{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-20T04:38:24.630","vulnerabilities":[{"cve":{"id":"CVE-2013-5788","sourceIdentifier":"secalert_us@oracle.com","published":"2013-10-16T15:55:34.587","lastModified":"2025-04-11T00:51:21.963","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"Unspecified vulnerability in Oracle Java SE 7u40 and earlier and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment."},{"lang":"es","value":"Vulnerabilidad no especificada en Oracle Java SE 7u40 y anteriores y Java SE Embedded 7u40 y anteriores permite a atacantes remotos afectar la confidencialidad, integridad y disponibilidad a través de vectores desconocidos relacionados con Deployment."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:jdk:*:*:*:*:*:*:*:*","versionEndExcluding":"1.7.0","matchCriteriaId":"8586C281-5388-4B7A-AB6B-52804472D9F5"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:jdk:1.7.0:-:*:*:*:*:*:*","matchCriteriaId":"ACABC935-5DD6-4F85-992E-70AD517EF41D"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:jdk:1.7.0:update1:*:*:*:*:*:*","matchCriteriaId":"6152036D-6421-4AE4-9223-766FE07B5A44"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:jdk:1.7.0:update10:*:*:*:*:*:*","matchCriteriaId":"FE8B0935-6637-413D-B896-28E0ED7F2CEC"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:jdk:1.7.0:update11:*:*:*:*:*:*","matchCriteriaId":"30B480BC-0886-4B19-B0A5-57B531077F40"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:jdk:1.7.0:update13:*:*:*:*:*:*","matchCriteriaId":"7FA1990D-BBC2-429C-872C-6150459516B1"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:jdk:1.7.0:update15:*:*:*:*:*:*","matchCriteriaId":"8DC2887E-610B-42FE-9A96-1E2F01BF17A3"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:jdk:1.7.0:update17:*:*:*:*:*:*","matchCriteriaId":"130849CD-A581-4FE6-B2AA-99134F16FE65"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:jdk:1.7.0:update2:*:*:*:*:*:*","matchCriteriaId":"D375CECB-405C-4E18-A7E8-9C5A2F97BD69"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:jdk:1.7.0:update21:*:*:*:*:*:*","matchCriteriaId":"50AF5AE9-5314-4CE7-95A7-CE6D1B036D23"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:jdk:1.7.0:update25:*:*:*:*:*:*","matchCriteriaId":"1B10B19C-FA60-4CD5-AA61-A9791F6CECA8"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:jdk:1.7.0:update3:*:*:*:*:*:*","matchCriteriaId":"52EEEA5A-E77C-43CF-A063-9D5C64EA1870"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:jdk:1.7.0:update4:*:*:*:*:*:*","matchCriteriaId":"003746F6-DEF0-4D0F-AD97-9E335868E301"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:jdk:1.7.0:update5:*:*:*:*:*:*","matchCriteriaId":"CF830E0E-0169-4B6A-81FF-2E9FCD7D913B"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:jdk:1.7.0:update6:*:*:*:*:*:*","matchCriteriaId":"6BAE3670-0938-480A-8472-DFF0B3A0D0BF"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:jdk:1.7.0:update7:*:*:*:*:*:*","matchCriteriaId":"0EC967FF-26A6-4498-BC09-EC23B2B75CBA"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:jdk:1.7.0:update9:*:*:*:*:*:*","matchCriteriaId":"02781457-4E40-46A9-A5F7-945232A8C2B1"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:jre:*:*:*:*:*:*:*:*","versionEndExcluding":"1.7.0","matchCriteriaId":"3BD83469-FDD0-499F-AA08-88D555BDB350"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:jre:1.7.0:-:*:*:*:*:*:*","matchCriteriaId":"DFAA351A-93CD-46A8-A480-CE2783CCD620"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:jre:1.7.0:update1:*:*:*:*:*:*","matchCriteriaId":"F4B153FD-E20B-4909-8B10-884E48F5B590"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:jre:1.7.0:update10:*:*:*:*:*:*","matchCriteriaId":"F21933FB-A27C-4AF3-9811-2DE28484A5A6"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:jre:1.7.0:update11:*:*:*:*:*:*","matchCriteriaId":"B2B20041-EB5D-4FA4-AC7D-C35E7878BCFD"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:jre:1.7.0:update13:*:*:*:*:*:*","matchCriteriaId":"F3C3C9C7-73AE-4B1D-AA85-C7F5330A4DE6"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:jre:1.7.0:update15:*:*:*:*:*:*","matchCriteriaId":"1D8BB8D7-D5EC-42D6-BEAA-CB03D1D6513E"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:jre:1.7.0:update17:*:*:*:*:*:*","matchCriteriaId":"37B5B98B-0E41-4397-8AB0-C18C6F10AED1"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:jre:1.7.0:update2:*:*:*:*:*:*","matchCriteriaId":"CB106FA9-26CE-48C5-AEA5-FD1A5454AEE2"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:jre:1.7.0:update21:*:*:*:*:*:*","matchCriteriaId":"4FF6C211-AD55-40FE-9130-77164E586F62"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:jre:1.7.0:update25:*:*:*:*:*:*","matchCriteriaId":"F40DB141-E5B3-4EC2-9E2F-2E27414FCCB1"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:jre:1.7.0:update3:*:*:*:*:*:*","matchCriteriaId":"5831D70B-3854-4CB8-B88D-40F1743DAEE0"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:jre:1.7.0:update4:*:*:*:*:*:*","matchCriteriaId":"EEB101C9-CA38-4421-BC0C-C1AD47AA2CC9"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:jre:1.7.0:update5:*:*:*:*:*:*","matchCriteriaId":"BA302DF3-ABBB-4262-B206-4C0F7B5B1E91"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:jre:1.7.0:update6:*:*:*:*:*:*","matchCriteriaId":"F9A8EBCB-5E6A-42F0-8D07-F3A3D1C850F0"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:jre:1.7.0:update7:*:*:*:*:*:*","matchCriteriaId":"0CD8A54E-185B-4D34-82EF-C0C05739EC12"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:jre:1.7.0:update9:*:*:*:*:*:*","matchCriteriaId":"4FFC7F0D-1F32-4235-8359-277CE41382DF"}]}]}],"references":[{"url":"http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00013.html","source":"secalert_us@oracle.com","tags":["Third Party Advisory"]},{"url":"http://rhn.redhat.com/errata/RHSA-2013-1440.html","source":"secalert_us@oracle.com","tags":["Third Party Advisory"]},{"url":"http://rhn.redhat.com/errata/RHSA-2013-1507.html","source":"secalert_us@oracle.com","tags":["Third Party Advisory"]},{"url":"http://secunia.com/advisories/56338","source":"secalert_us@oracle.com","tags":["Not Applicable"]},{"url":"http://www-01.ibm.com/support/docview.wss?uid=swg21655201","source":"secalert_us@oracle.com","tags":["Third Party Advisory"]},{"url":"http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html","source":"secalert_us@oracle.com","tags":["Patch","Vendor Advisory"]},{"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18607","source":"secalert_us@oracle.com","tags":["Broken Link"]},{"url":"http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00013.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"http://rhn.redhat.com/errata/RHSA-2013-1440.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"http://rhn.redhat.com/errata/RHSA-2013-1507.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"http://secunia.com/advisories/56338","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Not Applicable"]},{"url":"http://www-01.ibm.com/support/docview.wss?uid=swg21655201","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18607","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link"]}],"evaluatorComment":"Per: http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html\n\n\n\n\"Applies to client deployment of Java only. This vulnerability can be exploited only through sandboxed Java Web Start applications and sandboxed Java applets.\""}}]}