Unspecified vulnerability in the Oracle JRockit component in Oracle Fusion Middleware R27.7.4 and earlier and R28.2.6 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: this might be a duplicate of CVE-2013-1537 and CVE-2013-2415. If so, then CVE-2013-2380 might be REJECTed in the future.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Fusion_middleware | Oracle | - (including) | - (including) |
Jrockit | Oracle | * | r27.4 (including) |
Jrockit | Oracle | * | r28.2.6 (including) |
Jrockit | Oracle | r27.1 (including) | r27.1 (including) |
Jrockit | Oracle | r27.2 (including) | r27.2 (including) |
Jrockit | Oracle | r27.3 (including) | r27.3 (including) |
Jrockit | Oracle | r27.3.1 (including) | r27.3.1 (including) |
Jrockit | Oracle | r28.0.0 (including) | r28.0.0 (including) |
Jrockit | Oracle | r28.0.1 (including) | r28.0.1 (including) |
Jrockit | Oracle | r28.0.2 (including) | r28.0.2 (including) |
Jrockit | Oracle | r28.1.0 (including) | r28.1.0 (including) |
Jrockit | Oracle | r28.1.1 (including) | r28.1.1 (including) |
Jrockit | Oracle | r28.1.3 (including) | r28.1.3 (including) |
Jrockit | Oracle | r28.1.4 (including) | r28.1.4 (including) |