CVE-2010-3574
Description
Unspecified vulnerability in the Networking component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, 1.4.2_27, and 1.3.1_28 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the October 2010 CPU. Oracle has not commented on claims from a reliable downstream vendor that HttpURLConnection does not properly check for the allowHttpTrace permission, which allows untrusted code to perform HTTP TRACE requests.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Unspecified vulnerability in Oracle Java SE Networking component allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors, possibly related to HttpURLConnection and HTTP TRACE.
Vulnerability
Unspecified vulnerability in the Networking component of Oracle Java SE and Java for Business versions 6 Update 21, 5.0 Update 25, 1.4.2_27, and 1.3.1_28 [1][2][3][4]. A reliable downstream vendor suggests that HttpURLConnection does not properly check the allowHttpTrace permission, allowing untrusted code to perform HTTP TRACE requests.
Exploitation
The vulnerability can be exploited remotely by an attacker without authentication. The exact steps are not disclosed, but the attack vector is over the network. It may involve crafting a malicious web page or application that triggers the HTTP TRACE request through HttpURLConnection.
Impact
Successful exploitation could lead to unauthorized information disclosure, modification, and denial of service. The impact is broad, affecting confidentiality, integrity, and availability.
Mitigation
Oracle released updates in the October 2010 Critical Patch Update. Affected versions should be upgraded to patched versions: Java SE 6 Update 22 or later, Java SE 5.0 Update 26 or later, SDK/JRE 1.4.2_28 or later, and 1.3.1_29 or later. Workarounds include restricting network access or disabling the HTTP TRACE method on servers.
AI Insight generated on May 23, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
257cpe:2.3:a:sun:jdk:*:*:*:*:*:*:*:*+ 82 more
- cpe:2.3:a:sun:jdk:*:*:*:*:*:*:*:*range: <=1.3.1_28
- cpe:2.3:a:sun:jdk:1.3.0:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.0_01:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.0_02:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.0_03:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.0_04:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.0_05:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.1:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.1_01:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.1_01a:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.1_02:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.1_03:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.1_04:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.1_05:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.1_06:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.1_07:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.1_08:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.1_09:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.1_10:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.1_11:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.1_12:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.1_13:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.1_14:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.1_15:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.1_16:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.1_17:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.1_18:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.1_19:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.1_20:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.1_21:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.1_22:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.1_23:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.1_24:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.1_25:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.1_26:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.1_27:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.5.0:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.5.0:update1:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.5.0:update10:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.5.0:update11:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.5.0:update12:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.5.0:update13:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.5.0:update14:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.5.0:update15:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.5.0:update16:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.5.0:update17:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.5.0:update18:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.5.0:update19:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.5.0:update2:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.5.0:update20:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.5.0:update21:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.5.0:update22:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.5.0:update23:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.5.0:update24:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.5.0:update3:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.5.0:update4:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.5.0:update5:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.5.0:update6:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.5.0:update7:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.5.0:update8:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.5.0:update9:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.6.0:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.6.0:update1:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.6.0:update_10:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.6.0:update_11:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.6.0:update_12:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.6.0:update_13:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.6.0:update_14:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.6.0:update_15:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.6.0:update_16:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.6.0:update_17:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.6.0:update_18:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.6.0:update_19:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.6.0:update1_b06:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.6.0:update2:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.6.0:update_20:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.6.0:update_3:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.6.0:update_4:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.6.0:update_5:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.6.0:update_6:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.6.0:update_7:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:*:update_21:*:*:*:*:*:*range: <=1.6.0
- cpe:2.3:a:sun:jdk:*:update25:*:*:*:*:*:*range: <=1.5.0
cpe:2.3:a:sun:jre:*:*:*:*:*:*:*:*+ 108 more
- cpe:2.3:a:sun:jre:*:*:*:*:*:*:*:*range: <=1.4.2_27
- cpe:2.3:a:sun:jre:1.3.0:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.0:update1:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.0:update2:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.0:update3:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.0:update4:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.0:update5:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.1:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.1_03:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.1_04:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.1_05:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.1_06:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.1_07:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.1_08:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.1_09:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.1_10:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.1_11:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.1_12:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.1_13:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.1_14:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.1_15:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.1_16:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.1_17:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.1_18:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.1_19:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.1_2:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.1_20:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.1_21:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.1_22:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.1_23:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.1_24:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.1_25:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.1_26:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.1_27:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.1:update1:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.1:update2:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.4.2:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.4.2_1:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.4.2_10:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.4.2_11:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.4.2_12:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.4.2_13:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.4.2_14:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.4.2_15:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.4.2_16:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.4.2_17:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.4.2_18:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.4.2_19:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.4.2_2:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.4.2_20:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.4.2_21:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.4.2_22:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.4.2_23:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.4.2_24:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.4.2_25:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.4.2_26:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.4.2_3:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.4.2_4:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.4.2_5:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.4.2_6:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.4.2_7:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.4.2_8:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.4.2_9:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.5.0:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.5.0:update1:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.5.0:update10:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.5.0:update11:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.5.0:update12:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.5.0:update13:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.5.0:update14:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.5.0:update15:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.5.0:update16:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.5.0:update17:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.5.0:update18:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.5.0:update19:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.5.0:update2:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.5.0:update20:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.5.0:update21:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.5.0:update22:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.5.0:update23:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.5.0:update24:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.5.0:update3:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.5.0:update4:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.5.0:update5:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.5.0:update6:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.5.0:update7:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.5.0:update8:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.5.0:update9:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.6.0:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.6.0:update_10:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.6.0:update_11:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.6.0:update_12:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.6.0:update_13:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.6.0:update_14:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.6.0:update_15:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.6.0:update_16:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.6.0:update_17:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.6.0:update_18:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.6.0:update_19:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.6.0:update_2:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.6.0:update_20:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.6.0:update_3:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.6.0:update_4:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.6.0:update_5:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.6.0:update_6:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.6.0:update_7:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:*:update_21:*:*:*:*:*:*range: <=1.6.0
- cpe:2.3:a:sun:jre:*:update25:*:*:*:*:*:*range: <=1.5.0
cpe:2.3:a:sun:sdk:*:*:*:*:*:*:*:*+ 62 more
- cpe:2.3:a:sun:sdk:*:*:*:*:*:*:*:*range: <=1.4.2_27
- cpe:2.3:a:sun:sdk:1.3.0:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.3.0_01:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.3.0_02:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.3.0_03:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.3.0_04:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.3.0_05:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.3.1:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.3.1_01:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.3.1_01a:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.3.1_02:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.3.1_03:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.3.1_04:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.3.1_05:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.3.1_06:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.3.1_07:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.3.1_08:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.3.1_09:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.3.1_10:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.3.1_11:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.3.1_12:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.3.1_13:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.3.1_14:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.3.1_15:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.3.1_16:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.3.1_17:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.3.1_18:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.3.1_19:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.3.1_20:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.3.1_21:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.3.1_22:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.3.1_23:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.3.1_24:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.3.1_25:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.3.1_26:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.3.1_27:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.4.2:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.4.2_02:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.4.2_1:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.4.2_10:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.4.2_11:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.4.2_12:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.4.2_13:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.4.2_14:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.4.2_15:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.4.2_16:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.4.2_17:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.4.2_18:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.4.2_19:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.4.2_20:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.4.2_21:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.4.2_22:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.4.2_23:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.4.2_24:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.4.2_25:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.4.2_26:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.4.2_3:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.4.2_4:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.4.2_5:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.4.2_6:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.4.2_7:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.4.2_8:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.4.2_9:*:*:*:*:*:*:*
- Range: 6 Update 21, 5.0 Update 25, 1.4.2_27, 1.3.1_28
- Range: 6 Update 21, 5.0 Update 25, 1.4.2_27, 1.3.1_28
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
39- www.oracle.com/technetwork/topics/security/cpujan2011-194091.htmlnvdPatchVendor Advisory
- www.oracle.com/technetwork/topics/security/javacpuoct2010-176258.htmlnvdPatchVendor Advisory
- secunia.com/advisories/41967nvdVendor Advisory
- secunia.com/advisories/41972nvdVendor Advisory
- secunia.com/advisories/42377nvdVendor Advisory
- secunia.com/advisories/42432nvdVendor Advisory
- secunia.com/advisories/42974nvdVendor Advisory
- secunia.com/advisories/44954nvdVendor Advisory
- www.redhat.com/support/errata/RHSA-2010-0768.htmlnvdVendor Advisory
- www.redhat.com/support/errata/RHSA-2010-0770.htmlnvdVendor Advisory
- www.redhat.com/support/errata/RHSA-2010-0807.htmlnvdVendor Advisory
- www.redhat.com/support/errata/RHSA-2010-0865.htmlnvdVendor Advisory
- www.redhat.com/support/errata/RHSA-2010-0873.htmlnvdVendor Advisory
- www.redhat.com/support/errata/RHSA-2010-0935.htmlnvdVendor Advisory
- www.redhat.com/support/errata/RHSA-2010-0987.htmlnvdVendor Advisory
- www.redhat.com/support/errata/RHSA-2011-0152.htmlnvdVendor Advisory
- www.redhat.com/support/errata/RHSA-2011-0880.htmlnvdVendor Advisory
- www.vupen.com/english/advisories/2010/3086nvdVendor Advisory
- www.vupen.com/english/advisories/2010/3112nvdVendor Advisory
- www.vupen.com/english/advisories/2011/0134nvdVendor Advisory
- www.vupen.com/english/advisories/2011/0143nvdVendor Advisory
- h20000.www2.hp.com/bizsupport/TechSupport/Document.jspnvd
- lists.fedoraproject.org/pipermail/package-announce/2010-October/049455.htmlnvd
- lists.fedoraproject.org/pipermail/package-announce/2010-October/049528.htmlnvd
- lists.fedoraproject.org/pipermail/package-announce/2010-October/049702.htmlnvd
- lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.htmlnvd
- marc.infonvd
- security.gentoo.org/glsa/glsa-201406-32.xmlnvd
- support.avaya.com/css/P8/documents/100114315nvd
- support.avaya.com/css/P8/documents/100114327nvd
- support.avaya.com/css/P8/documents/100123193nvd
- www.hitachi.co.jp/Prod/comp/soft1/security/info/vuls/HS10-030/index.htmlnvd
- www.securityfocus.com/archive/1/516397/100/0/threadednvd
- www.securityfocus.com/bid/44011nvd
- www.ubuntu.com/usn/USN-1010-1nvd
- www.vmware.com/security/advisories/VMSA-2011-0003.htmlnvd
- bugzilla.redhat.com/show_bug.cginvd
- oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12367nvd
- oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12462nvd
News mentions
0No linked articles in our index yet.