Oracle Java JRE CVE-2013-1480 Vulnerability

description-logoDescription

Supported versions that are affected are 7 Update 11 and before, 6 Update 38 and before, 5.0 Update 38 and before and 1.4.2_40 and before. Easily exploitable vulnerability allows successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability can result in unauthorized Operating System takeover including arbitrary code execution. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through untrusted Java Web Start applications and untrusted Java applets. It can also be exploited by supplying data to APIs in the specified Component without using untrusted Java Web Start applications or untrusted Java applets, such as through a web service.

affected-products-logoAffected Applications

Java JRE

CVE References

CVE-2013-1480