Vulnerability Database

With exploit

oracle / jrockit

Title Severity Exploit Date Affected Version
CVE-2013-5803 Low Oct 16, 2013 <= r27.7.6
<= r28.2.8
== r27.7.1
== r27.7.2
== r27.7.3
== r27.7.4
== r27.7.5
== r28.0.0
== r28.0.1
== r28.0.2
== r28.1.0
== r28.1.1
== r28.1.3
== r28.1.4
== r28.1.5
== r28.2.2
== r28.2.3
== r28.2.4
== r28.2.5
== r28.2.6
CVE-2013-5804 Medium Oct 16, 2013 <= r27.7.6
<= r28.2.8
== r27.7.1
== r27.7.2
== r27.7.3
== r27.7.4
== r27.7.5
== r28.0.0
== r28.0.1
== r28.0.2
== r28.1.0
== r28.1.1
== r28.1.3
== r28.1.4
== r28.1.5
== r28.2.2
== r28.2.3
== r28.2.4
== r28.2.5
== r28.2.6
CVE-2013-5823 Medium Oct 16, 2013 <= r27.7.6
<= r28.2.8
== r27.7.1
== r27.7.2
== r27.7.3
== r27.7.4
== r27.7.5
== r28.0.0
== r28.0.1
== r28.0.2
== r28.1.0
== r28.1.1
== r28.1.3
== r28.1.4
== r28.1.5
== r28.2.2
== r28.2.3
== r28.2.4
== r28.2.5
== r28.2.6
CVE-2013-5825 Medium Oct 16, 2013 <= r27.7.6
<= r28.2.8
== r27.7.1
== r27.7.2
== r27.7.3
== r27.7.4
== r27.7.5
== r28.0.0
== r28.0.1
== r28.0.2
== r28.1.0
== r28.1.1
== r28.1.3
== r28.1.4
== r28.1.5
== r28.2.2
== r28.2.3
== r28.2.4
== r28.2.5
== r28.2.6
CVE-2013-5830 High Oct 16, 2013 <= r28.2.8
CVE-2013-5780 Low Oct 16, 2013 <= r27.7.6
<= r28.2.8
== r27.7.1
== r27.7.2
== r27.7.3
== r27.7.4
== r27.7.5
== r28.0.0
== r28.0.1
== r28.0.2
== r28.1.0
== r28.1.1
== r28.1.3
== r28.1.4
== r28.1.5
== r28.2.2
== r28.2.3
== r28.2.4
== r28.2.5
== r28.2.6
CVE-2013-5782 High Oct 16, 2013 <= r27.7.6
<= r28.2.8
== r27.7.1
== r27.7.2
== r27.7.3
== r27.7.4
== r27.7.5
== r28.0.0
== r28.0.1
== r28.0.2
== r28.1.0
== r28.1.1
== r28.1.3
== r28.1.4
== r28.1.5
== r28.2.2
== r28.2.3
== r28.2.4
== r28.2.5
== r28.2.6
CVE-2013-4002 High Jul 23, 2013 >= r27.7.0 <= r27.7.6
>= r28.0.0 <= r28.2.8
CVE-2013-2461 High Jun 19, 2013 >= r27.7.1 <= r27.7.5
>= r28.0.0 <= r28.2.7
CVE-2013-2380 High Apr 17, 2013 == r27.3
== r28.1.0
== r28.1.1
== r28.1.3
== r27.3.1
== r28.0.1
== r27.2
<= r27.4
== r28.0.2
<= r28.2.6
== r27.1
== r28.0.0
== r28.1.4