VYPR
Unrated severityNVD Advisory· Published Apr 1, 2010· Updated Apr 29, 2026

CVE-2010-0849

CVE-2010-0849

Description

Unspecified vulnerability in the Java 2D component in Oracle Java SE and Java for Business 6 Update 18, 5.0 Update 23, 1.4.2_25, and 1.3.1_27 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the March 2010 CPU. Oracle has not commented on claims from a reliable researcher that this is a heap-based buffer overflow in a decoding routine used by the JPEGImageDecoderImpl interface, which allows code execution via a crafted JPEG image.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Heap-based buffer overflow in Java 2D JPEGImageDecoderImpl allows remote code execution via crafted JPEG image in unpatched Oracle Java SE 6u18, 5u23, 1.4.2_25, 1.3.1_27.

Vulnerability

Unspecified vulnerability in the Java 2D component of Oracle Java SE and Java for Business versions 6 Update 18, 5.0 Update 23, 1.4.2_25, and 1.3.1_27. According to a reliable researcher, the issue is a heap-based buffer overflow in a decoding routine used by the JPEGImageDecoderImpl interface, triggered by a crafted JPEG image.

Exploitation

An attacker can exploit this vulnerability by delivering a specially crafted JPEG image to a user or application that processes images using the affected Java 2D component. No authentication is required; the attack can be remote via a web page or email. The user must open or render the malicious image.

Impact

Successful exploitation allows remote attackers to execute arbitrary code, potentially gaining full control of the affected system. This compromises confidentiality, integrity, and availability. The vulnerability is rated as critical with a CVSS v2 base score of 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C).

Mitigation

Oracle released patches in the March 2010 Critical Patch Update (CPU) for the affected versions. Users should apply the latest Java updates from Oracle. Additionally, third-party vendors such as VMware, HP, and Apple have included fixes in their respective updates [1][2][3][4]. If patching is not possible, consider disabling Java in web browsers or restricting access to untrusted Java content.

AI Insight generated on May 24, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

240
  • Sun Corporation/Jdk77 versions
    cpe:2.3:a:sun:jdk:*:*:*:*:*:*:*:*+ 76 more
    • cpe:2.3:a:sun:jdk:*:*:*:*:*:*:*:*range: <=1.3.1_27
    • cpe:2.3:a:sun:jdk:1.3.0:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.3.0_01:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.3.0_02:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.3.0_03:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.3.0_04:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.3.0_05:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.3.1:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.3.1_01:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.3.1_01a:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.3.1_02:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.3.1_03:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.3.1_04:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.3.1_05:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.3.1_06:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.3.1_07:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.3.1_08:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.3.1_09:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.3.1_10:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.3.1_11:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.3.1_12:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.3.1_13:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.3.1_14:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.3.1_15:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.3.1_16:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.3.1_17:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.3.1_18:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.3.1_19:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.3.1_20:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.3.1_21:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.3.1_22:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.3.1_23:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.3.1_24:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.3.1_25:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.3.1_26:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.5.0:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.5.0:update1:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.5.0:update10:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.5.0:update11:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.5.0:update12:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.5.0:update13:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.5.0:update14:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.5.0:update15:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.5.0:update16:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.5.0:update17:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.5.0:update18:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.5.0:update19:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.5.0:update2:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.5.0:update20:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.5.0:update21:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.5.0:update22:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.5.0:update3:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.5.0:update4:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.5.0:update5:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.5.0:update6:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.5.0:update7:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.5.0:update8:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.5.0:update9:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.6.0:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.6.0:update1:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.6.0:update_10:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.6.0:update_11:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.6.0:update_12:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.6.0:update_13:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.6.0:update_14:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.6.0:update_15:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.6.0:update_16:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.6.0:update_17:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.6.0:update1_b06:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.6.0:update2:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.6.0:update_3:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.6.0:update_4:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.6.0:update_5:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.6.0:update_6:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.6.0:update_7:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:*:update_18:*:*:*:*:*:*range: <=1.6.0
    • cpe:2.3:a:sun:jdk:*:update23:*:*:*:*:*:*range: <=1.5.0
  • Sun Corporation/Jre101 versions
    cpe:2.3:a:sun:jre:*:*:*:*:*:*:*:*+ 100 more
    • cpe:2.3:a:sun:jre:*:*:*:*:*:*:*:*range: <=1.4.2_25
    • cpe:2.3:a:sun:jre:1.3.0:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.3.0:update1:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.3.0:update2:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.3.0:update3:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.3.0:update4:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.3.0:update5:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.3.1:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.3.1_03:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.3.1_04:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.3.1_05:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.3.1_06:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.3.1_07:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.3.1_08:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.3.1_09:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.3.1_10:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.3.1_11:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.3.1_12:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.3.1_13:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.3.1_14:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.3.1_15:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.3.1_16:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.3.1_17:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.3.1_18:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.3.1_19:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.3.1_2:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.3.1_20:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.3.1_21:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.3.1_22:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.3.1_23:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.3.1_24:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.3.1_25:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.3.1_26:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.3.1:update1:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.3.1:update2:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.4.2:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.4.2_1:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.4.2_10:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.4.2_11:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.4.2_12:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.4.2_13:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.4.2_14:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.4.2_15:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.4.2_16:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.4.2_17:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.4.2_18:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.4.2_19:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.4.2_2:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.4.2_20:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.4.2_21:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.4.2_22:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.4.2_23:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.4.2_24:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.4.2_3:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.4.2_4:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.4.2_5:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.4.2_6:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.4.2_7:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.4.2_8:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.4.2_9:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.5.0:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.5.0:update1:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.5.0:update10:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.5.0:update11:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.5.0:update12:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.5.0:update13:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.5.0:update14:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.5.0:update15:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.5.0:update16:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.5.0:update17:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.5.0:update18:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.5.0:update19:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.5.0:update2:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.5.0:update20:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.5.0:update21:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.5.0:update22:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.5.0:update3:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.5.0:update4:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.5.0:update5:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.5.0:update6:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.5.0:update7:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.5.0:update8:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.5.0:update9:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.6.0:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.6.0:update_10:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.6.0:update_11:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.6.0:update_12:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.6.0:update_13:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.6.0:update_14:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.6.0:update_15:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.6.0:update_16:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.6.0:update_17:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.6.0:update_2:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.6.0:update_3:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.6.0:update_4:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.6.0:update_5:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.6.0:update_6:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.6.0:update_7:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:*:update_18:*:*:*:*:*:*range: <=1.6.0
    • cpe:2.3:a:sun:jre:*:update23:*:*:*:*:*:*range: <=1.5.0
  • Sun Corporation/Sdk60 versions
    cpe:2.3:a:sun:sdk:*:*:*:*:*:*:*:*+ 59 more
    • cpe:2.3:a:sun:sdk:*:*:*:*:*:*:*:*range: <=1.4.2_25
    • cpe:2.3:a:sun:sdk:1.3.0:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.3.0_01:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.3.0_02:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.3.0_03:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.3.0_04:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.3.0_05:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.3.1:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.3.1_01:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.3.1_01a:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.3.1_02:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.3.1_03:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.3.1_04:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.3.1_05:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.3.1_06:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.3.1_07:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.3.1_08:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.3.1_09:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.3.1_10:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.3.1_11:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.3.1_12:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.3.1_13:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.3.1_14:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.3.1_15:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.3.1_16:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.3.1_17:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.3.1_18:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.3.1_19:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.3.1_20:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.3.1_21:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.3.1_22:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.3.1_23:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.3.1_24:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.3.1_25:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.3.1_26:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.4.2:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.4.2_02:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.4.2_1:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.4.2_10:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.4.2_11:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.4.2_12:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.4.2_13:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.4.2_14:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.4.2_15:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.4.2_16:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.4.2_17:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.4.2_18:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.4.2_19:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.4.2_20:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.4.2_21:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.4.2_22:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.4.2_23:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.4.2_24:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.4.2_3:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.4.2_4:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.4.2_5:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.4.2_6:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.4.2_7:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.4.2_8:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.4.2_9:*:*:*:*:*:*:*
  • Range: = 6 Update 18, 5.0 Update 23, 1.4.2_25, 1.3.1_27
  • Range: = 6 Update 18, 5.0 Update 23, 1.4.2_25, 1.3.1_27

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

33

News mentions

0

No linked articles in our index yet.