CVE-2013-2423
Description
Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, and OpenJDK 7, allows remote attackers to affect integrity via unknown vectors related to HotSpot. NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from the original researcher that this vulnerability allows remote attackers to bypass permission checks by the MethodHandles method and modify arbitrary public final fields using reflection and type confusion, as demonstrated using integer and double fields to disable the security manager.
EPSS (Exploit Prediction Scoring System)
EPSS (Exploit Prediction Scoring System)
Prevede la probabilità di sfruttamento basata su intelligence sulle minacce e sulle caratteristiche della vulnerabilità.
EPSS Score Trend (Last 90 Days)
Improper Access Control
IncompleteCommon Consequences
Applicable Platforms
Java Applet - Reflection Type Confusion Remote Code …
Verified Metasploit Framework (MSF)Java Applet - Reflection Type Confusion Remote Code Execution (Metasploit)
View Exploit Code →Jre by Oracle
cpe:2.3:a:oracle:jre:1.7.0:update7:*:*:*:*:*:*
Jre by Oracle
cpe:2.3:a:oracle:jre:1.7.0:update15:*:*:*:*:*:*
Jre by Oracle
cpe:2.3:a:oracle:jre:1.7.0:update9:*:*:*:*:*:*
Jre by Oracle
cpe:2.3:a:oracle:jre:1.7.0:update3:*:*:*:*:*:*
Jre by Oracle
cpe:2.3:a:oracle:jre:1.7.0:update11:*:*:*:*:*:*
Jre by Oracle
cpe:2.3:a:oracle:jre:1.7.0:update5:*:*:*:*:*:*
Jre by Oracle
cpe:2.3:a:oracle:jre:1.7.0:update2:*:*:*:*:*:*
Jre by Oracle
cpe:2.3:a:oracle:jre:1.7.0:-:*:*:*:*:*:*
Opensuse by Opensuse
cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*
Ubuntu Linux by Canonical
cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
Jre by Oracle
cpe:2.3:a:oracle:jre:1.7.0:update4:*:*:*:*:*:*
Jre by Oracle
cpe:2.3:a:oracle:jre:1.7.0:update10:*:*:*:*:*:*
Jre by Oracle
cpe:2.3:a:oracle:jre:1.7.0:update13:*:*:*:*:*:*
Jre by Oracle
cpe:2.3:a:oracle:jre:1.7.0:update1:*:*:*:*:*:*
Jre by Oracle
cpe:2.3:a:oracle:jre:1.7.0:update6:*:*:*:*:*:*