Total vulnerabilities in the database
IBM Java 7 R1 before SR3, 7 before SR9, 6 R1 before SR8 FP4, 6 before SR16 FP4, and 5.0 before SR16 FP10 allows remote attackers to bypass "permission checks" and obtain sensitive information via vectors related to the Java Virtual Machine.
Software | From | Fixed in |
---|---|---|
ibm / java | 5.0.0.0 | 5.0.16.10 |
ibm / java | 6.1.0.0 | 6.1.8.4 |
ibm / java | 6.0.0.0 | 6.0.16.4 |
ibm / java | 7.1.0.0 | 7.1.3.0 |
ibm / java | 7.0.0.0 | 7.0.9.0 |