{"id":"CVE-2016-3449","details":"Unspecified vulnerability in Oracle Java SE 6u113, 7u99, and 8u77 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to Deployment.","modified":"2026-03-15T22:22:02.303930Z","published":"2016-04-21T11:00:34.653Z","related":["CGA-5842-rw8v-h5vr","SUSE-SU-2016:1299-1","SUSE-SU-2016:1300-1","SUSE-SU-2016:1303-1","SUSE-SU-2016:1378-1","SUSE-SU-2016:1379-1","SUSE-SU-2016:1458-1","SUSE-SU-2016:1475-1"],"references":[{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00058.html"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00061.html"},{"type":"WEB","url":"http://www.securityfocus.com/bid/86485"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00039.html"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00042.html"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00002.html"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00059.html"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00067.html"},{"type":"WEB","url":"http://www.securitytracker.com/id/1035596"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00040.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2016-0678.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2016-0701.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2016-0708.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2016-1039.html"},{"type":"ADVISORY","url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2016-0677.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2016-0679.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2016-0716.html"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2016:1430"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20160420-0001/"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2017:1216"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201606-18"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2016-0702.html"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2016-3449.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"1.6.0-update113"}]},{"events":[{"introduced":"0"},{"last_affected":"1.7.0-update99"}]},{"events":[{"introduced":"0"},{"last_affected":"1.8.0-update77"}]},{"events":[{"introduced":"0"},{"last_affected":"1.6.0-update113"}]},{"events":[{"introduced":"0"},{"last_affected":"1.7.0-update99"}]},{"events":[{"introduced":"0"},{"last_affected":"1.8.0-update77"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"}]}