VYPR
Unrated severityNVD Advisory· Published Apr 1, 2010· Updated Apr 29, 2026

CVE-2010-0082

CVE-2010-0082

Description

Unspecified vulnerability in the HotSpot Server component in Oracle Java SE and Java for Business 6 Update 18, 5.0 Update 23, 1.4.2_25, and 1.3.1_27 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

An unspecified vulnerability in Oracle Java's HotSpot Server component allows remote attackers to affect confidentiality, integrity, and availability via vectors involving applet deserialization and other sensitive object handling.

Vulnerability

CVE-2010-0082 is an unspecified vulnerability in the HotSpot Server component of Oracle Java SE and Java for Business versions 6 Update 18, 5.0 Update 23, 1.4.2_25, and 1.3.1_27 [1]. According to the Ubuntu security advisory, the flaw affects the Loader-constraint table, Policy/PolicyFile, Inflater/Deflater, drag/drop access, and deserialization mechanisms, which did not correctly handle certain sensitive objects [3]. The vulnerability is remotely exploitable without authentication, but requires user interaction (e.g., visiting a malicious website with a Java applet enabled) [3].

Exploitation

An attacker can exploit this vulnerability by hosting a specially crafted Java applet on a web page and tricking the user into running it in a vulnerable Java runtime [3]. No additional privileges are required on the target system. The attack is network-based, and the applet must be executed within the victim's browser or Java Web Start application. The exact sequence of steps is not publicly detailed due to the unspecified nature of the bug, but the trigger involves deserialization and access to restricted objects [3].

Impact

Successful exploitation leads to leakage of private information (confidentiality breach), and may also affect integrity and availability as stated in the original description [1]. The attacker gains the ability to read sensitive data within the Java sandbox, potentially including files, network connections, or other resources accessible to the JVM. The impact is limited to the context of the applet or application, but can be severe when combined with other vulnerabilities [3].

Mitigation

Oracle released fixes as part of the April 2010 Critical Patch Update [1]. Ubuntu provided updated packages for OpenJDK 6b18-1.8.2-0ubuntu1~9.10.1 for Ubuntu 9.10 and later [3]. HP issued updates for HP-UX and other products [2][4]. Users should apply the latest Java updates from their vendors. No workarounds are known; disabling Java applets in the browser can prevent exploitation.

AI Insight generated on May 23, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

238
  • Sun Corporation/Jdk76 versions
    cpe:2.3:a:sun:jdk:*:*:*:*:*:*:*:*+ 75 more
    • cpe:2.3:a:sun:jdk:*:*:*:*:*:*:*:*range: <=1.3.1_27
    • cpe:2.3:a:sun:jdk:1.3.0:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.3.0_01:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.3.0_02:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.3.0_03:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.3.0_04:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.3.0_05:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.3.1:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.3.1_01:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.3.1_01a:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.3.1_02:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.3.1_03:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.3.1_04:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.3.1_05:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.3.1_06:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.3.1_07:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.3.1_08:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.3.1_09:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.3.1_10:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.3.1_11:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.3.1_12:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.3.1_13:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.3.1_14:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.3.1_15:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.3.1_16:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.3.1_17:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.3.1_18:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.3.1_19:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.3.1_20:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.3.1_21:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.3.1_22:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.3.1_23:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.3.1_24:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.3.1_25:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.3.1_26:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.5.0:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.5.0:update1:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.5.0:update10:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.5.0:update11:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.5.0:update12:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.5.0:update13:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.5.0:update14:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.5.0:update15:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.5.0:update16:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.5.0:update17:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.5.0:update18:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.5.0:update19:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.5.0:update2:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.5.0:update20:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.5.0:update21:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.5.0:update3:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.5.0:update4:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.5.0:update5:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.5.0:update6:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.5.0:update7:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.5.0:update8:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.5.0:update9:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.6.0:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.6.0:update1:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.6.0:update_10:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.6.0:update_11:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.6.0:update_12:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.6.0:update_13:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.6.0:update_14:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.6.0:update_15:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.6.0:update_16:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.6.0:update_17:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.6.0:update1_b06:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.6.0:update2:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.6.0:update_3:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.6.0:update_4:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.6.0:update_5:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.6.0:update_6:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.6.0:update_7:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:*:update_18:*:*:*:*:*:*range: <=1.6.0
    • cpe:2.3:a:sun:jdk:*:update23:*:*:*:*:*:*range: <=1.5.0
  • Sun Corporation/Jre100 versions
    cpe:2.3:a:sun:jre:*:*:*:*:*:*:*:*+ 99 more
    • cpe:2.3:a:sun:jre:*:*:*:*:*:*:*:*range: <=1.4.2_25
    • cpe:2.3:a:sun:jre:1.3.0:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.3.0:update1:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.3.0:update2:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.3.0:update3:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.3.0:update4:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.3.0:update5:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.3.1:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.3.1_03:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.3.1_04:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.3.1_05:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.3.1_06:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.3.1_07:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.3.1_08:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.3.1_09:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.3.1_10:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.3.1_11:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.3.1_12:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.3.1_13:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.3.1_14:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.3.1_15:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.3.1_16:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.3.1_17:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.3.1_18:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.3.1_19:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.3.1_2:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.3.1_20:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.3.1_21:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.3.1_22:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.3.1_23:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.3.1_24:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.3.1_25:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.3.1_26:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.3.1:update1:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.3.1:update2:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.4.2:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.4.2_1:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.4.2_10:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.4.2_11:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.4.2_12:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.4.2_13:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.4.2_14:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.4.2_15:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.4.2_16:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.4.2_17:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.4.2_18:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.4.2_19:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.4.2_2:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.4.2_20:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.4.2_21:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.4.2_22:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.4.2_23:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.4.2_24:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.4.2_3:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.4.2_4:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.4.2_5:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.4.2_6:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.4.2_7:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.4.2_8:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.4.2_9:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.5.0:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.5.0:update1:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.5.0:update10:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.5.0:update11:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.5.0:update12:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.5.0:update13:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.5.0:update14:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.5.0:update15:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.5.0:update16:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.5.0:update17:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.5.0:update18:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.5.0:update19:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.5.0:update2:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.5.0:update20:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.5.0:update21:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.5.0:update3:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.5.0:update4:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.5.0:update5:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.5.0:update6:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.5.0:update7:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.5.0:update8:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.5.0:update9:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.6.0:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.6.0:update_10:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.6.0:update_11:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.6.0:update_12:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.6.0:update_13:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.6.0:update_14:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.6.0:update_15:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.6.0:update_16:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.6.0:update_17:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.6.0:update_2:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.6.0:update_3:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.6.0:update_4:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.6.0:update_5:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.6.0:update_6:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.6.0:update_7:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:*:update_18:*:*:*:*:*:*range: <=1.6.0
    • cpe:2.3:a:sun:jre:*:update23:*:*:*:*:*:*range: <=1.5.0
  • Sun Corporation/Sdk60 versions
    cpe:2.3:a:sun:sdk:*:*:*:*:*:*:*:*+ 59 more
    • cpe:2.3:a:sun:sdk:*:*:*:*:*:*:*:*range: <=1.4.2_25
    • cpe:2.3:a:sun:sdk:1.3.0:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.3.0_01:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.3.0_02:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.3.0_03:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.3.0_04:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.3.0_05:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.3.1:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.3.1_01:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.3.1_01a:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.3.1_02:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.3.1_03:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.3.1_04:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.3.1_05:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.3.1_06:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.3.1_07:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.3.1_08:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.3.1_09:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.3.1_10:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.3.1_11:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.3.1_12:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.3.1_13:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.3.1_14:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.3.1_15:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.3.1_16:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.3.1_17:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.3.1_18:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.3.1_19:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.3.1_20:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.3.1_21:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.3.1_22:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.3.1_23:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.3.1_24:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.3.1_25:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.3.1_26:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.4.2:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.4.2_02:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.4.2_1:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.4.2_10:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.4.2_11:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.4.2_12:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.4.2_13:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.4.2_14:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.4.2_15:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.4.2_16:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.4.2_17:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.4.2_18:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.4.2_19:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.4.2_20:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.4.2_21:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.4.2_22:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.4.2_23:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.4.2_24:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.4.2_3:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.4.2_4:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.4.2_5:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.4.2_6:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.4.2_7:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.4.2_8:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.4.2_9:*:*:*:*:*:*:*
  • Range: 6 Update 18, 5.0 Update 23, 1.4.2_25, 1.3.1_27
  • Range: 6 Update 18, 5.0 Update 23, 1.4.2_25, 1.3.1_27

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

28

News mentions

0

No linked articles in our index yet.