VYPR
Unrated severityNVD Advisory· Published Apr 1, 2010· Updated Apr 29, 2026

CVE-2010-0846

CVE-2010-0846

Description

Unspecified vulnerability in the ImageIO component in Oracle Java SE and Java for Business 6 Update 18, 5.0 Update 23, 1.4.2_25, and 1.3.1_27 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the March 2010 CPU. Oracle has not commented on claims from a reliable researcher that this is a heap-based buffer overflow that allows remote attackers to execute arbitrary code, related to an "invalid assignment" and inconsistent length values in a JPEG image encoder (JPEGImageEncoderImpl).

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Heap-based buffer overflow in Oracle Java SE ImageIO component allows remote code execution via crafted JPEG images.

Vulnerability

CVE-2010-0846 is an unspecified vulnerability in the ImageIO component of Oracle Java SE and Java for Business, affecting versions 6 Update 18, 5.0 Update 23, 1.4.2_25, and 1.3.1_27 [1][2][3][4]. According to a reliable researcher, the issue is a heap-based buffer overflow in the JPEG image encoder (JPEGImageEncoderImpl) caused by an invalid assignment and inconsistent length values [description]. This allows remote attackers to execute arbitrary code via unknown vectors, likely a crafted JPEG image.

Exploitation

An attacker can exploit this vulnerability by delivering a specially crafted JPEG image to a user or application that processes it using the vulnerable Java ImageIO component. No authentication is required; the attack can be performed remotely over a network. The user may need to open the malicious image in a Java-enabled application or browser.

Impact

Successful exploitation could allow an attacker to execute arbitrary code with the privileges of the user running the Java application. This can lead to complete compromise of confidentiality, integrity, and availability of the affected system.

Mitigation

Oracle released fixes in the March 2010 Critical Patch Update (CPU) for the affected versions [description]. Users should apply the latest Java updates from Oracle. Additionally, third-party vendors such as VMware [1], HP [2][3], and Apple [4] have included fixes in their respective security updates. If patching is not possible, consider disabling Java in the browser or restricting untrusted Java applets.

AI Insight generated on May 23, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

238
  • Sun Corporation/Jdk76 versions
    cpe:2.3:a:sun:jdk:*:*:*:*:*:*:*:*+ 75 more
    • cpe:2.3:a:sun:jdk:*:*:*:*:*:*:*:*range: <=1.3.1_27
    • cpe:2.3:a:sun:jdk:1.3.0:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.3.0_01:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.3.0_02:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.3.0_03:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.3.0_04:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.3.0_05:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.3.1:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.3.1_01:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.3.1_01a:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.3.1_02:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.3.1_03:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.3.1_04:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.3.1_05:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.3.1_06:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.3.1_07:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.3.1_08:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.3.1_09:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.3.1_10:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.3.1_11:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.3.1_12:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.3.1_13:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.3.1_14:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.3.1_15:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.3.1_16:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.3.1_17:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.3.1_18:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.3.1_19:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.3.1_20:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.3.1_21:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.3.1_22:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.3.1_23:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.3.1_24:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.3.1_25:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.3.1_26:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.5.0:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.5.0:update1:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.5.0:update10:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.5.0:update11:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.5.0:update12:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.5.0:update13:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.5.0:update14:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.5.0:update15:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.5.0:update16:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.5.0:update17:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.5.0:update18:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.5.0:update19:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.5.0:update2:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.5.0:update20:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.5.0:update21:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.5.0:update3:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.5.0:update4:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.5.0:update5:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.5.0:update6:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.5.0:update7:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.5.0:update8:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.5.0:update9:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.6.0:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.6.0:update1:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.6.0:update_10:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.6.0:update_11:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.6.0:update_12:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.6.0:update_13:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.6.0:update_14:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.6.0:update_15:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.6.0:update_16:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.6.0:update_17:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.6.0:update1_b06:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.6.0:update2:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.6.0:update_3:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.6.0:update_4:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.6.0:update_5:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.6.0:update_6:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.6.0:update_7:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:*:update_18:*:*:*:*:*:*range: <=1.6.0
    • cpe:2.3:a:sun:jdk:*:update23:*:*:*:*:*:*range: <=1.5.0
  • Sun Corporation/Jre100 versions
    cpe:2.3:a:sun:jre:*:*:*:*:*:*:*:*+ 99 more
    • cpe:2.3:a:sun:jre:*:*:*:*:*:*:*:*range: <=1.4.2_25
    • cpe:2.3:a:sun:jre:1.3.0:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.3.0:update1:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.3.0:update2:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.3.0:update3:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.3.0:update4:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.3.0:update5:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.3.1:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.3.1_03:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.3.1_04:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.3.1_05:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.3.1_06:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.3.1_07:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.3.1_08:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.3.1_09:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.3.1_10:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.3.1_11:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.3.1_12:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.3.1_13:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.3.1_14:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.3.1_15:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.3.1_16:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.3.1_17:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.3.1_18:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.3.1_19:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.3.1_2:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.3.1_20:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.3.1_21:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.3.1_22:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.3.1_23:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.3.1_24:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.3.1_25:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.3.1_26:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.3.1:update1:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.3.1:update2:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.4.2:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.4.2_1:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.4.2_10:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.4.2_11:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.4.2_12:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.4.2_13:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.4.2_14:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.4.2_15:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.4.2_16:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.4.2_17:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.4.2_18:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.4.2_19:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.4.2_2:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.4.2_20:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.4.2_21:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.4.2_22:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.4.2_23:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.4.2_24:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.4.2_3:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.4.2_4:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.4.2_5:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.4.2_6:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.4.2_7:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.4.2_8:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.4.2_9:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.5.0:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.5.0:update1:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.5.0:update10:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.5.0:update11:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.5.0:update12:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.5.0:update13:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.5.0:update14:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.5.0:update15:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.5.0:update16:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.5.0:update17:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.5.0:update18:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.5.0:update19:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.5.0:update2:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.5.0:update20:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.5.0:update21:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.5.0:update3:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.5.0:update4:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.5.0:update5:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.5.0:update6:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.5.0:update7:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.5.0:update8:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.5.0:update9:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.6.0:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.6.0:update_10:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.6.0:update_11:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.6.0:update_12:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.6.0:update_13:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.6.0:update_14:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.6.0:update_15:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.6.0:update_16:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.6.0:update_17:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.6.0:update_2:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.6.0:update_3:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.6.0:update_4:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.6.0:update_5:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.6.0:update_6:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.6.0:update_7:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:*:update_18:*:*:*:*:*:*range: <=1.6.0
    • cpe:2.3:a:sun:jre:*:update23:*:*:*:*:*:*range: <=1.5.0
  • Sun Corporation/Sdk60 versions
    cpe:2.3:a:sun:sdk:*:*:*:*:*:*:*:*+ 59 more
    • cpe:2.3:a:sun:sdk:*:*:*:*:*:*:*:*range: <=1.4.2_25
    • cpe:2.3:a:sun:sdk:1.3.0:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.3.0_01:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.3.0_02:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.3.0_03:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.3.0_04:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.3.0_05:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.3.1:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.3.1_01:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.3.1_01a:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.3.1_02:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.3.1_03:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.3.1_04:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.3.1_05:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.3.1_06:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.3.1_07:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.3.1_08:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.3.1_09:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.3.1_10:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.3.1_11:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.3.1_12:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.3.1_13:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.3.1_14:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.3.1_15:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.3.1_16:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.3.1_17:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.3.1_18:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.3.1_19:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.3.1_20:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.3.1_21:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.3.1_22:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.3.1_23:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.3.1_24:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.3.1_25:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.3.1_26:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.4.2:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.4.2_02:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.4.2_1:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.4.2_10:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.4.2_11:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.4.2_12:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.4.2_13:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.4.2_14:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.4.2_15:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.4.2_16:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.4.2_17:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.4.2_18:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.4.2_19:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.4.2_20:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.4.2_21:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.4.2_22:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.4.2_23:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.4.2_24:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.4.2_3:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.4.2_4:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.4.2_5:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.4.2_6:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.4.2_7:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.4.2_8:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.4.2_9:*:*:*:*:*:*:*
  • Range: 6 Update 18, 5.0 Update 23, 1.4.2_25, 1.3.1_27
  • Range: 6 Update 18, 5.0 Update 23, 1.4.2_25, 1.3.1_27

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

33

News mentions

0

No linked articles in our index yet.