VYPR
Unrated severityNVD Advisory· Published Oct 19, 2010· Updated Apr 29, 2026

CVE-2010-3557

CVE-2010-3557

Description

Unspecified vulnerability in the Swing component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, 1.4.2_27, and 1.3.1_28 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the October 2010 CPU. Oracle has not commented on claims from a reliable downstream vendor that this is related to the modification of "behavior and state of certain JDK classes" and "mutable static."

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

An unspecified vulnerability in the Swing component of Oracle Java SE allows remote attackers to compromise confidentiality, integrity, and availability via unknown vectors.

Vulnerability

CVE-2010-3557 is an unspecified vulnerability in the Swing component of Oracle Java SE and Java for Business, affecting versions 6 Update 21, 5.0 Update 25, 1.4.2_27, and 1.3.1_28 [4]. The official description indicates the vulnerability can be exploited via unknown vectors, and a reliable downstream vendor suggested it relates to the modification of “behavior and state of certain JDK classes” and “mutable static” [1][2]. The exact conditions required to trigger the flaw remain undisclosed.

Exploitation

The vulnerability is remotely exploitable without authentication, as the attack vector is over a network [1][4]. An attacker would need to deliver a malicious Java applet or application to a user running an affected Java version. If the user grants the necessary privileges (such as by loading the applet in a browser), the attacker can trigger the unspecified vectors in the Swing component, leading to the compromise of the Java runtime environment [2][3].

Impact

Successful exploitation allows a remote attacker to affect the confidentiality, integrity, and availability of the targeted system [1][4]. This could potentially lead to unauthorized information disclosure, modification of data, or denial of service. The impact is at the privilege level of the user running the affected Java application or applet [3].

Mitigation

Oracle released fixes as part of the October 2010 Critical Patch Update (CPU) [1]. Affected users should upgrade to Java 6 Update 22 or later, Java 5.0 Update 26 or later, Java 1.4.2_28 or later, and Java 1.3.1_29 or later [1][4]. Red Hat and Avaya issued advisories for their respective products (e.g., RHSA-2010:0770) and recommend applying the updated packages [3][4]. VMware also included a fix for this CVE in VMSA-2011-0003.2 [1]. No workaround is documented; the only mitigation is to install the patched version.

AI Insight generated on May 23, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

257
  • Sun Corporation/Jdk83 versions
    cpe:2.3:a:sun:jdk:*:*:*:*:*:*:*:*+ 82 more
    • cpe:2.3:a:sun:jdk:*:*:*:*:*:*:*:*range: <=1.3.1_28
    • cpe:2.3:a:sun:jdk:1.3.0:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.3.0_01:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.3.0_02:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.3.0_03:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.3.0_04:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.3.0_05:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.3.1:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.3.1_01:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.3.1_01a:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.3.1_02:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.3.1_03:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.3.1_04:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.3.1_05:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.3.1_06:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.3.1_07:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.3.1_08:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.3.1_09:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.3.1_10:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.3.1_11:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.3.1_12:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.3.1_13:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.3.1_14:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.3.1_15:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.3.1_16:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.3.1_17:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.3.1_18:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.3.1_19:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.3.1_20:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.3.1_21:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.3.1_22:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.3.1_23:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.3.1_24:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.3.1_25:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.3.1_26:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.3.1_27:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.5.0:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.5.0:update1:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.5.0:update10:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.5.0:update11:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.5.0:update12:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.5.0:update13:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.5.0:update14:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.5.0:update15:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.5.0:update16:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.5.0:update17:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.5.0:update18:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.5.0:update19:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.5.0:update2:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.5.0:update20:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.5.0:update21:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.5.0:update22:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.5.0:update23:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.5.0:update24:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.5.0:update3:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.5.0:update4:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.5.0:update5:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.5.0:update6:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.5.0:update7:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.5.0:update8:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.5.0:update9:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.6.0:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.6.0:update1:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.6.0:update_10:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.6.0:update_11:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.6.0:update_12:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.6.0:update_13:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.6.0:update_14:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.6.0:update_15:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.6.0:update_16:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.6.0:update_17:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.6.0:update_18:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.6.0:update_19:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.6.0:update1_b06:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.6.0:update2:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.6.0:update_20:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.6.0:update_3:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.6.0:update_4:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.6.0:update_5:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.6.0:update_6:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:1.6.0:update_7:*:*:*:*:*:*
    • cpe:2.3:a:sun:jdk:*:update_21:*:*:*:*:*:*range: <=1.6.0
    • cpe:2.3:a:sun:jdk:*:update25:*:*:*:*:*:*range: <=1.5.0
  • Sun Corporation/Jre109 versions
    cpe:2.3:a:sun:jre:*:*:*:*:*:*:*:*+ 108 more
    • cpe:2.3:a:sun:jre:*:*:*:*:*:*:*:*range: <=1.4.2_27
    • cpe:2.3:a:sun:jre:1.3.0:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.3.0:update1:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.3.0:update2:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.3.0:update3:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.3.0:update4:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.3.0:update5:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.3.1:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.3.1_03:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.3.1_04:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.3.1_05:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.3.1_06:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.3.1_07:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.3.1_08:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.3.1_09:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.3.1_10:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.3.1_11:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.3.1_12:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.3.1_13:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.3.1_14:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.3.1_15:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.3.1_16:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.3.1_17:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.3.1_18:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.3.1_19:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.3.1_2:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.3.1_20:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.3.1_21:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.3.1_22:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.3.1_23:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.3.1_24:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.3.1_25:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.3.1_26:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.3.1_27:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.3.1:update1:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.3.1:update2:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.4.2:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.4.2_1:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.4.2_10:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.4.2_11:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.4.2_12:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.4.2_13:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.4.2_14:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.4.2_15:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.4.2_16:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.4.2_17:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.4.2_18:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.4.2_19:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.4.2_2:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.4.2_20:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.4.2_21:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.4.2_22:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.4.2_23:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.4.2_24:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.4.2_25:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.4.2_26:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.4.2_3:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.4.2_4:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.4.2_5:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.4.2_6:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.4.2_7:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.4.2_8:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.4.2_9:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.5.0:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.5.0:update1:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.5.0:update10:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.5.0:update11:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.5.0:update12:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.5.0:update13:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.5.0:update14:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.5.0:update15:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.5.0:update16:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.5.0:update17:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.5.0:update18:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.5.0:update19:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.5.0:update2:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.5.0:update20:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.5.0:update21:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.5.0:update22:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.5.0:update23:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.5.0:update24:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.5.0:update3:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.5.0:update4:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.5.0:update5:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.5.0:update6:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.5.0:update7:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.5.0:update8:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.5.0:update9:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.6.0:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.6.0:update_10:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.6.0:update_11:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.6.0:update_12:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.6.0:update_13:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.6.0:update_14:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.6.0:update_15:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.6.0:update_16:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.6.0:update_17:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.6.0:update_18:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.6.0:update_19:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.6.0:update_2:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.6.0:update_20:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.6.0:update_3:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.6.0:update_4:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.6.0:update_5:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.6.0:update_6:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:1.6.0:update_7:*:*:*:*:*:*
    • cpe:2.3:a:sun:jre:*:update_21:*:*:*:*:*:*range: <=1.6.0
    • cpe:2.3:a:sun:jre:*:update25:*:*:*:*:*:*range: <=1.5.0
  • Sun Corporation/Sdk63 versions
    cpe:2.3:a:sun:sdk:*:*:*:*:*:*:*:*+ 62 more
    • cpe:2.3:a:sun:sdk:*:*:*:*:*:*:*:*range: <=1.4.2_27
    • cpe:2.3:a:sun:sdk:1.3.0:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.3.0_01:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.3.0_02:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.3.0_03:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.3.0_04:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.3.0_05:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.3.1:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.3.1_01:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.3.1_01a:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.3.1_02:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.3.1_03:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.3.1_04:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.3.1_05:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.3.1_06:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.3.1_07:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.3.1_08:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.3.1_09:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.3.1_10:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.3.1_11:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.3.1_12:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.3.1_13:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.3.1_14:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.3.1_15:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.3.1_16:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.3.1_17:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.3.1_18:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.3.1_19:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.3.1_20:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.3.1_21:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.3.1_22:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.3.1_23:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.3.1_24:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.3.1_25:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.3.1_26:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.3.1_27:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.4.2:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.4.2_02:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.4.2_1:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.4.2_10:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.4.2_11:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.4.2_12:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.4.2_13:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.4.2_14:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.4.2_15:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.4.2_16:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.4.2_17:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.4.2_18:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.4.2_19:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.4.2_20:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.4.2_21:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.4.2_22:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.4.2_23:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.4.2_24:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.4.2_25:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.4.2_26:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.4.2_3:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.4.2_4:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.4.2_5:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.4.2_6:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.4.2_7:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.4.2_8:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:sdk:1.4.2_9:*:*:*:*:*:*:*
  • Range: 6 Update 21, 5.0 Update 25, 1.4.2_27, 1.3.1_28
  • Range: 6 Update 21, 5.0 Update 25, 1.4.2_27, 1.3.1_28

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

34

News mentions

0

No linked articles in our index yet.