Количество 5
Количество 5
CVE-2014-0385
Unspecified vulnerability in Oracle Java SE 7u45, when installing on OS X, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Install.
CVE-2014-0385
Unspecified vulnerability in Oracle Java SE 7u45, when installing on OS X, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Install.
CVE-2014-0385
Unspecified vulnerability in Oracle Java SE 7u45, when installing on OS X, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Install.
CVE-2014-0385
Unspecified vulnerability in Oracle Java SE 7u45, when installing on O ...
GHSA-j23v-346f-v2ph
Unspecified vulnerability in Oracle Java SE 7u45, when installing on OS X, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Install.
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2014-0385 Unspecified vulnerability in Oracle Java SE 7u45, when installing on OS X, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Install. | CVSS2: 9.3 | 2% Низкий | около 12 лет назад | |
CVE-2014-0385 Unspecified vulnerability in Oracle Java SE 7u45, when installing on OS X, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Install. | CVSS2: 6.8 | 2% Низкий | около 12 лет назад | |
CVE-2014-0385 Unspecified vulnerability in Oracle Java SE 7u45, when installing on OS X, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Install. | CVSS2: 9.3 | 2% Низкий | около 12 лет назад | |
CVE-2014-0385 Unspecified vulnerability in Oracle Java SE 7u45, when installing on O ... | CVSS2: 9.3 | 2% Низкий | около 12 лет назад | |
GHSA-j23v-346f-v2ph Unspecified vulnerability in Oracle Java SE 7u45, when installing on OS X, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Install. | 2% Низкий | больше 3 лет назад |
Уязвимостей на страницу