AWT).  Supported versions that are affected are 7 Update 21 and before, 6 Update 45 and before and  5.0 Update 45 and before. Easily exploitable vulnerability allows successful unauthenticated network attacks via multiple protocols.  Successful attack of this vulnerability can result in unauthorized Operating System takeover including arbitrary code execution.   Note: Applies to client deployment of Java only. This vulnerability can be
exploited only through sandboxed Java Web Start applications and
sandboxed Java applets. CVSS Base Score 10.0 (Confidentiality, Integrity and Availability impacts).  CVSS V2 Vector: (AV:N/AC:L/Au:N/C:C/I:C/A:C).  Oracle Vector: (AV:N/AC:L/Au:N/C:C/I:C/A:C).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-2459</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-856V-7 Update 21 and before</ProductID>
            <ProductID>P-856V-6 Update 45 and before</ProductID>
            <ProductID>P-856V-5.0 Update 45 and before</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>10.0</BaseScore>
            <Vector>AV:N/AC:L/Au:N/C:C/I:C/A:C</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>JavaCPUJun2013</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/javacpujun2013.html</URL>
            <ProductID>P-856V-7 Update 21 and before</ProductID>
            <ProductID>P-856V-6 Update 45 and before</ProductID>
            <ProductID>P-856V-5.0 Update 45 and before</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="25" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-2460</Title>
      <Notes>
         <Note Audience="All" Ordinal="25" Title="Details" Type="Details">Vulnerability in the Java Runtime Environment component of Oracle Java SE (subcomponent: Serviceability).  Supported versions that are affected are 7 Update 21 and before. Difficult to exploit vulnerability allows successful unauthenticated network attacks via multiple protocols.  Successful attack of this vulnerability can result in unauthorized Operating System takeover including arbitrary code execution.   Note: Applies to client deployment of Java only. This vulnerability can be
exploited only through sandboxed Java Web Start applications and
sandboxed Java applets. CVSS Base Score 9.3 (Confidentiality, Integrity and Availability impacts).  CVSS V2 Vector: (AV:N/AC:M/Au:N/C:C/I:C/A:C).  Oracle Vector: (AV:N/AC:M/Au:N/C:C/I:C/A:C).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-2460</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-856V-7 Update 21 and before</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>9.3</BaseScore>
            <Vector>AV:N/AC:M/Au:N/C:C/I:C/A:C</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>JavaCPUJun2013</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/javacpujun2013.html</URL>
            <ProductID>P-856V-7 Update 21 and before</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="26" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-2461</Title>
      <Notes>
         <Note Audience="All" Ordinal="26" Title="Details" Type="Details">Vulnerability in the Java Runtime Environment component of Oracle Java SE (subcomponent: Libraries).  Supported versions that are affected are 7 Update 21 and before and  6 Update 45 and before. Easily exploitable vulnerability allows successful unauthenticated network attacks via multiple protocols.  Successful attack of this vulnerability can result in unauthorized  update, insert or delete access to some Java Runtime Environment accessible data as well as  read access to a subset of Java Runtime Environment accessible data and ability to cause a partial denial of service (partial DOS) of Java Runtime Environment.   Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS Base Score 7.5 (Confidentiality, Integrity and Availability impacts).  CVSS V2 Vector: (AV:N/AC:L/Au:N/C:P/I:P/A:P).  Oracle Vector: (AV:N/AC:L/Au:N/C:P/I:P/A:P).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-2461</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-856V-7 Update 21 and before</ProductID>
            <ProductID>P-856V-6 Update 45 and before</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.5</BaseScore>
            <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>JavaCPUJun2013</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/javacpujun2013.html</URL>
            <ProductID>P-856V-7 Update 21 and before</ProductID>
            <ProductID>P-856V-6 Update 45 and before</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="27" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-2462</Title>
      <Notes>
         <Note Audience="All" Ordinal="27" Title="Details" Type="Details">Vulnerability in the Java Runtime Environment component of Oracle Java SE (subcomponent: Deployment).  Supported versions that are affected are 7 Update 21 and before. Difficult to exploit vulnerability allows successful unauthenticated network attacks via multiple protocols.  Successful attack of this vulnerability can result in unauthorized Operating System takeover including arbitrary code execution.   Note: Applies to client deployment of Java only. This vulnerability can be
exploited only through sandboxed Java Web Start applications and
sandboxed Java applets. CVSS Base Score 9.3 (Confidentiality, Integrity and Availability impacts).  CVSS V2 Vector: (AV:N/AC:M/Au:N/C:C/I:C/A:C).  Oracle Vector: (AV:N/AC:M/Au:N/C:C/I:C/A:C).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-2462</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-856V-7 Update 21 and before</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>9.3</BaseScore>
            <Vector>AV:N/AC:M/Au:N/C:C/I:C/A:C</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>JavaCPUJun2013</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/javacpujun2013.html</URL>
            <ProductID>P-856V-7 Update 21 and before</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="28" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-2463</Title>
      <Notes>
         <Note Audience="All" Ordinal="28" Title="Details" Type="Details">Vulnerability in the Java Runtime Environment component of Oracle Java SE (subcomponent: 2D).  Supported versions that are affected are 7 Update 21 and before, 6 Update 45 and before and  5.0 Update 45 and before. Easily exploitable vulnerability allows successful unauthenticated network attacks via multiple protocols.  Successful attack of this vulnerability can result in unauthorized Operating System takeover including arbitrary code execution.   Note: Applies to client deployment of Java only. This vulnerability can be
exploited only through sandboxed Java Web Start applications and
sandboxed Java applets. CVSS Base Score 10.0 (Confidentiality, Integrity and Availability impacts).  CVSS V2 Vector: (AV:N/AC:L/Au:N/C:C/I:C/A:C).  Oracle Vector: (AV:N/AC:L/Au:N/C:C/I:C/A:C).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-2463</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-856V-7 Update 21 and before</ProductID>
            <ProductID>P-856V-6 Update 45 and before</ProductID>
            <ProductID>P-856V-5.0 Update 45 and before</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>10.0</BaseScore>
            <Vector>AV:N/AC:L/Au:N/C:C/I:C/A:C</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>JavaCPUJun2013</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/javacpujun2013.html</URL>
            <ProductID>P-856V-7 Update 21 and before</ProductID>
            <ProductID>P-856V-6 Update 45 and before</ProductID>
            <ProductID>P-856V-5.0 Update 45 and before</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="29" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-2464</Title>
      <Notes>
         <Note Audience="All" Ordinal="29" Title="Details" Type="Details">Vulnerability in the Java Runtime Environment component of Oracle Java SE (subcomponent: 2D).  Supported versions that are affected are 7 Update 21 and before, 6 Update 45 and before and  5.0 Update 45 and before. Easily exploitable vulnerability allows successful unauthenticated network attacks via multiple protocols.  Successful attack of this vulnerability can result in unauthorized Operating System takeover including arbitrary code execution.   Note: Applies to client deployment of Java only. This vulnerability can be
exploited only through sandboxed Java Web Start applications and
sandboxed Java applets. CVSS Base Score 10.0 (Confidentiality, Integrity and Availability impacts).  CVSS V2 Vector: (AV:N/AC:L/Au:N/C:C/I:C/A:C).  Oracle Vector: (AV:N/AC:L/Au:N/C:C/I:C/A:C).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-2464</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-856V-7 Update 21 and before</ProductID>
            <ProductID>P-856V-6 Update 45 and before</ProductID>
            <ProductID>P-856V-5.0 Update 45 and before</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>10.0</BaseScore>
            <Vector>AV:N/AC:L/Au:N/C:C/I:C/A:C</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>JavaCPUJun2013</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/javacpujun2013.html</URL>
            <ProductID>P-856V-7 Update 21 and before</ProductID>
            <ProductID>P-856V-6 Update 45 and before</ProductID>
            <ProductID>P-856V-5.0 Update 45 and before</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="30" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-2465</Title>
      <Notes>
         <Note Audience="All" Ordinal="30" Title="Details" Type="Details">Vulnerability in the Java Runtime Environment component of Oracle Java SE (subcomponent: 2D).  Supported versions that are affected are 7 Update 21 and before, 6 Update 45 and before and  5.0 Update 45 and before. Easily exploitable vulnerability allows successful unauthenticated network attacks via multiple protocols.  Successful attack of this vulnerability can result in unauthorized Operating System takeover including arbitrary code execution.   Note: Applies to client deployment of Java only. This vulnerability can be
exploited only through sandboxed Java Web Start applications and
sandboxed Java applets. CVSS Base Score 10.0 (Confidentiality, Integrity and Availability impacts).  CVSS V2 Vector: (AV:N/AC:L/Au:N/C:C/I:C/A:C).  Oracle Vector: (AV:N/AC:L/Au:N/C:C/I:C/A:C).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-2465</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-856V-7 Update 21 and before</ProductID>
            <ProductID>P-856V-6 Update 45 and before</ProductID>
            <ProductID>P-856V-5.0 Update 45 and before</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>10.0</BaseScore>
            <Vector>AV:N/AC:L/Au:N/C:C/I:C/A:C</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>JavaCPUJun2013</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/javacpujun2013.html</URL>
            <ProductID>P-856V-7 Update 21 and before</ProductID>
            <ProductID>P-856V-6 Update 45 and before</ProductID>
            <ProductID>P-856V-5.0 Update 45 and before</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="31" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-2466</Title>
      <Notes>
         <Note Audience="All" Ordinal="31" Title="Details" Type="Details">Vulnerability in the Java Runtime Environment component of Oracle Java SE (subcomponent: Deployment).  Supported versions that are affected are 7 Update 21 and before and  6 Update 45 and before. Easily exploitable vulnerability allows successful unauthenticated network attacks via multiple protocols.  Successful attack of this vulnerability can result in unauthorized Operating System takeover including arbitrary code execution.   Note: Applies to client deployment of Java only. This vulnerability can be
exploited only through sandboxed Java Web Start applications and
sandboxed Java applets. CVSS Base Score 10.0 (Confidentiality, Integrity and Availability impacts).  CVSS V2 Vector: (AV:N/AC:L/Au:N/C:C/I:C/A:C).  Oracle Vector: (AV:N/AC:L/Au:N/C:C/I:C/A:C).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-2466</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-856V-7 Update 21 and before</ProductID>
            <ProductID>P-856V-6 Update 45 and before</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>10.0</BaseScore>
            <Vector>AV:N/AC:L/Au:N/C:C/I:C/A:C</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>JavaCPUJun2013</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/javacpujun2013.html</URL>
            <ProductID>P-856V-7 Update 21 and before</ProductID>
            <ProductID>P-856V-6 Update 45 and before</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="32" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-2467</Title>
      <Notes>
         <Note Audience="All" Ordinal="32" Title="Details" Type="Details">Vulnerability in the Java Runtime Environment component of Oracle Java SE (subcomponent: Install).  Supported versions that are affected are 5.0 Update 45 and before. Difficult to exploit vulnerability requiring logon to Operating System.  Successful attack of this vulnerability can result in unauthorized Operating System takeover including arbitrary code execution.   Note: Applies to the Java installer only. This issue cannot be exploited through sandboxed Java Web Start applications and sandboxed Java applets. Local access is
required to leverage this issue. CVSS Base Score 6.9 (Confidentiality, Integrity and Availability impacts).  CVSS V2 Vector: (AV:L/AC:M/Au:N/C:C/I:C/A:C).  Oracle Vector: (AV:L/AC:M/Au:N/C:C/I:C/A:C).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-2467</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-856V-5.0 Update 45 and before</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>6.9</BaseScore>
            <Vector>AV:L/AC:M/Au:N/C:C/I:C/A:C</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>JavaCPUJun2013</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/javacpujun2013.html</URL>
            <ProductID>P-856V-5.0 Update 45 and before</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="33" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-2468</Title>
      <Notes>
         <Note Audience="All" Ordinal="33" Title="Details" Type="Details">Vulnerability in the Java Runtime Environment component of Oracle Java SE (subcomponent: Deployment).  Supported versions that are affected are 7 Update 21 and before and  6 Update 45 and before. Easily exploitable vulnerability allows successful unauthenticated network attacks via multiple protocols.  Successful attack of this vulnerability can result in unauthorized Operating System takeover including arbitrary code execution.   Note: Applies to client deployment of Java only. This vulnerability can be
exploited only through sandboxed Java Web Start applications and
sandboxed Java applets. CVSS Base Score 10.0 (Confidentiality, Integrity and Availability impacts).  CVSS V2 Vector: (AV:N/AC:L/Au:N/C:C/I:C/A:C).  Oracle Vector: (AV:N/AC:L/Au:N/C:C/I:C/A:C).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-2468</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-856V-7 Update 21 and before</ProductID>
            <ProductID>P-856V-6 Update 45 and before</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>10.0</BaseScore>
            <Vector>AV:N/AC:L/Au:N/C:C/I:C/A:C</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>JavaCPUJun2013</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/javacpujun2013.html</URL>
            <ProductID>P-856V-7 Update 21 and before</ProductID>
            <ProductID>P-856V-6 Update 45 and before</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="34" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-2469</Title>
      <Notes>
         <Note Audience="All" Ordinal="34" Title="Details" Type="Details">Vulnerability in the Java Runtime Environment component of Oracle Java SE (subcomponent: 2D).  Supported versions that are affected are 7 Update 21 and before, 6 Update 45 and before and  5.0 Update 45 and before. Easily exploitable vulnerability allows successful unauthenticated network attacks via multiple protocols.  Successful attack of this vulnerability can result in unauthorized Operating System takeover including arbitrary code execution.   Note: Applies to client deployment of Java only. This vulnerability can be
exploited only through sandboxed Java Web Start applications and
sandboxed Java applets. CVSS Base Score 10.0 (Confidentiality, Integrity and Availability impacts).  CVSS V2 Vector: (AV:N/AC:L/Au:N/C:C/I:C/A:C).  Oracle Vector: (AV:N/AC:L/Au:N/C:C/I:C/A:C).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-2469</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-856V-7 Update 21 and before</ProductID>
            <ProductID>P-856V-6 Update 45 and before</ProductID>
            <ProductID>P-856V-5.0 Update 45 and before</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>10.0</BaseScore>
            <Vector>AV:N/AC:L/Au:N/C:C/I:C/A:C</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>JavaCPUJun2013</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/javacpujun2013.html</URL>
            <ProductID>P-856V-7 Update 21 and before</ProductID>
            <ProductID>P-856V-6 Update 45 and before</ProductID>
            <ProductID>P-856V-5.0 Update 45 and before</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="35" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-2470</Title>
      <Notes>
         <Note Audience="All" Ordinal="35" Title="Details" Type="Details">Vulnerability in the Java Runtime Environment component of Oracle Java SE (subcomponent: 2D).  Supported versions that are affected are 7 Update 21 and before, 6 Update 45 and before and  5.0 Update 45 and before. Easily exploitable vulnerability allows successful unauthenticated network attacks via multiple protocols.  Successful attack of this vulnerability can result in unauthorized Operating System takeover including arbitrary code execution.   Note: Applies to client deployment of Java only. This vulnerability can be
exploited only through sandboxed Java Web Start applications and
sandboxed Java applets. CVSS Base Score 10.0 (Confidentiality, Integrity and Availability impacts).  CVSS V2 Vector: (AV:N/AC:L/Au:N/C:C/I:C/A:C).  Oracle Vector: (AV:N/AC:L/Au:N/C:C/I:C/A:C).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-2470</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-856V-7 Update 21 and before</ProductID>
            <ProductID>P-856V-6 Update 45 and before</ProductID>
            <ProductID>P-856V-5.0 Update 45 and before</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>10.0</BaseScore>
            <Vector>AV:N/AC:L/Au:N/C:C/I:C/A:C</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>JavaCPUJun2013</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/javacpujun2013.html</URL>
            <ProductID>P-856V-7 Update 21 and before</ProductID>
            <ProductID>P-856V-6 Update 45 and before</ProductID>
            <ProductID>P-856V-5.0 Update 45 and before</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="36" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-2471</Title>
      <Notes>
         <Note Audience="All" Ordinal="36" Title="Details" Type="Details">Vulnerability in the Java Runtime Environment component of Oracle Java SE (subcomponent: 2D).  Supported versions that are affected are 7 Update 21 and before, 6 Update 45 and before and  5.0 Update 45 and before. Easily exploitable vulnerability allows successful unauthenticated network attacks via multiple protocols.  Successful attack of this vulnerability can result in unauthorized Operating System takeover including arbitrary code execution.   Note: Applies to client deployment of Java only. This vulnerability can be
exploited only through sandboxed Java Web Start applications and
sandboxed Java applets. CVSS Base Score 10.0 (Confidentiality, Integrity and Availability impacts).  CVSS V2 Vector: (AV:N/AC:L/Au:N/C:C/I:C/A:C).  Oracle Vector: (AV:N/AC:L/Au:N/C:C/I:C/A:C).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-2471</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-856V-7 Update 21 and before</ProductID>
            <ProductID>P-856V-6 Update 45 and before</ProductID>
            <ProductID>P-856V-5.0 Update 45 and before</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>10.0</BaseScore>
            <Vector>AV:N/AC:L/Au:N/C:C/I:C/A:C</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>JavaCPUJun2013</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/javacpujun2013.html</URL>
            <ProductID>P-856V-7 Update 21 and before</ProductID>
            <ProductID>P-856V-6 Update 45 and before</ProductID>
            <ProductID>P-856V-5.0 Update 45 and before</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="37" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-2472</Title>
      <Notes>
         <Note Audience="All" Ordinal="37" Title="Details" Type="Details">Vulnerability in the Java Runtime Environment component of Oracle Java SE (subcomponent: 2D).  Supported versions that are affected are 7 Update 21 and before, 6 Update 45 and before and  5.0 Update 45 and before. Easily exploitable vulnerability allows successful unauthenticated network attacks via multiple protocols.  Successful attack of this vulnerability can result in unauthorized Operating System takeover including arbitrary code execution.   Note: Applies to client deployment of Java only. This vulnerability can be
exploited only through sandboxed Java Web Start applications and
sandboxed Java applets. CVSS Base Score 10.0 (Confidentiality, Integrity and Availability impacts).  CVSS V2 Vector: (AV:N/AC:L/Au:N/C:C/I:C/A:C).  Oracle Vector: (AV:N/AC:L/Au:N/C:C/I:C/A:C).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-2472</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-856V-7 Update 21 and before</ProductID>
            <ProductID>P-856V-6 Update 45 and before</ProductID>
            <ProductID>P-856V-5.0 Update 45 and before</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>10.0</BaseScore>
            <Vector>AV:N/AC:L/Au:N/C:C/I:C/A:C</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>JavaCPUJun2013</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/javacpujun2013.html</URL>
            <ProductID>P-856V-7 Update 21 and before</ProductID>
            <ProductID>P-856V-6 Update 45 and before</ProductID>
            <ProductID>P-856V-5.0 Update 45 and before</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="38" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-2473</Title>
      <Notes>
         <Note Audience="All" Ordinal="38" Title="Details" Type="Details">Vulnerability in the Java Runtime Environment component of Oracle Java SE (subcomponent: 2D).  Supported versions that are affected are 7 Update 21 and before, 6 Update 45 and before and  5.0 Update 45 and before. Easily exploitable vulnerability allows successful unauthenticated network attacks via multiple protocols.  Successful attack of this vulnerability can result in unauthorized Operating System takeover including arbitrary code execution.   Note: Applies to client deployment of Java only. This vulnerability can be
exploited only through sandboxed Java Web Start applications and
sandboxed Java applets. CVSS Base Score 10.0 (Confidentiality, Integrity and Availability impacts).  CVSS V2 Vector: (AV:N/AC:L/Au:N/C:C/I:C/A:C).  Oracle Vector: (AV:N/AC:L/Au:N/C:C/I:C/A:C).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-2473</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-856V-7 Update 21 and before</ProductID>
            <ProductID>P-856V-6 Update 45 and before</ProductID>
            <ProductID>P-856V-5.0 Update 45 and before</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>10.0</BaseScore>
            <Vector>AV:N/AC:L/Au:N/C:C/I:C/A:C</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>JavaCPUJun2013</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/javacpujun2013.html</URL>
            <ProductID>P-856V-7 Update 21 and before</ProductID>
            <ProductID>P-856V-6 Update 45 and before</ProductID>
            <ProductID>P-856V-5.0 Update 45 and before</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="39" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-3743</Title>
      <Notes>
         <Note Audience="All" Ordinal="39" Title="Details" Type="Details">Vulnerability in the Java Runtime Environment component of Oracle Java SE (subcomponent: AWT).  Supported versions that are affected are 6 Update 45 and before and  5.0 Update 45 and before. Difficult to exploit vulnerability allows successful unauthenticated network attacks via multiple protocols.  Successful attack of this vulnerability can result in unauthorized Operating System takeover including arbitrary code execution.   Note: Applies to client deployment of Java only. This vulnerability can be
exploited only through sandboxed Java Web Start applications and
sandboxed Java applets. CVSS Base Score 9.3 (Confidentiality, Integrity and Availability impacts).  CVSS V2 Vector: (AV:N/AC:M/Au:N/C:C/I:C/A:C).  Oracle Vector: (AV:N/AC:M/Au:N/C:C/I:C/A:C).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-3743</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-856V-6 Update 45 and before</ProductID>
            <ProductID>P-856V-5.0 Update 45 and before</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>9.3</BaseScore>
            <Vector>AV:N/AC:M/Au:N/C:C/I:C/A:C</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>JavaCPUJun2013</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/javacpujun2013.html</URL>
            <ProductID>P-856V-6 Update 45 and before</ProductID>
            <ProductID>P-856V-5.0 Update 45 and before</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="40" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-3744</Title>
      <Notes>
         <Note Audience="All" Ordinal="40" Title="Details" Type="Details">Vulnerability in the Java Runtime Environment component of Oracle Java SE (subcomponent: Deployment).  Supported versions that are affected are 7 Update 21 and before. Easily exploitable vulnerability allows successful unauthenticated network attacks via multiple protocols.  Successful attack of this vulnerability can result in unauthorized  update, insert or delete access to some Java Runtime Environment accessible data.   Note: Applies to client deployment of Java only. This vulnerability can be
exploited only through sandboxed Java Web Start applications and
sandboxed Java applets. CVSS Base Score 5.0 (Integrity impacts).  CVSS V2 Vector: (AV:N/AC:L/Au:N/C:N/I:P/A:N).  Oracle Vector: (AV:N/AC:L/Au:N/C:N/I:P/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-3744</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-856V-7 Update 21 and before</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>5.0</BaseScore>
            <Vector>AV:N/AC:L/Au:N/C:N/I:P/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>JavaCPUJun2013</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/javacpujun2013.html</URL>
            <ProductID>P-856V-7 Update 21 and before</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
</cvrf:cvrfdoc>
