// For flags

CVE-2016-3427

Oracle Java SE and JRockit Unspecified Vulnerability

Severity Score

9.8
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

Yes
*KEV

Decision

Act
*SSVC
Descriptions

Unspecified vulnerability in Oracle Java SE 6u113, 7u99, and 8u77; Java SE Embedded 8u77; and JRockit R28.3.9 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to JMX.

Vulnerabilidad no especificada en Oracle Java SE 6u113, 7u99 y 8u77; Java SE Embedded 8u77; y JRockit R28.3.9 permite a atacantes remotos afectar a la confidencialidad, integridad y disponibilidad a través de vectores relacionados con JMX.

It was discovered that the RMI server implementation in the JMX component in OpenJDK did not restrict which classes can be deserialized when deserializing authentication credentials. A remote, unauthenticated attacker able to connect to a JMX port could possibly use this flaw to trigger deserialization flaws.

Oracle Java SE and JRockit contains an unspecified vulnerability that allows remote attackers to affect confidentiality, integrity, and availability via vectors related to Java Management Extensions (JMX). This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:Act
Exploitation
Active
Automatable
Yes
Tech. Impact
Total
* Organization's Worst-case Scenario
Timeline
  • 2016-03-17 CVE Reserved
  • 2016-04-20 CVE Published
  • 2023-05-12 Exploited in Wild
  • 2023-06-02 KEV Due Date
  • 2024-10-08 CVE Updated
  • 2024-11-14 EPSS Updated
  • ---------- First Exploit
CWE
  • CWE-284: Improper Access Control
CAPEC
References (61)
URL Date SRC
URL Date SRC
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html 2024-06-27
http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html 2024-06-27
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551%40%3Cdev.tomcat.apache.org%3E 2024-06-27
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3E 2024-06-27
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708%40%3Cdev.tomcat.apache.org%3E 2024-06-27
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3E 2024-06-27
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7%40%3Cdev.tomcat.apache.org%3E 2024-06-27
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3%40%3Cdev.tomcat.apache.org%3E 2024-06-27
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424%40%3Cdev.tomcat.apache.org%3E 2024-06-27
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a%40%3Cdev.tomcat.apache.org%3E 2024-06-27
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc%40%3Cdev.tomcat.apache.org%3E 2024-06-27
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3E 2024-06-27
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3E 2024-06-27
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3E 2024-06-27
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3E 2024-06-27
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E 2024-06-27
URL Date SRC
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00006.html 2024-06-27
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00009.html 2024-06-27
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00012.html 2024-06-27
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00021.html 2024-06-27
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00022.html 2024-06-27
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00026.html 2024-06-27
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00027.html 2024-06-27
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00039.html 2024-06-27
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00040.html 2024-06-27
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00042.html 2024-06-27
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00058.html 2024-06-27
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00059.html 2024-06-27
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00061.html 2024-06-27
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00067.html 2024-06-27
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00002.html 2024-06-27
http://rhn.redhat.com/errata/RHSA-2016-0650.html 2024-06-27
http://rhn.redhat.com/errata/RHSA-2016-0651.html 2024-06-27
http://rhn.redhat.com/errata/RHSA-2016-0675.html 2024-06-27
http://rhn.redhat.com/errata/RHSA-2016-0676.html 2024-06-27
http://rhn.redhat.com/errata/RHSA-2016-0677.html 2024-06-27
http://rhn.redhat.com/errata/RHSA-2016-0678.html 2024-06-27
http://rhn.redhat.com/errata/RHSA-2016-0679.html 2024-06-27
http://rhn.redhat.com/errata/RHSA-2016-0701.html 2024-06-27
http://rhn.redhat.com/errata/RHSA-2016-0702.html 2024-06-27
http://rhn.redhat.com/errata/RHSA-2016-0708.html 2024-06-27
http://rhn.redhat.com/errata/RHSA-2016-0716.html 2024-06-27
http://rhn.redhat.com/errata/RHSA-2016-0723.html 2024-06-27
http://rhn.redhat.com/errata/RHSA-2016-1039.html 2024-06-27
http://www.debian.org/security/2016/dsa-3558 2024-06-27
http://www.ubuntu.com/usn/USN-2963-1 2024-06-27
http://www.ubuntu.com/usn/USN-2964-1 2024-06-27
http://www.ubuntu.com/usn/USN-2972-1 2024-06-27
https://access.redhat.com/errata/RHSA-2016:1430 2024-06-27
https://access.redhat.com/errata/RHSA-2017:1216 2024-06-27
https://security.gentoo.org/glsa/201606-18 2024-06-27
https://access.redhat.com/security/cve/CVE-2016-3427 2017-05-09
https://bugzilla.redhat.com/show_bug.cgi?id=1328210 2017-05-09
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Oracle
Search vendor "Oracle"
Jdk
Search vendor "Oracle" for product "Jdk"
1.6.0
Search vendor "Oracle" for product "Jdk" and version "1.6.0"
update113
Affected
Oracle
Search vendor "Oracle"
Jdk
Search vendor "Oracle" for product "Jdk"
1.7.0
Search vendor "Oracle" for product "Jdk" and version "1.7.0"
update99
Affected
Oracle
Search vendor "Oracle"
Jdk
Search vendor "Oracle" for product "Jdk"
1.8.0
Search vendor "Oracle" for product "Jdk" and version "1.8.0"
update77
Affected
Oracle
Search vendor "Oracle"
Jre
Search vendor "Oracle" for product "Jre"
1.6.0
Search vendor "Oracle" for product "Jre" and version "1.6.0"
update113
Affected
Oracle
Search vendor "Oracle"
Jre
Search vendor "Oracle" for product "Jre"
1.7.0
Search vendor "Oracle" for product "Jre" and version "1.7.0"
update99
Affected
Oracle
Search vendor "Oracle"
Jre
Search vendor "Oracle" for product "Jre"
1.8.0
Search vendor "Oracle" for product "Jre" and version "1.8.0"
update77
Affected
Oracle
Search vendor "Oracle"
Jrockit
Search vendor "Oracle" for product "Jrockit"
r28.3.9
Search vendor "Oracle" for product "Jrockit" and version "r28.3.9"
-
Affected
Oracle
Search vendor "Oracle"
Linux
Search vendor "Oracle" for product "Linux"
5
Search vendor "Oracle" for product "Linux" and version "5"
-
Affected
Oracle
Search vendor "Oracle"
Linux
Search vendor "Oracle" for product "Linux"
6
Search vendor "Oracle" for product "Linux" and version "6"
-
Affected
Oracle
Search vendor "Oracle"
Linux
Search vendor "Oracle" for product "Linux"
7
Search vendor "Oracle" for product "Linux" and version "7"
-
Affected
Canonical
Search vendor "Canonical"
Ubuntu Linux
Search vendor "Canonical" for product "Ubuntu Linux"
12.04
Search vendor "Canonical" for product "Ubuntu Linux" and version "12.04"
-
Affected
Canonical
Search vendor "Canonical"
Ubuntu Linux
Search vendor "Canonical" for product "Ubuntu Linux"
14.04
Search vendor "Canonical" for product "Ubuntu Linux" and version "14.04"
esm
Affected
Canonical
Search vendor "Canonical"
Ubuntu Linux
Search vendor "Canonical" for product "Ubuntu Linux"
15.10
Search vendor "Canonical" for product "Ubuntu Linux" and version "15.10"
-
Affected
Canonical
Search vendor "Canonical"
Ubuntu Linux
Search vendor "Canonical" for product "Ubuntu Linux"
16.04
Search vendor "Canonical" for product "Ubuntu Linux" and version "16.04"
esm
Affected
Debian
Search vendor "Debian"
Debian Linux
Search vendor "Debian" for product "Debian Linux"
8.0
Search vendor "Debian" for product "Debian Linux" and version "8.0"
-
Affected
Netapp
Search vendor "Netapp"
E-series Santricity Management Plug-ins
Search vendor "Netapp" for product "E-series Santricity Management Plug-ins"
-vmware_vcenter
Affected
Netapp
Search vendor "Netapp"
E-series Santricity Storage Manager
Search vendor "Netapp" for product "E-series Santricity Storage Manager"
--
Affected
Netapp
Search vendor "Netapp"
E-series Santricity Web Services
Search vendor "Netapp" for product "E-series Santricity Web Services"
-web_services_proxy
Affected
Netapp
Search vendor "Netapp"
Oncommand Balance
Search vendor "Netapp" for product "Oncommand Balance"
--
Affected
Netapp
Search vendor "Netapp"
Oncommand Cloud Manager
Search vendor "Netapp" for product "Oncommand Cloud Manager"
--
Affected
Netapp
Search vendor "Netapp"
Oncommand Insight
Search vendor "Netapp" for product "Oncommand Insight"
--
Affected
Netapp
Search vendor "Netapp"
Oncommand Performance Manager
Search vendor "Netapp" for product "Oncommand Performance Manager"
--
Affected
Netapp
Search vendor "Netapp"
Oncommand Report
Search vendor "Netapp" for product "Oncommand Report"
--
Affected
Netapp
Search vendor "Netapp"
Oncommand Shift
Search vendor "Netapp" for product "Oncommand Shift"
--
Affected
Netapp
Search vendor "Netapp"
Oncommand Unified Manager
Search vendor "Netapp" for product "Oncommand Unified Manager"
-7-mode
Affected
Netapp
Search vendor "Netapp"
Oncommand Unified Manager
Search vendor "Netapp" for product "Oncommand Unified Manager"
-clustered_data_ontap
Affected
Netapp
Search vendor "Netapp"
Oncommand Workflow Automation
Search vendor "Netapp" for product "Oncommand Workflow Automation"
--
Affected
Netapp
Search vendor "Netapp"
Storagegrid
Search vendor "Netapp" for product "Storagegrid"
<= 9.0.4
Search vendor "Netapp" for product "Storagegrid" and version " <= 9.0.4"
-
Affected
Netapp
Search vendor "Netapp"
Vasa Provider For Clustered Data Ontap
Search vendor "Netapp" for product "Vasa Provider For Clustered Data Ontap"
>= 7.2
Search vendor "Netapp" for product "Vasa Provider For Clustered Data Ontap" and version " >= 7.2"
-
Affected
Netapp
Search vendor "Netapp"
Virtual Storage Console
Search vendor "Netapp" for product "Virtual Storage Console"
>= 7.2
Search vendor "Netapp" for product "Virtual Storage Console" and version " >= 7.2"
vmware_vsphere
Affected
Apache
Search vendor "Apache"
Cassandra
Search vendor "Apache" for product "Cassandra"
>= 2.1.0 < 2.1.22
Search vendor "Apache" for product "Cassandra" and version " >= 2.1.0 < 2.1.22"
-
Affected
Apache
Search vendor "Apache"
Cassandra
Search vendor "Apache" for product "Cassandra"
>= 2.2.0 < 2.2.18
Search vendor "Apache" for product "Cassandra" and version " >= 2.2.0 < 2.2.18"
-
Affected
Apache
Search vendor "Apache"
Cassandra
Search vendor "Apache" for product "Cassandra"
>= 3.0.0 < 3.0.22
Search vendor "Apache" for product "Cassandra" and version " >= 3.0.0 < 3.0.22"
-
Affected
Apache
Search vendor "Apache"
Cassandra
Search vendor "Apache" for product "Cassandra"
>= 3.11.0 < 3.11.8
Search vendor "Apache" for product "Cassandra" and version " >= 3.11.0 < 3.11.8"
-
Affected
Apache
Search vendor "Apache"
Cassandra
Search vendor "Apache" for product "Cassandra"
4.0.0
Search vendor "Apache" for product "Cassandra" and version "4.0.0"
beta1
Affected
Redhat
Search vendor "Redhat"
Satellite
Search vendor "Redhat" for product "Satellite"
5.6
Search vendor "Redhat" for product "Satellite" and version "5.6"
-
Affected
Redhat
Search vendor "Redhat"
Satellite
Search vendor "Redhat" for product "Satellite"
5.7
Search vendor "Redhat" for product "Satellite" and version "5.7"
-
Affected
Redhat
Search vendor "Redhat"
Enterprise Linux Desktop
Search vendor "Redhat" for product "Enterprise Linux Desktop"
5.0
Search vendor "Redhat" for product "Enterprise Linux Desktop" and version "5.0"
-
Affected
Redhat
Search vendor "Redhat"
Enterprise Linux Desktop
Search vendor "Redhat" for product "Enterprise Linux Desktop"
6.0
Search vendor "Redhat" for product "Enterprise Linux Desktop" and version "6.0"
-
Affected
Redhat
Search vendor "Redhat"
Enterprise Linux Desktop
Search vendor "Redhat" for product "Enterprise Linux Desktop"
7.0
Search vendor "Redhat" for product "Enterprise Linux Desktop" and version "7.0"
-
Affected
Redhat
Search vendor "Redhat"
Enterprise Linux Eus
Search vendor "Redhat" for product "Enterprise Linux Eus"
6.7
Search vendor "Redhat" for product "Enterprise Linux Eus" and version "6.7"
-
Affected
Redhat
Search vendor "Redhat"
Enterprise Linux Eus
Search vendor "Redhat" for product "Enterprise Linux Eus"
7.2
Search vendor "Redhat" for product "Enterprise Linux Eus" and version "7.2"
-
Affected
Redhat
Search vendor "Redhat"
Enterprise Linux Eus
Search vendor "Redhat" for product "Enterprise Linux Eus"
7.3
Search vendor "Redhat" for product "Enterprise Linux Eus" and version "7.3"
-
Affected
Redhat
Search vendor "Redhat"
Enterprise Linux Eus
Search vendor "Redhat" for product "Enterprise Linux Eus"
7.4
Search vendor "Redhat" for product "Enterprise Linux Eus" and version "7.4"
-
Affected
Redhat
Search vendor "Redhat"
Enterprise Linux Eus
Search vendor "Redhat" for product "Enterprise Linux Eus"
7.5
Search vendor "Redhat" for product "Enterprise Linux Eus" and version "7.5"
-
Affected
Redhat
Search vendor "Redhat"
Enterprise Linux Eus
Search vendor "Redhat" for product "Enterprise Linux Eus"
7.6
Search vendor "Redhat" for product "Enterprise Linux Eus" and version "7.6"
-
Affected
Redhat
Search vendor "Redhat"
Enterprise Linux Eus
Search vendor "Redhat" for product "Enterprise Linux Eus"
7.7
Search vendor "Redhat" for product "Enterprise Linux Eus" and version "7.7"
-
Affected
Redhat
Search vendor "Redhat"
Enterprise Linux Server
Search vendor "Redhat" for product "Enterprise Linux Server"
5.0
Search vendor "Redhat" for product "Enterprise Linux Server" and version "5.0"
-
Affected
Redhat
Search vendor "Redhat"
Enterprise Linux Server
Search vendor "Redhat" for product "Enterprise Linux Server"
6.0
Search vendor "Redhat" for product "Enterprise Linux Server" and version "6.0"
-
Affected
Redhat
Search vendor "Redhat"
Enterprise Linux Server
Search vendor "Redhat" for product "Enterprise Linux Server"
7.0
Search vendor "Redhat" for product "Enterprise Linux Server" and version "7.0"
-
Affected
Redhat
Search vendor "Redhat"
Enterprise Linux Server Aus
Search vendor "Redhat" for product "Enterprise Linux Server Aus"
7.2
Search vendor "Redhat" for product "Enterprise Linux Server Aus" and version "7.2"
-
Affected
Redhat
Search vendor "Redhat"
Enterprise Linux Server Aus
Search vendor "Redhat" for product "Enterprise Linux Server Aus"
7.3
Search vendor "Redhat" for product "Enterprise Linux Server Aus" and version "7.3"
-
Affected
Redhat
Search vendor "Redhat"
Enterprise Linux Server Aus
Search vendor "Redhat" for product "Enterprise Linux Server Aus"
7.4
Search vendor "Redhat" for product "Enterprise Linux Server Aus" and version "7.4"
-
Affected
Redhat
Search vendor "Redhat"
Enterprise Linux Server Aus
Search vendor "Redhat" for product "Enterprise Linux Server Aus"
7.6
Search vendor "Redhat" for product "Enterprise Linux Server Aus" and version "7.6"
-
Affected
Redhat
Search vendor "Redhat"
Enterprise Linux Server Aus
Search vendor "Redhat" for product "Enterprise Linux Server Aus"
7.7
Search vendor "Redhat" for product "Enterprise Linux Server Aus" and version "7.7"
-
Affected
Redhat
Search vendor "Redhat"
Enterprise Linux Server Eus
Search vendor "Redhat" for product "Enterprise Linux Server Eus"
6.7
Search vendor "Redhat" for product "Enterprise Linux Server Eus" and version "6.7"
-
Affected
Redhat
Search vendor "Redhat"
Enterprise Linux Server Eus
Search vendor "Redhat" for product "Enterprise Linux Server Eus"
7.2
Search vendor "Redhat" for product "Enterprise Linux Server Eus" and version "7.2"
-
Affected
Redhat
Search vendor "Redhat"
Enterprise Linux Server Tus
Search vendor "Redhat" for product "Enterprise Linux Server Tus"
7.2
Search vendor "Redhat" for product "Enterprise Linux Server Tus" and version "7.2"
-
Affected
Redhat
Search vendor "Redhat"
Enterprise Linux Server Tus
Search vendor "Redhat" for product "Enterprise Linux Server Tus"
7.3
Search vendor "Redhat" for product "Enterprise Linux Server Tus" and version "7.3"
-
Affected
Redhat
Search vendor "Redhat"
Enterprise Linux Server Tus
Search vendor "Redhat" for product "Enterprise Linux Server Tus"
7.6
Search vendor "Redhat" for product "Enterprise Linux Server Tus" and version "7.6"
-
Affected
Redhat
Search vendor "Redhat"
Enterprise Linux Server Tus
Search vendor "Redhat" for product "Enterprise Linux Server Tus"
7.7
Search vendor "Redhat" for product "Enterprise Linux Server Tus" and version "7.7"
-
Affected
Redhat
Search vendor "Redhat"
Enterprise Linux Workstation
Search vendor "Redhat" for product "Enterprise Linux Workstation"
5.0
Search vendor "Redhat" for product "Enterprise Linux Workstation" and version "5.0"
-
Affected
Redhat
Search vendor "Redhat"
Enterprise Linux Workstation
Search vendor "Redhat" for product "Enterprise Linux Workstation"
6.0
Search vendor "Redhat" for product "Enterprise Linux Workstation" and version "6.0"
-
Affected
Redhat
Search vendor "Redhat"
Enterprise Linux Workstation
Search vendor "Redhat" for product "Enterprise Linux Workstation"
7.0
Search vendor "Redhat" for product "Enterprise Linux Workstation" and version "7.0"
-
Affected
Suse
Search vendor "Suse"
Linux Enterprise Module For Legacy
Search vendor "Suse" for product "Linux Enterprise Module For Legacy"
12
Search vendor "Suse" for product "Linux Enterprise Module For Legacy" and version "12"
-
Affected
Suse
Search vendor "Suse"
Manager
Search vendor "Suse" for product "Manager"
2.1
Search vendor "Suse" for product "Manager" and version "2.1"
-
Affected
Suse
Search vendor "Suse"
Manager Proxy
Search vendor "Suse" for product "Manager Proxy"
2.1
Search vendor "Suse" for product "Manager Proxy" and version "2.1"
-
Affected
Suse
Search vendor "Suse"
Openstack Cloud
Search vendor "Suse" for product "Openstack Cloud"
5
Search vendor "Suse" for product "Openstack Cloud" and version "5"
-
Affected
Opensuse
Search vendor "Opensuse"
Leap
Search vendor "Opensuse" for product "Leap"
42.1
Search vendor "Opensuse" for product "Leap" and version "42.1"
-
Affected
Opensuse
Search vendor "Opensuse"
Opensuse
Search vendor "Opensuse" for product "Opensuse"
13.1
Search vendor "Opensuse" for product "Opensuse" and version "13.1"
-
Affected
Opensuse
Search vendor "Opensuse"
Opensuse
Search vendor "Opensuse" for product "Opensuse"
13.2
Search vendor "Opensuse" for product "Opensuse" and version "13.2"
-
Affected
Suse
Search vendor "Suse"
Linux Enterprise Desktop
Search vendor "Suse" for product "Linux Enterprise Desktop"
12
Search vendor "Suse" for product "Linux Enterprise Desktop" and version "12"
-
Affected
Suse
Search vendor "Suse"
Linux Enterprise Desktop
Search vendor "Suse" for product "Linux Enterprise Desktop"
12
Search vendor "Suse" for product "Linux Enterprise Desktop" and version "12"
sp1
Affected
Suse
Search vendor "Suse"
Linux Enterprise Server
Search vendor "Suse" for product "Linux Enterprise Server"
10
Search vendor "Suse" for product "Linux Enterprise Server" and version "10"
sp4, ltss
Affected
Suse
Search vendor "Suse"
Linux Enterprise Server
Search vendor "Suse" for product "Linux Enterprise Server"
11
Search vendor "Suse" for product "Linux Enterprise Server" and version "11"
sp2, ltss
Affected
Suse
Search vendor "Suse"
Linux Enterprise Server
Search vendor "Suse" for product "Linux Enterprise Server"
11
Search vendor "Suse" for product "Linux Enterprise Server" and version "11"
sp3, ltss
Affected
Suse
Search vendor "Suse"
Linux Enterprise Server
Search vendor "Suse" for product "Linux Enterprise Server"
11
Search vendor "Suse" for product "Linux Enterprise Server" and version "11"
sp4
Affected
Suse
Search vendor "Suse"
Linux Enterprise Server
Search vendor "Suse" for product "Linux Enterprise Server"
12
Search vendor "Suse" for product "Linux Enterprise Server" and version "12"
-
Affected
Suse
Search vendor "Suse"
Linux Enterprise Server
Search vendor "Suse" for product "Linux Enterprise Server"
12
Search vendor "Suse" for product "Linux Enterprise Server" and version "12"
sp1
Affected
Suse
Search vendor "Suse"
Linux Enterprise Software Development Kit
Search vendor "Suse" for product "Linux Enterprise Software Development Kit"
11
Search vendor "Suse" for product "Linux Enterprise Software Development Kit" and version "11"
sp4
Affected
Suse
Search vendor "Suse"
Linux Enterprise Software Development Kit
Search vendor "Suse" for product "Linux Enterprise Software Development Kit"
12
Search vendor "Suse" for product "Linux Enterprise Software Development Kit" and version "12"
sp1
Affected