CVE-2010-0088
Description
Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE and Java for Business 6 Update 18, 5.0 Update 23, 1.4.2_25, and 1.3.1_27 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors, a different vulnerability than CVE-2010-0085.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
An unspecified vulnerability in Oracle Java SE (6u18, 5u23, 1.4.2_25, 1.3.1_27) allows remote attackers to compromise confidentiality, integrity, and availability via unknown vectors.
Vulnerability
CVE-2010-0088 is an unspecified vulnerability in the Java Runtime Environment (JRE) component of Oracle Java SE and Java for Business. It affects versions 6 Update 18, 5.0 Update 23, 1.4.2_25, and 1.3.1_27. According to the Ubuntu security advisory [3], the flaw relates to improper handling of sensitive objects during deserialization, Loader-constraint table, Policy/PolicyFile, Inflater/Deflater, and drag/drop access.
Exploitation
Exploitation requires an attacker to host a malicious Java applet and trick a user into visiting a web page that loads it. The applet triggers the vulnerability through deserialization or other object handling routines. No authentication or special network position is needed beyond the ability to serve the applet to the victim [3].
Impact
Successful exploitation can lead to unauthorized information disclosure, modification of data, and denial of service. In some cases, remote code execution may be possible, as indicated by HP security bulletins [2][4].
Mitigation
Oracle released patches in the Critical Patch Update for April 2010 (Oracle Java SE 6 Update 19, 5.0 Update 24, 1.4.2_26, and 1.3.1_28). Users should upgrade to these or later versions. Ubuntu provided fixes in USN-923-1 for OpenJDK [3]. HP also released updates for HP-UX [4] and other products [1][2]. No workaround is documented.
- Support Content Notification - Support Portal - Broadcom support portal
- '[security bulletin] HPSBMU02799 SSRT100867 rev.1 - HP Network Node Manager i (NNMi) v9.0x Running JD'
- USN-923-1: OpenJDK vulnerabilities | Ubuntu security notices | Ubuntu
- '[security bulletin] HPSBUX02524 SSRT100089 rev.1 - HP-UX Running Java, Remote Execution of Arbitrary'
AI Insight generated on May 23, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
238cpe:2.3:a:sun:jdk:*:*:*:*:*:*:*:*+ 75 more
- cpe:2.3:a:sun:jdk:*:*:*:*:*:*:*:*range: <=1.3.1_27
- cpe:2.3:a:sun:jdk:1.3.0:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.0_01:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.0_02:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.0_03:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.0_04:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.0_05:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.1:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.1_01:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.1_01a:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.1_02:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.1_03:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.1_04:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.1_05:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.1_06:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.1_07:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.1_08:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.1_09:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.1_10:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.1_11:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.1_12:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.1_13:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.1_14:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.1_15:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.1_16:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.1_17:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.1_18:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.1_19:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.1_20:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.1_21:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.1_22:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.1_23:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.1_24:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.1_25:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.1_26:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.5.0:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.5.0:update1:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.5.0:update10:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.5.0:update11:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.5.0:update12:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.5.0:update13:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.5.0:update14:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.5.0:update15:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.5.0:update16:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.5.0:update17:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.5.0:update18:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.5.0:update19:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.5.0:update2:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.5.0:update20:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.5.0:update21:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.5.0:update3:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.5.0:update4:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.5.0:update5:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.5.0:update6:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.5.0:update7:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.5.0:update8:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.5.0:update9:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.6.0:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.6.0:update1:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.6.0:update_10:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.6.0:update_11:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.6.0:update_12:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.6.0:update_13:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.6.0:update_14:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.6.0:update_15:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.6.0:update_16:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.6.0:update_17:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.6.0:update1_b06:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.6.0:update2:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.6.0:update_3:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.6.0:update_4:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.6.0:update_5:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.6.0:update_6:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.6.0:update_7:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:*:update_18:*:*:*:*:*:*range: <=1.6.0
- cpe:2.3:a:sun:jdk:*:update23:*:*:*:*:*:*range: <=1.5.0
cpe:2.3:a:sun:jre:*:*:*:*:*:*:*:*+ 99 more
- cpe:2.3:a:sun:jre:*:*:*:*:*:*:*:*range: <=1.4.2_25
- cpe:2.3:a:sun:jre:1.3.0:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.0:update1:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.0:update2:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.0:update3:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.0:update4:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.0:update5:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.1:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.1_03:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.1_04:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.1_05:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.1_06:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.1_07:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.1_08:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.1_09:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.1_10:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.1_11:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.1_12:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.1_13:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.1_14:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.1_15:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.1_16:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.1_17:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.1_18:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.1_19:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.1_2:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.1_20:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.1_21:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.1_22:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.1_23:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.1_24:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.1_25:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.1_26:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.1:update1:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.1:update2:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.4.2:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.4.2_1:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.4.2_10:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.4.2_11:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.4.2_12:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.4.2_13:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.4.2_14:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.4.2_15:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.4.2_16:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.4.2_17:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.4.2_18:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.4.2_19:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.4.2_2:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.4.2_20:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.4.2_21:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.4.2_22:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.4.2_23:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.4.2_24:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.4.2_3:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.4.2_4:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.4.2_5:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.4.2_6:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.4.2_7:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.4.2_8:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.4.2_9:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.5.0:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.5.0:update1:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.5.0:update10:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.5.0:update11:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.5.0:update12:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.5.0:update13:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.5.0:update14:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.5.0:update15:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.5.0:update16:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.5.0:update17:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.5.0:update18:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.5.0:update19:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.5.0:update2:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.5.0:update20:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.5.0:update21:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.5.0:update3:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.5.0:update4:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.5.0:update5:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.5.0:update6:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.5.0:update7:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.5.0:update8:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.5.0:update9:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.6.0:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.6.0:update_10:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.6.0:update_11:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.6.0:update_12:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.6.0:update_13:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.6.0:update_14:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.6.0:update_15:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.6.0:update_16:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.6.0:update_17:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.6.0:update_2:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.6.0:update_3:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.6.0:update_4:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.6.0:update_5:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.6.0:update_6:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.6.0:update_7:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:*:update_18:*:*:*:*:*:*range: <=1.6.0
- cpe:2.3:a:sun:jre:*:update23:*:*:*:*:*:*range: <=1.5.0
cpe:2.3:a:sun:sdk:*:*:*:*:*:*:*:*+ 59 more
- cpe:2.3:a:sun:sdk:*:*:*:*:*:*:*:*range: <=1.4.2_25
- cpe:2.3:a:sun:sdk:1.3.0:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.3.0_01:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.3.0_02:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.3.0_03:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.3.0_04:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.3.0_05:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.3.1:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.3.1_01:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.3.1_01a:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.3.1_02:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.3.1_03:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.3.1_04:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.3.1_05:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.3.1_06:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.3.1_07:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.3.1_08:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.3.1_09:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.3.1_10:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.3.1_11:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.3.1_12:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.3.1_13:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.3.1_14:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.3.1_15:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.3.1_16:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.3.1_17:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.3.1_18:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.3.1_19:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.3.1_20:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.3.1_21:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.3.1_22:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.3.1_23:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.3.1_24:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.3.1_25:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.3.1_26:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.4.2:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.4.2_02:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.4.2_1:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.4.2_10:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.4.2_11:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.4.2_12:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.4.2_13:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.4.2_14:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.4.2_15:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.4.2_16:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.4.2_17:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.4.2_18:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.4.2_19:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.4.2_20:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.4.2_21:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.4.2_22:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.4.2_23:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.4.2_24:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.4.2_3:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.4.2_4:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.4.2_5:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.4.2_6:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.4.2_7:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.4.2_8:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.4.2_9:*:*:*:*:*:*:*
- Range: 6 Update 18, 5.0 Update 23, 1.4.2_25, 1.3.1_27
- Range: 6 Update 18, 5.0 Update 23, 1.4.2_25, 1.3.1_27
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
34- itrc.hp.com/service/cki/docDisplay.donvd
- lists.apple.com/archives/security-announce/2010//May/msg00001.htmlnvd
- lists.apple.com/archives/security-announce/2010//May/msg00002.htmlnvd
- lists.opensuse.org/opensuse-security-announce/2010-04/msg00001.htmlnvd
- lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.htmlnvd
- lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.htmlnvd
- marc.infonvd
- marc.infonvd
- secunia.com/advisories/39292nvd
- secunia.com/advisories/39317nvd
- secunia.com/advisories/39659nvd
- secunia.com/advisories/39819nvd
- secunia.com/advisories/40545nvd
- secunia.com/advisories/43308nvd
- support.apple.com/kb/HT4170nvd
- support.apple.com/kb/HT4171nvd
- ubuntu.com/usn/usn-923-1nvd
- www.mandriva.com/security/advisoriesnvd
- www.oracle.com/technetwork/topics/security/cpuoct2010-175626.htmlnvd
- www.oracle.com/technetwork/topics/security/javacpumar2010-083341.htmlnvd
- www.redhat.com/support/errata/RHSA-2010-0337.htmlnvd
- www.redhat.com/support/errata/RHSA-2010-0338.htmlnvd
- www.redhat.com/support/errata/RHSA-2010-0339.htmlnvd
- www.redhat.com/support/errata/RHSA-2010-0383.htmlnvd
- www.redhat.com/support/errata/RHSA-2010-0471.htmlnvd
- www.securityfocus.com/archive/1/516397/100/0/threadednvd
- www.vmware.com/security/advisories/VMSA-2011-0003.htmlnvd
- www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.htmlnvd
- www.vupen.com/english/advisories/2010/1107nvd
- www.vupen.com/english/advisories/2010/1191nvd
- www.vupen.com/english/advisories/2010/1454nvd
- www.vupen.com/english/advisories/2010/1793nvd
- oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11173nvd
- oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14321nvd
News mentions
0No linked articles in our index yet.