All the vulnerabilites related to sun - java_se
cve-2009-2716
Vulnerability from cvelistv5
Published
2009-08-10 20:00
Modified
2024-08-07 05:59
Severity ?
EPSS score ?
Summary
The plugin functionality in Sun Java SE 6 before Update 15 does not properly implement version selection, which allows context-dependent attackers to leverage vulnerabilities in "old zip and certificate handling" and have unspecified other impact via unknown vectors.
References
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/37460 | third-party-advisory, x_refsource_SECUNIA | |
http://security.gentoo.org/glsa/glsa-200911-02.xml | vendor-advisory, x_refsource_GENTOO | |
http://www.vmware.com/security/advisories/VMSA-2009-0016.html | x_refsource_CONFIRM | |
http://java.sun.com/javase/6/webnotes/6u15.html | x_refsource_CONFIRM | |
http://www.securityfocus.com/archive/1/507985/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://secunia.com/advisories/37386 | third-party-advisory, x_refsource_SECUNIA | |
http://www.vupen.com/english/advisories/2009/3316 | vdb-entry, x_refsource_VUPEN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T05:59:56.951Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "37460", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/37460" }, { "name": "GLSA-200911-02", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200911-02.xml" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://java.sun.com/javase/6/webnotes/6u15.html" }, { "name": "20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded" }, { "name": "37386", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/37386" }, { "name": "ADV-2009-3316", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/3316" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2009-08-04T00:00:00", "descriptions": [ { "lang": "en", "value": "The plugin functionality in Sun Java SE 6 before Update 15 does not properly implement version selection, which allows context-dependent attackers to leverage vulnerabilities in \"old zip and certificate handling\" and have unspecified other impact via unknown vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-10T18:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "37460", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/37460" }, { "name": "GLSA-200911-02", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200911-02.xml" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://java.sun.com/javase/6/webnotes/6u15.html" }, { "name": "20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded" }, { "name": "37386", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/37386" }, { "name": "ADV-2009-3316", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/3316" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2009-2716", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The plugin functionality in Sun Java SE 6 before Update 15 does not properly implement version selection, which allows context-dependent attackers to leverage vulnerabilities in \"old zip and certificate handling\" and have unspecified other impact via unknown vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "37460", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/37460" }, { "name": "GLSA-200911-02", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200911-02.xml" }, { "name": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html", "refsource": "CONFIRM", "url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html" }, { "name": "http://java.sun.com/javase/6/webnotes/6u15.html", "refsource": "CONFIRM", "url": "http://java.sun.com/javase/6/webnotes/6u15.html" }, { "name": "20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded" }, { "name": "37386", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/37386" }, { "name": "ADV-2009-3316", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/3316" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2009-2716", "datePublished": "2009-08-10T20:00:00", "dateReserved": "2009-08-10T00:00:00", "dateUpdated": "2024-08-07T05:59:56.951Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2009-2717
Vulnerability from cvelistv5
Published
2009-08-10 20:00
Modified
2024-09-16 16:48
Severity ?
EPSS score ?
Summary
The Abstract Window Toolkit (AWT) implementation in Sun Java SE 6 before Update 15 on Windows 2000 Professional does not provide a Security Warning Icon, which makes it easier for context-dependent attackers to trick a user into interacting unsafely with an untrusted applet.
References
▼ | URL | Tags |
---|---|---|
http://java.sun.com/javase/6/webnotes/6u15.html | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T05:59:57.067Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://java.sun.com/javase/6/webnotes/6u15.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "The Abstract Window Toolkit (AWT) implementation in Sun Java SE 6 before Update 15 on Windows 2000 Professional does not provide a Security Warning Icon, which makes it easier for context-dependent attackers to trick a user into interacting unsafely with an untrusted applet." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2009-08-10T20:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://java.sun.com/javase/6/webnotes/6u15.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2009-2717", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Abstract Window Toolkit (AWT) implementation in Sun Java SE 6 before Update 15 on Windows 2000 Professional does not provide a Security Warning Icon, which makes it easier for context-dependent attackers to trick a user into interacting unsafely with an untrusted applet." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://java.sun.com/javase/6/webnotes/6u15.html", "refsource": "CONFIRM", "url": "http://java.sun.com/javase/6/webnotes/6u15.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2009-2717", "datePublished": "2009-08-10T20:00:00Z", "dateReserved": "2009-08-10T00:00:00Z", "dateUpdated": "2024-09-16T16:48:57.071Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2009-3869
Vulnerability from cvelistv5
Published
2009-11-05 16:00
Modified
2024-08-07 06:45
Severity ?
EPSS score ?
Summary
Stack-based buffer overflow in the setDiffICM function in the Abstract Window Toolkit (AWT) in Java Runtime Environment (JRE) in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to execute arbitrary code via a crafted argument, aka Bug Id 6872357.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T06:45:49.673Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "HPSBUX02503", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=126566824131534\u0026w=2" }, { "name": "oval:org.mitre.oval:def:11262", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11262" }, { "name": "36881", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/36881" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.apple.com/kb/HT3970" }, { "name": "HPSBMU02799", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=134254866602253\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.apple.com/kb/HT3969" }, { "name": "HPSBMU02703", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=131593453929393\u0026w=2" }, { "name": "GLSA-200911-02", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200911-02.xml" }, { "name": "RHSA-2009:1694", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2009-1694.html" }, { "name": "oval:org.mitre.oval:def:10741", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10741" }, { "name": "APPLE-SA-2009-12-03-1", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2009/Dec/msg00000.html" }, { "name": "oval:org.mitre.oval:def:8566", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8566" }, { "name": "oval:org.mitre.oval:def:7400", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7400" }, { "name": "37231", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/37231" }, { "name": "SSRT100019", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=126566824131534\u0026w=2" }, { "name": "1023132", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1023132" }, { "name": "SSRT100242", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=131593453929393\u0026w=2" }, { "name": "SUSE-SA:2009:058", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00010.html" }, { "name": "270474", "tags": [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-270474-1" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://zerodayinitiative.com/advisories/ZDI-09-078/" }, { "name": "ADV-2009-3131", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/3131" }, { "name": "APPLE-SA-2009-12-03-2", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2009/Dec/msg00001.html" }, { "name": "37581", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/37581" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2010-084891.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://java.sun.com/javase/6/webnotes/6u17.html" }, { "name": "37841", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/37841" }, { "name": "37239", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/37239" }, { "name": "MDVSA-2010:084", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:084" }, { "name": "37386", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/37386" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2009-11-03T00:00:00", "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in the setDiffICM function in the Abstract Window Toolkit (AWT) in Java Runtime Environment (JRE) in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to execute arbitrary code via a crafted argument, aka Bug Id 6872357." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-18T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "HPSBUX02503", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=126566824131534\u0026w=2" }, { "name": "oval:org.mitre.oval:def:11262", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11262" }, { "name": "36881", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/36881" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.apple.com/kb/HT3970" }, { "name": "HPSBMU02799", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=134254866602253\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.apple.com/kb/HT3969" }, { "name": "HPSBMU02703", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=131593453929393\u0026w=2" }, { "name": "GLSA-200911-02", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200911-02.xml" }, { "name": "RHSA-2009:1694", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2009-1694.html" }, { "name": "oval:org.mitre.oval:def:10741", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10741" }, { "name": "APPLE-SA-2009-12-03-1", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2009/Dec/msg00000.html" }, { "name": "oval:org.mitre.oval:def:8566", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8566" }, { "name": "oval:org.mitre.oval:def:7400", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7400" }, { "name": "37231", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/37231" }, { "name": "SSRT100019", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=126566824131534\u0026w=2" }, { "name": "1023132", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1023132" }, { "name": "SSRT100242", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=131593453929393\u0026w=2" }, { "name": "SUSE-SA:2009:058", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00010.html" }, { "name": "270474", "tags": [ "vendor-advisory", "x_refsource_SUNALERT" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-270474-1" }, { "tags": [ "x_refsource_MISC" ], "url": "http://zerodayinitiative.com/advisories/ZDI-09-078/" }, { "name": "ADV-2009-3131", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/3131" }, { "name": "APPLE-SA-2009-12-03-2", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2009/Dec/msg00001.html" }, { "name": "37581", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/37581" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2010-084891.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://java.sun.com/javase/6/webnotes/6u17.html" }, { "name": "37841", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/37841" }, { "name": "37239", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/37239" }, { "name": "MDVSA-2010:084", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:084" }, { "name": "37386", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/37386" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2009-3869", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Stack-based buffer overflow in the setDiffICM function in the Abstract Window Toolkit (AWT) in Java Runtime Environment (JRE) in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to execute arbitrary code via a crafted argument, aka Bug Id 6872357." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "HPSBUX02503", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=126566824131534\u0026w=2" }, { "name": "oval:org.mitre.oval:def:11262", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11262" }, { "name": "36881", "refsource": "BID", "url": "http://www.securityfocus.com/bid/36881" }, { "name": "http://support.apple.com/kb/HT3970", "refsource": "CONFIRM", "url": "http://support.apple.com/kb/HT3970" }, { "name": "HPSBMU02799", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=134254866602253\u0026w=2" }, { "name": "http://support.apple.com/kb/HT3969", "refsource": "CONFIRM", "url": "http://support.apple.com/kb/HT3969" }, { "name": "HPSBMU02703", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=131593453929393\u0026w=2" }, { "name": "GLSA-200911-02", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200911-02.xml" }, { "name": "RHSA-2009:1694", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2009-1694.html" }, { "name": "oval:org.mitre.oval:def:10741", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10741" }, { "name": "APPLE-SA-2009-12-03-1", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2009/Dec/msg00000.html" }, { "name": "oval:org.mitre.oval:def:8566", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8566" }, { "name": "oval:org.mitre.oval:def:7400", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7400" }, { "name": "37231", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/37231" }, { "name": "SSRT100019", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=126566824131534\u0026w=2" }, { "name": "1023132", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1023132" }, { "name": "SSRT100242", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=131593453929393\u0026w=2" }, { "name": "SUSE-SA:2009:058", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00010.html" }, { "name": "270474", "refsource": "SUNALERT", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-270474-1" }, { "name": "http://zerodayinitiative.com/advisories/ZDI-09-078/", "refsource": "MISC", "url": "http://zerodayinitiative.com/advisories/ZDI-09-078/" }, { "name": "ADV-2009-3131", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/3131" }, { "name": "APPLE-SA-2009-12-03-2", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2009/Dec/msg00001.html" }, { "name": "37581", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/37581" }, { "name": "http://www.oracle.com/technetwork/topics/security/cpujan2010-084891.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/cpujan2010-084891.html" }, { "name": "http://java.sun.com/javase/6/webnotes/6u17.html", "refsource": "CONFIRM", "url": "http://java.sun.com/javase/6/webnotes/6u17.html" }, { "name": "37841", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/37841" }, { "name": "37239", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/37239" }, { "name": "MDVSA-2010:084", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:084" }, { "name": "37386", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/37386" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2009-3869", "datePublished": "2009-11-05T16:00:00", "dateReserved": "2009-11-05T00:00:00", "dateUpdated": "2024-08-07T06:45:49.673Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2009-3868
Vulnerability from cvelistv5
Published
2009-11-05 16:00
Modified
2024-08-07 06:45
Severity ?
EPSS score ?
Summary
Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 does not properly parse color profiles, which allows remote attackers to gain privileges via a crafted image file, aka Bug Id 6862970.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T06:45:50.331Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "HPSBUX02503", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=126566824131534\u0026w=2" }, { "name": "36881", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/36881" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.apple.com/kb/HT3970" }, { "name": "HPSBMU02799", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=134254866602253\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.apple.com/kb/HT3969" }, { "name": "HPSBMU02703", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=131593453929393\u0026w=2" }, { "name": "GLSA-200911-02", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200911-02.xml" }, { "name": "RHSA-2009:1694", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2009-1694.html" }, { "name": "APPLE-SA-2009-12-03-1", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2009/Dec/msg00000.html" }, { "name": "37231", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/37231" }, { "name": "SSRT100019", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=126566824131534\u0026w=2" }, { "name": "1023132", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1023132" }, { "name": "oval:org.mitre.oval:def:11834", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11834" }, { "name": "SSRT100242", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=131593453929393\u0026w=2" }, { "name": "SUSE-SA:2009:058", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00010.html" }, { "name": "270474", "tags": [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-270474-1" }, { "name": "ADV-2009-3131", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/3131" }, { "name": "APPLE-SA-2009-12-03-2", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2009/Dec/msg00001.html" }, { "name": "37581", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/37581" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2010-084891.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://java.sun.com/javase/6/webnotes/6u17.html" }, { "name": "oval:org.mitre.oval:def:6786", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6786" }, { "name": "37841", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/37841" }, { "name": "oval:org.mitre.oval:def:8622", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8622" }, { "name": "37239", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/37239" }, { "name": "37386", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/37386" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2009-11-03T00:00:00", "descriptions": [ { "lang": "en", "value": "Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 does not properly parse color profiles, which allows remote attackers to gain privileges via a crafted image file, aka Bug Id 6862970." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-18T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "HPSBUX02503", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=126566824131534\u0026w=2" }, { "name": "36881", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/36881" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.apple.com/kb/HT3970" }, { "name": "HPSBMU02799", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=134254866602253\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.apple.com/kb/HT3969" }, { "name": "HPSBMU02703", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=131593453929393\u0026w=2" }, { "name": "GLSA-200911-02", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200911-02.xml" }, { "name": "RHSA-2009:1694", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2009-1694.html" }, { "name": "APPLE-SA-2009-12-03-1", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2009/Dec/msg00000.html" }, { "name": "37231", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/37231" }, { "name": "SSRT100019", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=126566824131534\u0026w=2" }, { "name": "1023132", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1023132" }, { "name": "oval:org.mitre.oval:def:11834", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11834" }, { "name": "SSRT100242", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=131593453929393\u0026w=2" }, { "name": "SUSE-SA:2009:058", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00010.html" }, { "name": "270474", "tags": [ "vendor-advisory", "x_refsource_SUNALERT" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-270474-1" }, { "name": "ADV-2009-3131", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/3131" }, { "name": "APPLE-SA-2009-12-03-2", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2009/Dec/msg00001.html" }, { "name": "37581", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/37581" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2010-084891.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://java.sun.com/javase/6/webnotes/6u17.html" }, { "name": "oval:org.mitre.oval:def:6786", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6786" }, { "name": "37841", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/37841" }, { "name": "oval:org.mitre.oval:def:8622", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8622" }, { "name": "37239", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/37239" }, { "name": "37386", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/37386" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2009-3868", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 does not properly parse color profiles, which allows remote attackers to gain privileges via a crafted image file, aka Bug Id 6862970." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "HPSBUX02503", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=126566824131534\u0026w=2" }, { "name": "36881", "refsource": "BID", "url": "http://www.securityfocus.com/bid/36881" }, { "name": "http://support.apple.com/kb/HT3970", "refsource": "CONFIRM", "url": "http://support.apple.com/kb/HT3970" }, { "name": "HPSBMU02799", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=134254866602253\u0026w=2" }, { "name": "http://support.apple.com/kb/HT3969", "refsource": "CONFIRM", "url": "http://support.apple.com/kb/HT3969" }, { "name": "HPSBMU02703", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=131593453929393\u0026w=2" }, { "name": "GLSA-200911-02", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200911-02.xml" }, { "name": "RHSA-2009:1694", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2009-1694.html" }, { "name": "APPLE-SA-2009-12-03-1", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2009/Dec/msg00000.html" }, { "name": "37231", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/37231" }, { "name": "SSRT100019", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=126566824131534\u0026w=2" }, { "name": "1023132", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1023132" }, { "name": "oval:org.mitre.oval:def:11834", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11834" }, { "name": "SSRT100242", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=131593453929393\u0026w=2" }, { "name": "SUSE-SA:2009:058", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00010.html" }, { "name": "270474", "refsource": "SUNALERT", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-270474-1" }, { "name": "ADV-2009-3131", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/3131" }, { "name": "APPLE-SA-2009-12-03-2", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2009/Dec/msg00001.html" }, { "name": "37581", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/37581" }, { "name": "http://www.oracle.com/technetwork/topics/security/cpujan2010-084891.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/cpujan2010-084891.html" }, { "name": "http://java.sun.com/javase/6/webnotes/6u17.html", "refsource": "CONFIRM", "url": "http://java.sun.com/javase/6/webnotes/6u17.html" }, { "name": "oval:org.mitre.oval:def:6786", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6786" }, { "name": "37841", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/37841" }, { "name": "oval:org.mitre.oval:def:8622", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8622" }, { "name": "37239", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/37239" }, { "name": "37386", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/37386" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2009-3868", "datePublished": "2009-11-05T16:00:00", "dateReserved": "2009-11-05T00:00:00", "dateUpdated": "2024-08-07T06:45:50.331Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2009-2722
Vulnerability from cvelistv5
Published
2009-08-10 20:00
Modified
2024-08-07 05:59
Severity ?
EPSS score ?
Summary
Multiple unspecified vulnerabilities in the Provider class in Sun Java SE 5.0 before Update 20 have unknown impact and attack vectors, aka BugId 6429594. NOTE: this issue exists because of an incorrect fix for BugId 6406003.
References
▼ | URL | Tags |
---|---|---|
http://www.vupen.com/english/advisories/2009/2543 | vdb-entry, x_refsource_VUPEN | |
http://secunia.com/advisories/37460 | third-party-advisory, x_refsource_SECUNIA | |
http://security.gentoo.org/glsa/glsa-200911-02.xml | vendor-advisory, x_refsource_GENTOO | |
http://www.vmware.com/security/advisories/VMSA-2009-0016.html | x_refsource_CONFIRM | |
http://www.securityfocus.com/archive/1/507985/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://sunsolve.sun.com/search/document.do?assetkey=1-21-118667-22-1 | x_refsource_CONFIRM | |
http://java.sun.com/j2se/1.5.0/ReleaseNotes.html | x_refsource_CONFIRM | |
http://lists.apple.com/archives/security-announce/2009/Sep/msg00000.html | vendor-advisory, x_refsource_APPLE | |
http://secunia.com/advisories/37386 | third-party-advisory, x_refsource_SECUNIA | |
http://www.vupen.com/english/advisories/2009/3316 | vdb-entry, x_refsource_VUPEN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T05:59:57.023Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "ADV-2009-2543", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/2543" }, { "name": "37460", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/37460" }, { "name": "GLSA-200911-02", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200911-02.xml" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html" }, { "name": "20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-118667-22-1" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://java.sun.com/j2se/1.5.0/ReleaseNotes.html" }, { "name": "APPLE-SA-2009-09-03-1", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2009/Sep/msg00000.html" }, { "name": "37386", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/37386" }, { "name": "ADV-2009-3316", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/3316" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2009-07-30T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple unspecified vulnerabilities in the Provider class in Sun Java SE 5.0 before Update 20 have unknown impact and attack vectors, aka BugId 6429594. NOTE: this issue exists because of an incorrect fix for BugId 6406003." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-10T18:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "ADV-2009-2543", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/2543" }, { "name": "37460", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/37460" }, { "name": "GLSA-200911-02", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200911-02.xml" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html" }, { "name": "20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-118667-22-1" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://java.sun.com/j2se/1.5.0/ReleaseNotes.html" }, { "name": "APPLE-SA-2009-09-03-1", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2009/Sep/msg00000.html" }, { "name": "37386", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/37386" }, { "name": "ADV-2009-3316", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/3316" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2009-2722", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple unspecified vulnerabilities in the Provider class in Sun Java SE 5.0 before Update 20 have unknown impact and attack vectors, aka BugId 6429594. NOTE: this issue exists because of an incorrect fix for BugId 6406003." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "ADV-2009-2543", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/2543" }, { "name": "37460", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/37460" }, { "name": "GLSA-200911-02", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200911-02.xml" }, { "name": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html", "refsource": "CONFIRM", "url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html" }, { "name": "20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded" }, { "name": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-118667-22-1", "refsource": "CONFIRM", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-118667-22-1" }, { "name": "http://java.sun.com/j2se/1.5.0/ReleaseNotes.html", "refsource": "CONFIRM", "url": "http://java.sun.com/j2se/1.5.0/ReleaseNotes.html" }, { "name": "APPLE-SA-2009-09-03-1", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2009/Sep/msg00000.html" }, { "name": "37386", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/37386" }, { "name": "ADV-2009-3316", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/3316" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2009-2722", "datePublished": "2009-08-10T20:00:00", "dateReserved": "2009-08-10T00:00:00", "dateUpdated": "2024-08-07T05:59:57.023Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2009-3874
Vulnerability from cvelistv5
Published
2009-11-05 16:00
Modified
2024-08-07 06:45
Severity ?
EPSS score ?
Summary
Integer overflow in the JPEGImageReader implementation in the ImageI/O component in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to execute arbitrary code via large subsample dimensions in a JPEG file that triggers a heap-based buffer overflow, aka Bug Id 6874643.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T06:45:50.834Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "HPSBUX02503", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=126566824131534\u0026w=2" }, { "name": "36881", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/36881" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.apple.com/kb/HT3970" }, { "name": "HPSBMU02799", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=134254866602253\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.apple.com/kb/HT3969" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://zerodayinitiative.com/advisories/ZDI-09-080/" }, { "name": "HPSBMU02703", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=131593453929393\u0026w=2" }, { "name": "GLSA-200911-02", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200911-02.xml" }, { "name": "RHSA-2009:1694", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2009-1694.html" }, { "name": "oval:org.mitre.oval:def:8603", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8603" }, { "name": "APPLE-SA-2009-12-03-1", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2009/Dec/msg00000.html" }, { "name": "37231", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/37231" }, { "name": "SSRT100019", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=126566824131534\u0026w=2" }, { "name": "1023132", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1023132" }, { "name": "SSRT100242", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=131593453929393\u0026w=2" }, { "name": "SUSE-SA:2009:058", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00010.html" }, { "name": "270474", "tags": [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-270474-1" }, { "name": "ADV-2009-3131", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/3131" }, { "name": "APPLE-SA-2009-12-03-2", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2009/Dec/msg00001.html" }, { "name": "oval:org.mitre.oval:def:11566", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11566" }, { "name": "oval:org.mitre.oval:def:12057", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12057" }, { "name": "37581", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/37581" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2010-084891.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://java.sun.com/javase/6/webnotes/6u17.html" }, { "name": "37841", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/37841" }, { "name": "oval:org.mitre.oval:def:7442", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7442" }, { "name": "37239", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/37239" }, { "name": "MDVSA-2010:084", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:084" }, { "name": "37386", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/37386" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2009-11-03T00:00:00", "descriptions": [ { "lang": "en", "value": "Integer overflow in the JPEGImageReader implementation in the ImageI/O component in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to execute arbitrary code via large subsample dimensions in a JPEG file that triggers a heap-based buffer overflow, aka Bug Id 6874643." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-18T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "HPSBUX02503", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=126566824131534\u0026w=2" }, { "name": "36881", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/36881" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.apple.com/kb/HT3970" }, { "name": "HPSBMU02799", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=134254866602253\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.apple.com/kb/HT3969" }, { "tags": [ "x_refsource_MISC" ], "url": "http://zerodayinitiative.com/advisories/ZDI-09-080/" }, { "name": "HPSBMU02703", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=131593453929393\u0026w=2" }, { "name": "GLSA-200911-02", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200911-02.xml" }, { "name": "RHSA-2009:1694", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2009-1694.html" }, { "name": "oval:org.mitre.oval:def:8603", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8603" }, { "name": "APPLE-SA-2009-12-03-1", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2009/Dec/msg00000.html" }, { "name": "37231", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/37231" }, { "name": "SSRT100019", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=126566824131534\u0026w=2" }, { "name": "1023132", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1023132" }, { "name": "SSRT100242", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=131593453929393\u0026w=2" }, { "name": "SUSE-SA:2009:058", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00010.html" }, { "name": "270474", "tags": [ "vendor-advisory", "x_refsource_SUNALERT" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-270474-1" }, { "name": "ADV-2009-3131", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/3131" }, { "name": "APPLE-SA-2009-12-03-2", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2009/Dec/msg00001.html" }, { "name": "oval:org.mitre.oval:def:11566", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11566" }, { "name": "oval:org.mitre.oval:def:12057", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12057" }, { "name": "37581", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/37581" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2010-084891.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://java.sun.com/javase/6/webnotes/6u17.html" }, { "name": "37841", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/37841" }, { "name": "oval:org.mitre.oval:def:7442", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7442" }, { "name": "37239", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/37239" }, { "name": "MDVSA-2010:084", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:084" }, { "name": "37386", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/37386" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2009-3874", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Integer overflow in the JPEGImageReader implementation in the ImageI/O component in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to execute arbitrary code via large subsample dimensions in a JPEG file that triggers a heap-based buffer overflow, aka Bug Id 6874643." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "HPSBUX02503", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=126566824131534\u0026w=2" }, { "name": "36881", "refsource": "BID", "url": "http://www.securityfocus.com/bid/36881" }, { "name": "http://support.apple.com/kb/HT3970", "refsource": "CONFIRM", "url": "http://support.apple.com/kb/HT3970" }, { "name": "HPSBMU02799", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=134254866602253\u0026w=2" }, { "name": "http://support.apple.com/kb/HT3969", "refsource": "CONFIRM", "url": "http://support.apple.com/kb/HT3969" }, { "name": "http://zerodayinitiative.com/advisories/ZDI-09-080/", "refsource": "MISC", "url": "http://zerodayinitiative.com/advisories/ZDI-09-080/" }, { "name": "HPSBMU02703", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=131593453929393\u0026w=2" }, { "name": "GLSA-200911-02", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200911-02.xml" }, { "name": "RHSA-2009:1694", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2009-1694.html" }, { "name": "oval:org.mitre.oval:def:8603", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8603" }, { "name": "APPLE-SA-2009-12-03-1", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2009/Dec/msg00000.html" }, { "name": "37231", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/37231" }, { "name": "SSRT100019", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=126566824131534\u0026w=2" }, { "name": "1023132", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1023132" }, { "name": "SSRT100242", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=131593453929393\u0026w=2" }, { "name": "SUSE-SA:2009:058", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00010.html" }, { "name": "270474", "refsource": "SUNALERT", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-270474-1" }, { "name": "ADV-2009-3131", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/3131" }, { "name": "APPLE-SA-2009-12-03-2", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2009/Dec/msg00001.html" }, { "name": "oval:org.mitre.oval:def:11566", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11566" }, { "name": "oval:org.mitre.oval:def:12057", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12057" }, { "name": "37581", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/37581" }, { "name": "http://www.oracle.com/technetwork/topics/security/cpujan2010-084891.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/cpujan2010-084891.html" }, { "name": "http://java.sun.com/javase/6/webnotes/6u17.html", "refsource": "CONFIRM", "url": "http://java.sun.com/javase/6/webnotes/6u17.html" }, { "name": "37841", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/37841" }, { "name": "oval:org.mitre.oval:def:7442", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7442" }, { "name": "37239", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/37239" }, { "name": "MDVSA-2010:084", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:084" }, { "name": "37386", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/37386" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2009-3874", "datePublished": "2009-11-05T16:00:00", "dateReserved": "2009-11-05T00:00:00", "dateUpdated": "2024-08-07T06:45:50.834Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2009-2718
Vulnerability from cvelistv5
Published
2009-08-10 20:00
Modified
2024-08-07 05:59
Severity ?
EPSS score ?
Summary
The Abstract Window Toolkit (AWT) implementation in Sun Java SE 6 before Update 15 on X11 does not impose the intended constraint on distance from the window border to the Security Warning Icon, which makes it easier for context-dependent attackers to trick a user into interacting unsafely with an untrusted applet.
References
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/37460 | third-party-advisory, x_refsource_SECUNIA | |
http://security.gentoo.org/glsa/glsa-200911-02.xml | vendor-advisory, x_refsource_GENTOO | |
http://www.vmware.com/security/advisories/VMSA-2009-0016.html | x_refsource_CONFIRM | |
http://java.sun.com/javase/6/webnotes/6u15.html | x_refsource_CONFIRM | |
http://www.securityfocus.com/archive/1/507985/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://secunia.com/advisories/37386 | third-party-advisory, x_refsource_SECUNIA | |
http://www.vupen.com/english/advisories/2009/3316 | vdb-entry, x_refsource_VUPEN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T05:59:57.010Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "37460", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/37460" }, { "name": "GLSA-200911-02", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200911-02.xml" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://java.sun.com/javase/6/webnotes/6u15.html" }, { "name": "20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded" }, { "name": "37386", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/37386" }, { "name": "ADV-2009-3316", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/3316" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2009-08-04T00:00:00", "descriptions": [ { "lang": "en", "value": "The Abstract Window Toolkit (AWT) implementation in Sun Java SE 6 before Update 15 on X11 does not impose the intended constraint on distance from the window border to the Security Warning Icon, which makes it easier for context-dependent attackers to trick a user into interacting unsafely with an untrusted applet." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-10T18:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "37460", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/37460" }, { "name": "GLSA-200911-02", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200911-02.xml" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://java.sun.com/javase/6/webnotes/6u15.html" }, { "name": "20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded" }, { "name": "37386", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/37386" }, { "name": "ADV-2009-3316", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/3316" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2009-2718", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Abstract Window Toolkit (AWT) implementation in Sun Java SE 6 before Update 15 on X11 does not impose the intended constraint on distance from the window border to the Security Warning Icon, which makes it easier for context-dependent attackers to trick a user into interacting unsafely with an untrusted applet." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "37460", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/37460" }, { "name": "GLSA-200911-02", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200911-02.xml" }, { "name": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html", "refsource": "CONFIRM", "url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html" }, { "name": "http://java.sun.com/javase/6/webnotes/6u15.html", "refsource": "CONFIRM", "url": "http://java.sun.com/javase/6/webnotes/6u15.html" }, { "name": "20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded" }, { "name": "37386", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/37386" }, { "name": "ADV-2009-3316", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/3316" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2009-2718", "datePublished": "2009-08-10T20:00:00", "dateReserved": "2009-08-10T00:00:00", "dateUpdated": "2024-08-07T05:59:57.010Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2009-2475
Vulnerability from cvelistv5
Published
2009-08-10 18:00
Modified
2024-08-07 05:52
Severity ?
EPSS score ?
Summary
Sun Java SE 5.0 before Update 20 and 6 before Update 15, and OpenJDK, might allow context-dependent attackers to obtain sensitive information via vectors involving static variables that are declared without the final keyword, related to (1) LayoutQueue, (2) Cursor.predefined, (3) AccessibleResourceBundle.getContents, (4) ImageReaderSpi.STANDARD_INPUT_TYPE, (5) ImageWriterSpi.STANDARD_OUTPUT_TYPE, (6) the imageio plugins, (7) DnsContext.debug, (8) RmfFileReader/StandardMidiFileWriter.types, (9) AbstractSaslImpl.logger, (10) Synth.Region.uiToRegionMap/lowerCaseNameMap, (11) the Introspector class and a cache of BeanInfo, and (12) JAX-WS, a different vulnerability than CVE-2009-2673.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T05:52:14.899Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "RHSA-2009:1200", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://rhn.redhat.com/errata/RHSA-2009-1200.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=513215" }, { "name": "RHSA-2009:1199", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://rhn.redhat.com/errata/RHSA-2009-1199.html" }, { "name": "36162", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/36162" }, { "name": "ADV-2009-2543", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/2543" }, { "name": "GLSA-200911-02", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200911-02.xml" }, { "name": "36199", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/36199" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-125139-16-1" }, { "name": "MDVSA-2009:209", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:209" }, { "name": "FEDORA-2009-8329", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00310.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://java.sun.com/javase/6/webnotes/6u15.html" }, { "name": "36180", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/36180" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-118667-22-1" }, { "name": "36176", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/36176" }, { "name": "FEDORA-2009-8337", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00325.html" }, { "name": "SUSE-SR:2009:016", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00001.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://java.sun.com/j2se/1.5.0/ReleaseNotes.html" }, { "name": "oval:org.mitre.oval:def:10221", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10221" }, { "name": "APPLE-SA-2009-09-03-1", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2009/Sep/msg00000.html" }, { "name": "RHSA-2009:1201", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://rhn.redhat.com/errata/RHSA-2009-1201.html" }, { "name": "37386", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/37386" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2009-08-04T00:00:00", "descriptions": [ { "lang": "en", "value": "Sun Java SE 5.0 before Update 20 and 6 before Update 15, and OpenJDK, might allow context-dependent attackers to obtain sensitive information via vectors involving static variables that are declared without the final keyword, related to (1) LayoutQueue, (2) Cursor.predefined, (3) AccessibleResourceBundle.getContents, (4) ImageReaderSpi.STANDARD_INPUT_TYPE, (5) ImageWriterSpi.STANDARD_OUTPUT_TYPE, (6) the imageio plugins, (7) DnsContext.debug, (8) RmfFileReader/StandardMidiFileWriter.types, (9) AbstractSaslImpl.logger, (10) Synth.Region.uiToRegionMap/lowerCaseNameMap, (11) the Introspector class and a cache of BeanInfo, and (12) JAX-WS, a different vulnerability than CVE-2009-2673." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-18T12:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "RHSA-2009:1200", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://rhn.redhat.com/errata/RHSA-2009-1200.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=513215" }, { "name": "RHSA-2009:1199", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://rhn.redhat.com/errata/RHSA-2009-1199.html" }, { "name": "36162", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/36162" }, { "name": "ADV-2009-2543", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/2543" }, { "name": "GLSA-200911-02", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200911-02.xml" }, { "name": "36199", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/36199" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-125139-16-1" }, { "name": "MDVSA-2009:209", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:209" }, { "name": "FEDORA-2009-8329", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00310.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://java.sun.com/javase/6/webnotes/6u15.html" }, { "name": "36180", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/36180" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-118667-22-1" }, { "name": "36176", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/36176" }, { "name": "FEDORA-2009-8337", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00325.html" }, { "name": "SUSE-SR:2009:016", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00001.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://java.sun.com/j2se/1.5.0/ReleaseNotes.html" }, { "name": "oval:org.mitre.oval:def:10221", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10221" }, { "name": "APPLE-SA-2009-09-03-1", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2009/Sep/msg00000.html" }, { "name": "RHSA-2009:1201", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://rhn.redhat.com/errata/RHSA-2009-1201.html" }, { "name": "37386", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/37386" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2009-2475", "datePublished": "2009-08-10T18:00:00", "dateReserved": "2009-07-15T00:00:00", "dateUpdated": "2024-08-07T05:52:14.899Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2009-2476
Vulnerability from cvelistv5
Published
2009-08-10 18:00
Modified
2024-08-07 05:52
Severity ?
EPSS score ?
Summary
The Java Management Extensions (JMX) implementation in Sun Java SE 6 before Update 15, and OpenJDK, does not properly enforce OpenType checks, which allows context-dependent attackers to bypass intended access restrictions by leveraging finalizer resurrection to obtain a reference to a privileged object.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T05:52:15.055Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=513220" }, { "name": "RHSA-2009:1200", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://rhn.redhat.com/errata/RHSA-2009-1200.html" }, { "name": "36162", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/36162" }, { "name": "ADV-2009-2543", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/2543" }, { "name": "GLSA-200911-02", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200911-02.xml" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-125139-16-1" }, { "name": "MDVSA-2009:209", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:209" }, { "name": "FEDORA-2009-8329", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00310.html" }, { "name": "oval:org.mitre.oval:def:10381", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10381" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://java.sun.com/javase/6/webnotes/6u15.html" }, { "name": "36180", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/36180" }, { "name": "36176", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/36176" }, { "name": "FEDORA-2009-8337", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00325.html" }, { "name": "SUSE-SR:2009:016", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00001.html" }, { "name": "APPLE-SA-2009-09-03-1", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2009/Sep/msg00000.html" }, { "name": "RHSA-2009:1201", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://rhn.redhat.com/errata/RHSA-2009-1201.html" }, { "name": "37386", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/37386" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2009-08-04T00:00:00", "descriptions": [ { "lang": "en", "value": "The Java Management Extensions (JMX) implementation in Sun Java SE 6 before Update 15, and OpenJDK, does not properly enforce OpenType checks, which allows context-dependent attackers to bypass intended access restrictions by leveraging finalizer resurrection to obtain a reference to a privileged object." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-18T12:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=513220" }, { "name": "RHSA-2009:1200", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://rhn.redhat.com/errata/RHSA-2009-1200.html" }, { "name": "36162", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/36162" }, { "name": "ADV-2009-2543", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/2543" }, { "name": "GLSA-200911-02", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200911-02.xml" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-125139-16-1" }, { "name": "MDVSA-2009:209", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:209" }, { "name": "FEDORA-2009-8329", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00310.html" }, { "name": "oval:org.mitre.oval:def:10381", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10381" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://java.sun.com/javase/6/webnotes/6u15.html" }, { "name": "36180", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/36180" }, { "name": "36176", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/36176" }, { "name": "FEDORA-2009-8337", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00325.html" }, { "name": "SUSE-SR:2009:016", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00001.html" }, { "name": "APPLE-SA-2009-09-03-1", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2009/Sep/msg00000.html" }, { "name": "RHSA-2009:1201", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://rhn.redhat.com/errata/RHSA-2009-1201.html" }, { "name": "37386", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/37386" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2009-2476", "datePublished": "2009-08-10T18:00:00", "dateReserved": "2009-07-15T00:00:00", "dateUpdated": "2024-08-07T05:52:15.055Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2009-2721
Vulnerability from cvelistv5
Published
2009-08-10 20:00
Modified
2024-08-07 05:59
Severity ?
EPSS score ?
Summary
Multiple unspecified vulnerabilities in the Provider class in Sun Java SE 5.0 before Update 20 have unknown impact and attack vectors, aka BugId 6406003.
References
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/37460 | third-party-advisory, x_refsource_SECUNIA | |
http://security.gentoo.org/glsa/glsa-200911-02.xml | vendor-advisory, x_refsource_GENTOO | |
http://www.vmware.com/security/advisories/VMSA-2009-0016.html | x_refsource_CONFIRM | |
http://www.securityfocus.com/archive/1/507985/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://sunsolve.sun.com/search/document.do?assetkey=1-21-118667-22-1 | x_refsource_CONFIRM | |
http://java.sun.com/j2se/1.5.0/ReleaseNotes.html | x_refsource_CONFIRM | |
http://secunia.com/advisories/37386 | third-party-advisory, x_refsource_SECUNIA | |
http://www.vupen.com/english/advisories/2009/3316 | vdb-entry, x_refsource_VUPEN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T05:59:57.028Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "37460", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/37460" }, { "name": "GLSA-200911-02", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200911-02.xml" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html" }, { "name": "20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-118667-22-1" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://java.sun.com/j2se/1.5.0/ReleaseNotes.html" }, { "name": "37386", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/37386" }, { "name": "ADV-2009-3316", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/3316" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2009-07-30T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple unspecified vulnerabilities in the Provider class in Sun Java SE 5.0 before Update 20 have unknown impact and attack vectors, aka BugId 6406003." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-10T18:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "37460", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/37460" }, { "name": "GLSA-200911-02", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200911-02.xml" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html" }, { "name": "20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-118667-22-1" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://java.sun.com/j2se/1.5.0/ReleaseNotes.html" }, { "name": "37386", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/37386" }, { "name": "ADV-2009-3316", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/3316" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2009-2721", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple unspecified vulnerabilities in the Provider class in Sun Java SE 5.0 before Update 20 have unknown impact and attack vectors, aka BugId 6406003." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "37460", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/37460" }, { "name": "GLSA-200911-02", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200911-02.xml" }, { "name": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html", "refsource": "CONFIRM", "url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html" }, { "name": "20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded" }, { "name": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-118667-22-1", "refsource": "CONFIRM", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-118667-22-1" }, { "name": "http://java.sun.com/j2se/1.5.0/ReleaseNotes.html", "refsource": "CONFIRM", "url": "http://java.sun.com/j2se/1.5.0/ReleaseNotes.html" }, { "name": "37386", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/37386" }, { "name": "ADV-2009-3316", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/3316" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2009-2721", "datePublished": "2009-08-10T20:00:00", "dateReserved": "2009-08-10T00:00:00", "dateUpdated": "2024-08-07T05:59:57.028Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2009-2723
Vulnerability from cvelistv5
Published
2009-08-10 20:00
Modified
2024-08-07 05:59
Severity ?
EPSS score ?
Summary
Unspecified vulnerability in deserialization in the Provider class in Sun Java SE 5.0 before Update 20 has unknown impact and attack vectors, aka BugId 6444262.
References
▼ | URL | Tags |
---|---|---|
http://www.vupen.com/english/advisories/2009/2543 | vdb-entry, x_refsource_VUPEN | |
http://secunia.com/advisories/37460 | third-party-advisory, x_refsource_SECUNIA | |
http://security.gentoo.org/glsa/glsa-200911-02.xml | vendor-advisory, x_refsource_GENTOO | |
http://www.vmware.com/security/advisories/VMSA-2009-0016.html | x_refsource_CONFIRM | |
http://www.securityfocus.com/archive/1/507985/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://sunsolve.sun.com/search/document.do?assetkey=1-21-118667-22-1 | x_refsource_CONFIRM | |
http://java.sun.com/j2se/1.5.0/ReleaseNotes.html | x_refsource_CONFIRM | |
http://lists.apple.com/archives/security-announce/2009/Sep/msg00000.html | vendor-advisory, x_refsource_APPLE | |
http://secunia.com/advisories/37386 | third-party-advisory, x_refsource_SECUNIA | |
http://www.vupen.com/english/advisories/2009/3316 | vdb-entry, x_refsource_VUPEN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T05:59:57.079Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "ADV-2009-2543", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/2543" }, { "name": "37460", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/37460" }, { "name": "GLSA-200911-02", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200911-02.xml" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html" }, { "name": "20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-118667-22-1" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://java.sun.com/j2se/1.5.0/ReleaseNotes.html" }, { "name": "APPLE-SA-2009-09-03-1", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2009/Sep/msg00000.html" }, { "name": "37386", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/37386" }, { "name": "ADV-2009-3316", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/3316" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2009-07-30T00:00:00", "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in deserialization in the Provider class in Sun Java SE 5.0 before Update 20 has unknown impact and attack vectors, aka BugId 6444262." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-10T18:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "ADV-2009-2543", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/2543" }, { "name": "37460", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/37460" }, { "name": "GLSA-200911-02", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200911-02.xml" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html" }, { "name": "20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-118667-22-1" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://java.sun.com/j2se/1.5.0/ReleaseNotes.html" }, { "name": "APPLE-SA-2009-09-03-1", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2009/Sep/msg00000.html" }, { "name": "37386", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/37386" }, { "name": "ADV-2009-3316", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/3316" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2009-2723", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unspecified vulnerability in deserialization in the Provider class in Sun Java SE 5.0 before Update 20 has unknown impact and attack vectors, aka BugId 6444262." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "ADV-2009-2543", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/2543" }, { "name": "37460", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/37460" }, { "name": "GLSA-200911-02", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200911-02.xml" }, { "name": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html", "refsource": "CONFIRM", "url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html" }, { "name": "20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded" }, { "name": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-118667-22-1", "refsource": "CONFIRM", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-118667-22-1" }, { "name": "http://java.sun.com/j2se/1.5.0/ReleaseNotes.html", "refsource": "CONFIRM", "url": "http://java.sun.com/j2se/1.5.0/ReleaseNotes.html" }, { "name": "APPLE-SA-2009-09-03-1", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2009/Sep/msg00000.html" }, { "name": "37386", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/37386" }, { "name": "ADV-2009-3316", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/3316" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2009-2723", "datePublished": "2009-08-10T20:00:00", "dateReserved": "2009-08-10T00:00:00", "dateUpdated": "2024-08-07T05:59:57.079Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2009-3872
Vulnerability from cvelistv5
Published
2009-11-05 16:00
Modified
2024-08-07 06:45
Severity ?
EPSS score ?
Summary
Unspecified vulnerability in the JPEG JFIF Decoder in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to gain privileges via a crafted image file, aka Bug Id 6862969.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T06:45:50.402Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "HPSBUX02503", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=126566824131534\u0026w=2" }, { "name": "36881", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/36881" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.apple.com/kb/HT3970" }, { "name": "HPSBMU02799", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=134254866602253\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.apple.com/kb/HT3969" }, { "name": "HPSBMU02703", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=131593453929393\u0026w=2" }, { "name": "GLSA-200911-02", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200911-02.xml" }, { "name": "RHSA-2009:1694", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2009-1694.html" }, { "name": "APPLE-SA-2009-12-03-1", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2009/Dec/msg00000.html" }, { "name": "oval:org.mitre.oval:def:6963", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6963" }, { "name": "37231", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/37231" }, { "name": "SSRT100019", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=126566824131534\u0026w=2" }, { "name": "1023132", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1023132" }, { "name": "SSRT100242", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=131593453929393\u0026w=2" }, { "name": "SUSE-SA:2009:058", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00010.html" }, { "name": "oval:org.mitre.oval:def:11715", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11715" }, { "name": "270474", "tags": [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-270474-1" }, { "name": "ADV-2009-3131", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/3131" }, { "name": "APPLE-SA-2009-12-03-2", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2009/Dec/msg00001.html" }, { "name": "oval:org.mitre.oval:def:8475", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8475" }, { "name": "37581", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/37581" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2010-084891.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://java.sun.com/javase/6/webnotes/6u17.html" }, { "name": "37841", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/37841" }, { "name": "37239", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/37239" }, { "name": "37386", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/37386" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2009-11-03T00:00:00", "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in the JPEG JFIF Decoder in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to gain privileges via a crafted image file, aka Bug Id 6862969." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-18T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "HPSBUX02503", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=126566824131534\u0026w=2" }, { "name": "36881", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/36881" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.apple.com/kb/HT3970" }, { "name": "HPSBMU02799", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=134254866602253\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.apple.com/kb/HT3969" }, { "name": "HPSBMU02703", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=131593453929393\u0026w=2" }, { "name": "GLSA-200911-02", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200911-02.xml" }, { "name": "RHSA-2009:1694", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2009-1694.html" }, { "name": "APPLE-SA-2009-12-03-1", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2009/Dec/msg00000.html" }, { "name": "oval:org.mitre.oval:def:6963", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6963" }, { "name": "37231", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/37231" }, { "name": "SSRT100019", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=126566824131534\u0026w=2" }, { "name": "1023132", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1023132" }, { "name": "SSRT100242", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=131593453929393\u0026w=2" }, { "name": "SUSE-SA:2009:058", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00010.html" }, { "name": "oval:org.mitre.oval:def:11715", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11715" }, { "name": "270474", "tags": [ "vendor-advisory", "x_refsource_SUNALERT" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-270474-1" }, { "name": "ADV-2009-3131", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/3131" }, { "name": "APPLE-SA-2009-12-03-2", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2009/Dec/msg00001.html" }, { "name": "oval:org.mitre.oval:def:8475", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8475" }, { "name": "37581", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/37581" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2010-084891.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://java.sun.com/javase/6/webnotes/6u17.html" }, { "name": "37841", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/37841" }, { "name": "37239", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/37239" }, { "name": "37386", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/37386" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2009-3872", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unspecified vulnerability in the JPEG JFIF Decoder in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to gain privileges via a crafted image file, aka Bug Id 6862969." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "HPSBUX02503", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=126566824131534\u0026w=2" }, { "name": "36881", "refsource": "BID", "url": "http://www.securityfocus.com/bid/36881" }, { "name": "http://support.apple.com/kb/HT3970", "refsource": "CONFIRM", "url": "http://support.apple.com/kb/HT3970" }, { "name": "HPSBMU02799", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=134254866602253\u0026w=2" }, { "name": "http://support.apple.com/kb/HT3969", "refsource": "CONFIRM", "url": "http://support.apple.com/kb/HT3969" }, { "name": "HPSBMU02703", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=131593453929393\u0026w=2" }, { "name": "GLSA-200911-02", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200911-02.xml" }, { "name": "RHSA-2009:1694", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2009-1694.html" }, { "name": "APPLE-SA-2009-12-03-1", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2009/Dec/msg00000.html" }, { "name": "oval:org.mitre.oval:def:6963", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6963" }, { "name": "37231", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/37231" }, { "name": "SSRT100019", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=126566824131534\u0026w=2" }, { "name": "1023132", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1023132" }, { "name": "SSRT100242", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=131593453929393\u0026w=2" }, { "name": "SUSE-SA:2009:058", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00010.html" }, { "name": "oval:org.mitre.oval:def:11715", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11715" }, { "name": "270474", "refsource": "SUNALERT", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-270474-1" }, { "name": "ADV-2009-3131", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/3131" }, { "name": "APPLE-SA-2009-12-03-2", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2009/Dec/msg00001.html" }, { "name": "oval:org.mitre.oval:def:8475", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8475" }, { "name": "37581", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/37581" }, { "name": "http://www.oracle.com/technetwork/topics/security/cpujan2010-084891.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/cpujan2010-084891.html" }, { "name": "http://java.sun.com/javase/6/webnotes/6u17.html", "refsource": "CONFIRM", "url": "http://java.sun.com/javase/6/webnotes/6u17.html" }, { "name": "37841", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/37841" }, { "name": "37239", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/37239" }, { "name": "37386", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/37386" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2009-3872", "datePublished": "2009-11-05T16:00:00", "dateReserved": "2009-11-05T00:00:00", "dateUpdated": "2024-08-07T06:45:50.402Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2009-2720
Vulnerability from cvelistv5
Published
2009-08-10 20:00
Modified
2024-08-07 05:59
Severity ?
EPSS score ?
Summary
Unspecified vulnerability in the javax.swing.plaf.synth.SynthContext.isSubregion method in the Swing implementation in Sun Java SE 6 before Update 15 allows context-dependent attackers to cause a denial of service (NullPointerException in the Jemmy library) via unknown vectors.
References
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/37460 | third-party-advisory, x_refsource_SECUNIA | |
http://security.gentoo.org/glsa/glsa-200911-02.xml | vendor-advisory, x_refsource_GENTOO | |
http://www.vmware.com/security/advisories/VMSA-2009-0016.html | x_refsource_CONFIRM | |
http://java.sun.com/javase/6/webnotes/6u15.html | x_refsource_CONFIRM | |
http://www.securityfocus.com/archive/1/507985/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://secunia.com/advisories/37386 | third-party-advisory, x_refsource_SECUNIA | |
http://www.vupen.com/english/advisories/2009/3316 | vdb-entry, x_refsource_VUPEN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T05:59:56.935Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "37460", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/37460" }, { "name": "GLSA-200911-02", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200911-02.xml" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://java.sun.com/javase/6/webnotes/6u15.html" }, { "name": "20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded" }, { "name": "37386", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/37386" }, { "name": "ADV-2009-3316", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/3316" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2009-08-04T00:00:00", "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in the javax.swing.plaf.synth.SynthContext.isSubregion method in the Swing implementation in Sun Java SE 6 before Update 15 allows context-dependent attackers to cause a denial of service (NullPointerException in the Jemmy library) via unknown vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-10T18:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "37460", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/37460" }, { "name": "GLSA-200911-02", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200911-02.xml" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://java.sun.com/javase/6/webnotes/6u15.html" }, { "name": "20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded" }, { "name": "37386", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/37386" }, { "name": "ADV-2009-3316", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/3316" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2009-2720", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unspecified vulnerability in the javax.swing.plaf.synth.SynthContext.isSubregion method in the Swing implementation in Sun Java SE 6 before Update 15 allows context-dependent attackers to cause a denial of service (NullPointerException in the Jemmy library) via unknown vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "37460", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/37460" }, { "name": "GLSA-200911-02", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200911-02.xml" }, { "name": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html", "refsource": "CONFIRM", "url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html" }, { "name": "http://java.sun.com/javase/6/webnotes/6u15.html", "refsource": "CONFIRM", "url": "http://java.sun.com/javase/6/webnotes/6u15.html" }, { "name": "20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded" }, { "name": "37386", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/37386" }, { "name": "ADV-2009-3316", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/3316" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2009-2720", "datePublished": "2009-08-10T20:00:00", "dateReserved": "2009-08-10T00:00:00", "dateUpdated": "2024-08-07T05:59:56.935Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2009-2724
Vulnerability from cvelistv5
Published
2009-08-10 20:00
Modified
2024-08-07 05:59
Severity ?
EPSS score ?
Summary
Race condition in the java.lang package in Sun Java SE 5.0 before Update 20 has unknown impact and attack vectors, related to a "3Y Race condition in reflection checks."
References
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/37460 | third-party-advisory, x_refsource_SECUNIA | |
http://security.gentoo.org/glsa/glsa-200911-02.xml | vendor-advisory, x_refsource_GENTOO | |
http://www.vmware.com/security/advisories/VMSA-2009-0016.html | x_refsource_CONFIRM | |
http://www.securityfocus.com/archive/1/507985/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://sunsolve.sun.com/search/document.do?assetkey=1-21-118667-22-1 | x_refsource_CONFIRM | |
http://java.sun.com/j2se/1.5.0/ReleaseNotes.html | x_refsource_CONFIRM | |
http://secunia.com/advisories/37386 | third-party-advisory, x_refsource_SECUNIA | |
http://www.vupen.com/english/advisories/2009/3316 | vdb-entry, x_refsource_VUPEN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T05:59:57.073Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "37460", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/37460" }, { "name": "GLSA-200911-02", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200911-02.xml" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html" }, { "name": "20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-118667-22-1" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://java.sun.com/j2se/1.5.0/ReleaseNotes.html" }, { "name": "37386", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/37386" }, { "name": "ADV-2009-3316", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/3316" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2009-07-30T00:00:00", "descriptions": [ { "lang": "en", "value": "Race condition in the java.lang package in Sun Java SE 5.0 before Update 20 has unknown impact and attack vectors, related to a \"3Y Race condition in reflection checks.\"" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-10T18:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "37460", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/37460" }, { "name": "GLSA-200911-02", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200911-02.xml" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html" }, { "name": "20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-118667-22-1" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://java.sun.com/j2se/1.5.0/ReleaseNotes.html" }, { "name": "37386", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/37386" }, { "name": "ADV-2009-3316", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/3316" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2009-2724", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Race condition in the java.lang package in Sun Java SE 5.0 before Update 20 has unknown impact and attack vectors, related to a \"3Y Race condition in reflection checks.\"" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "37460", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/37460" }, { "name": "GLSA-200911-02", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200911-02.xml" }, { "name": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html", "refsource": "CONFIRM", "url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html" }, { "name": "20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded" }, { "name": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-118667-22-1", "refsource": "CONFIRM", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-118667-22-1" }, { "name": "http://java.sun.com/j2se/1.5.0/ReleaseNotes.html", "refsource": "CONFIRM", "url": "http://java.sun.com/j2se/1.5.0/ReleaseNotes.html" }, { "name": "37386", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/37386" }, { "name": "ADV-2009-3316", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/3316" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2009-2724", "datePublished": "2009-08-10T20:00:00", "dateReserved": "2009-08-10T00:00:00", "dateUpdated": "2024-08-07T05:59:57.073Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2009-3867
Vulnerability from cvelistv5
Published
2009-11-05 16:00
Modified
2024-08-07 06:45
Severity ?
EPSS score ?
Summary
Stack-based buffer overflow in the HsbParser.getSoundBank function in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to execute arbitrary code via a long file: URL in an argument, aka Bug Id 6854303.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T06:45:51.061Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://zerodayinitiative.com/advisories/ZDI-09-076/" }, { "name": "HPSBUX02503", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=126566824131534\u0026w=2" }, { "name": "36881", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/36881" }, { "name": "oval:org.mitre.oval:def:6746", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6746" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.apple.com/kb/HT3970" }, { "name": "HPSBMU02799", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=134254866602253\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.apple.com/kb/HT3969" }, { "name": "HPSBMU02703", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=131593453929393\u0026w=2" }, { "name": "GLSA-200911-02", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200911-02.xml" }, { "name": "RHSA-2009:1694", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2009-1694.html" }, { "name": "APPLE-SA-2009-12-03-1", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2009/Dec/msg00000.html" }, { "name": "37231", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/37231" }, { "name": "SSRT100019", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=126566824131534\u0026w=2" }, { "name": "1023132", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1023132" }, { "name": "SSRT100242", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=131593453929393\u0026w=2" }, { "name": "SUSE-SA:2009:058", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00010.html" }, { "name": "270474", "tags": [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-270474-1" }, { "name": "ADV-2009-3131", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/3131" }, { "name": "APPLE-SA-2009-12-03-2", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2009/Dec/msg00001.html" }, { "name": "37581", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/37581" }, { "name": "oval:org.mitre.oval:def:11903", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11903" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2010-084891.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://java.sun.com/javase/6/webnotes/6u17.html" }, { "name": "37841", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/37841" }, { "name": "37239", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/37239" }, { "name": "oval:org.mitre.oval:def:7750", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7750" }, { "name": "37386", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/37386" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2009-11-03T00:00:00", "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in the HsbParser.getSoundBank function in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to execute arbitrary code via a long file: URL in an argument, aka Bug Id 6854303." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-18T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://zerodayinitiative.com/advisories/ZDI-09-076/" }, { "name": "HPSBUX02503", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=126566824131534\u0026w=2" }, { "name": "36881", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/36881" }, { "name": "oval:org.mitre.oval:def:6746", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6746" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.apple.com/kb/HT3970" }, { "name": "HPSBMU02799", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=134254866602253\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.apple.com/kb/HT3969" }, { "name": "HPSBMU02703", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=131593453929393\u0026w=2" }, { "name": "GLSA-200911-02", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200911-02.xml" }, { "name": "RHSA-2009:1694", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2009-1694.html" }, { "name": "APPLE-SA-2009-12-03-1", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2009/Dec/msg00000.html" }, { "name": "37231", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/37231" }, { "name": "SSRT100019", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=126566824131534\u0026w=2" }, { "name": "1023132", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1023132" }, { "name": "SSRT100242", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=131593453929393\u0026w=2" }, { "name": "SUSE-SA:2009:058", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00010.html" }, { "name": "270474", "tags": [ "vendor-advisory", "x_refsource_SUNALERT" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-270474-1" }, { "name": "ADV-2009-3131", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/3131" }, { "name": "APPLE-SA-2009-12-03-2", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2009/Dec/msg00001.html" }, { "name": "37581", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/37581" }, { "name": "oval:org.mitre.oval:def:11903", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11903" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2010-084891.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://java.sun.com/javase/6/webnotes/6u17.html" }, { "name": "37841", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/37841" }, { "name": "37239", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/37239" }, { "name": "oval:org.mitre.oval:def:7750", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7750" }, { "name": "37386", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/37386" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2009-3867", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Stack-based buffer overflow in the HsbParser.getSoundBank function in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to execute arbitrary code via a long file: URL in an argument, aka Bug Id 6854303." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://zerodayinitiative.com/advisories/ZDI-09-076/", "refsource": "MISC", "url": "http://zerodayinitiative.com/advisories/ZDI-09-076/" }, { "name": "HPSBUX02503", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=126566824131534\u0026w=2" }, { "name": "36881", "refsource": "BID", "url": "http://www.securityfocus.com/bid/36881" }, { "name": "oval:org.mitre.oval:def:6746", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6746" }, { "name": "http://support.apple.com/kb/HT3970", "refsource": "CONFIRM", "url": "http://support.apple.com/kb/HT3970" }, { "name": "HPSBMU02799", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=134254866602253\u0026w=2" }, { "name": "http://support.apple.com/kb/HT3969", "refsource": "CONFIRM", "url": "http://support.apple.com/kb/HT3969" }, { "name": "HPSBMU02703", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=131593453929393\u0026w=2" }, { "name": "GLSA-200911-02", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200911-02.xml" }, { "name": "RHSA-2009:1694", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2009-1694.html" }, { "name": "APPLE-SA-2009-12-03-1", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2009/Dec/msg00000.html" }, { "name": "37231", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/37231" }, { "name": "SSRT100019", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=126566824131534\u0026w=2" }, { "name": "1023132", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1023132" }, { "name": "SSRT100242", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=131593453929393\u0026w=2" }, { "name": "SUSE-SA:2009:058", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00010.html" }, { "name": "270474", "refsource": "SUNALERT", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-270474-1" }, { "name": "ADV-2009-3131", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/3131" }, { "name": "APPLE-SA-2009-12-03-2", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2009/Dec/msg00001.html" }, { "name": "37581", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/37581" }, { "name": "oval:org.mitre.oval:def:11903", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11903" }, { "name": "http://www.oracle.com/technetwork/topics/security/cpujan2010-084891.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/cpujan2010-084891.html" }, { "name": "http://java.sun.com/javase/6/webnotes/6u17.html", "refsource": "CONFIRM", "url": "http://java.sun.com/javase/6/webnotes/6u17.html" }, { "name": "37841", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/37841" }, { "name": "37239", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/37239" }, { "name": "oval:org.mitre.oval:def:7750", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7750" }, { "name": "37386", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/37386" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2009-3867", "datePublished": "2009-11-05T16:00:00", "dateReserved": "2009-11-05T00:00:00", "dateUpdated": "2024-08-07T06:45:51.061Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2009-3871
Vulnerability from cvelistv5
Published
2009-11-05 16:00
Modified
2024-08-07 06:45
Severity ?
EPSS score ?
Summary
Heap-based buffer overflow in the setBytePixels function in the Abstract Window Toolkit (AWT) in Java Runtime Environment (JRE) in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to execute arbitrary code via crafted arguments, aka Bug Id 6872358.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T06:45:50.140Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "HPSBUX02503", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=126566824131534\u0026w=2" }, { "name": "oval:org.mitre.oval:def:9360", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9360" }, { "name": "36881", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/36881" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.apple.com/kb/HT3970" }, { "name": "HPSBMU02799", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=134254866602253\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.apple.com/kb/HT3969" }, { "name": "HPSBMU02703", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=131593453929393\u0026w=2" }, { "name": "GLSA-200911-02", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200911-02.xml" }, { "name": "RHSA-2009:1694", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2009-1694.html" }, { "name": "APPLE-SA-2009-12-03-1", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2009/Dec/msg00000.html" }, { "name": "37231", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/37231" }, { "name": "SSRT100019", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=126566824131534\u0026w=2" }, { "name": "oval:org.mitre.oval:def:12134", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12134" }, { "name": "1023132", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1023132" }, { "name": "SSRT100242", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=131593453929393\u0026w=2" }, { "name": "oval:org.mitre.oval:def:6698", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6698" }, { "name": "SUSE-SA:2009:058", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00010.html" }, { "name": "270474", "tags": [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-270474-1" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://zerodayinitiative.com/advisories/ZDI-09-079/" }, { "name": "ADV-2009-3131", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/3131" }, { "name": "APPLE-SA-2009-12-03-2", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2009/Dec/msg00001.html" }, { "name": "37581", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/37581" }, { "name": "oval:org.mitre.oval:def:8275", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8275" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2010-084891.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://java.sun.com/javase/6/webnotes/6u17.html" }, { "name": "37841", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/37841" }, { "name": "37239", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/37239" }, { "name": "MDVSA-2010:084", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:084" }, { "name": "37386", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/37386" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2009-11-03T00:00:00", "descriptions": [ { "lang": "en", "value": "Heap-based buffer overflow in the setBytePixels function in the Abstract Window Toolkit (AWT) in Java Runtime Environment (JRE) in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to execute arbitrary code via crafted arguments, aka Bug Id 6872358." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-18T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "HPSBUX02503", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=126566824131534\u0026w=2" }, { "name": "oval:org.mitre.oval:def:9360", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9360" }, { "name": "36881", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/36881" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.apple.com/kb/HT3970" }, { "name": "HPSBMU02799", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=134254866602253\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.apple.com/kb/HT3969" }, { "name": "HPSBMU02703", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=131593453929393\u0026w=2" }, { "name": "GLSA-200911-02", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200911-02.xml" }, { "name": "RHSA-2009:1694", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2009-1694.html" }, { "name": "APPLE-SA-2009-12-03-1", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2009/Dec/msg00000.html" }, { "name": "37231", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/37231" }, { "name": "SSRT100019", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=126566824131534\u0026w=2" }, { "name": "oval:org.mitre.oval:def:12134", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12134" }, { "name": "1023132", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1023132" }, { "name": "SSRT100242", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=131593453929393\u0026w=2" }, { "name": "oval:org.mitre.oval:def:6698", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6698" }, { "name": "SUSE-SA:2009:058", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00010.html" }, { "name": "270474", "tags": [ "vendor-advisory", "x_refsource_SUNALERT" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-270474-1" }, { "tags": [ "x_refsource_MISC" ], "url": "http://zerodayinitiative.com/advisories/ZDI-09-079/" }, { "name": "ADV-2009-3131", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/3131" }, { "name": "APPLE-SA-2009-12-03-2", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2009/Dec/msg00001.html" }, { "name": "37581", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/37581" }, { "name": "oval:org.mitre.oval:def:8275", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8275" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2010-084891.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://java.sun.com/javase/6/webnotes/6u17.html" }, { "name": "37841", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/37841" }, { "name": "37239", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/37239" }, { "name": "MDVSA-2010:084", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:084" }, { "name": "37386", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/37386" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2009-3871", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Heap-based buffer overflow in the setBytePixels function in the Abstract Window Toolkit (AWT) in Java Runtime Environment (JRE) in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to execute arbitrary code via crafted arguments, aka Bug Id 6872358." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "HPSBUX02503", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=126566824131534\u0026w=2" }, { "name": "oval:org.mitre.oval:def:9360", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9360" }, { "name": "36881", "refsource": "BID", "url": "http://www.securityfocus.com/bid/36881" }, { "name": "http://support.apple.com/kb/HT3970", "refsource": "CONFIRM", "url": "http://support.apple.com/kb/HT3970" }, { "name": "HPSBMU02799", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=134254866602253\u0026w=2" }, { "name": "http://support.apple.com/kb/HT3969", "refsource": "CONFIRM", "url": "http://support.apple.com/kb/HT3969" }, { "name": "HPSBMU02703", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=131593453929393\u0026w=2" }, { "name": "GLSA-200911-02", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200911-02.xml" }, { "name": "RHSA-2009:1694", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2009-1694.html" }, { "name": "APPLE-SA-2009-12-03-1", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2009/Dec/msg00000.html" }, { "name": "37231", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/37231" }, { "name": "SSRT100019", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=126566824131534\u0026w=2" }, { "name": "oval:org.mitre.oval:def:12134", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12134" }, { "name": "1023132", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1023132" }, { "name": "SSRT100242", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=131593453929393\u0026w=2" }, { "name": "oval:org.mitre.oval:def:6698", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6698" }, { "name": "SUSE-SA:2009:058", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00010.html" }, { "name": "270474", "refsource": "SUNALERT", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-270474-1" }, { "name": "http://zerodayinitiative.com/advisories/ZDI-09-079/", "refsource": "MISC", "url": "http://zerodayinitiative.com/advisories/ZDI-09-079/" }, { "name": "ADV-2009-3131", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/3131" }, { "name": "APPLE-SA-2009-12-03-2", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2009/Dec/msg00001.html" }, { "name": "37581", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/37581" }, { "name": "oval:org.mitre.oval:def:8275", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8275" }, { "name": "http://www.oracle.com/technetwork/topics/security/cpujan2010-084891.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/cpujan2010-084891.html" }, { "name": "http://java.sun.com/javase/6/webnotes/6u17.html", "refsource": "CONFIRM", "url": "http://java.sun.com/javase/6/webnotes/6u17.html" }, { "name": "37841", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/37841" }, { "name": "37239", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/37239" }, { "name": "MDVSA-2010:084", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:084" }, { "name": "37386", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/37386" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2009-3871", "datePublished": "2009-11-05T16:00:00", "dateReserved": "2009-11-05T00:00:00", "dateUpdated": "2024-08-07T06:45:50.140Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2009-2676
Vulnerability from cvelistv5
Published
2009-08-05 19:00
Modified
2024-08-07 05:59
Severity ?
EPSS score ?
Summary
Unspecified vulnerability in JNLPAppletlauncher in Sun Java SE, and SE for Business, in JDK and JRE 6 Update 14 and earlier and JDK and JRE 5.0 Update 19 and earlier; and Java SE for Business in SDK and JRE 1.4.2_21 and earlier; allows remote attackers to create or modify arbitrary files via vectors involving an untrusted Java applet that accesses an old version of JNLPAppletLauncher.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T05:59:56.967Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "RHSA-2009:1200", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://rhn.redhat.com/errata/RHSA-2009-1200.html" }, { "name": "RHSA-2009:1199", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://rhn.redhat.com/errata/RHSA-2009-1199.html" }, { "name": "56789", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/56789" }, { "name": "37460", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/37460" }, { "name": "1022657", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1022657" }, { "name": "GLSA-200911-02", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200911-02.xml" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html" }, { "name": "HPSBUX02476", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=125787273209737\u0026w=2" }, { "name": "36199", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/36199" }, { "name": "36248", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/36248" }, { "name": "263490", "tags": [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-263490-1" }, { "name": "SSRT090250", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=125787273209737\u0026w=2" }, { "name": "20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded" }, { "name": "TA09-294A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA09-294A.html" }, { "name": "35946", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/35946" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2009-096303.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-125136-16-1" }, { "name": "36176", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/36176" }, { "name": "37300", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/37300" }, { "name": "SUSE-SA:2009:053", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00002.html" }, { "name": "SUSE-SA:2009:043", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2009-08/msg00003.html" }, { "name": "37386", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/37386" }, { "name": "oval:org.mitre.oval:def:8453", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8453" }, { "name": "ADV-2009-3316", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/3316" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2009-08-04T00:00:00", "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in JNLPAppletlauncher in Sun Java SE, and SE for Business, in JDK and JRE 6 Update 14 and earlier and JDK and JRE 5.0 Update 19 and earlier; and Java SE for Business in SDK and JRE 1.4.2_21 and earlier; allows remote attackers to create or modify arbitrary files via vectors involving an untrusted Java applet that accesses an old version of JNLPAppletLauncher." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-10T18:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "RHSA-2009:1200", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://rhn.redhat.com/errata/RHSA-2009-1200.html" }, { "name": "RHSA-2009:1199", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://rhn.redhat.com/errata/RHSA-2009-1199.html" }, { "name": "56789", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/56789" }, { "name": "37460", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/37460" }, { "name": "1022657", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1022657" }, { "name": "GLSA-200911-02", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200911-02.xml" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html" }, { "name": "HPSBUX02476", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=125787273209737\u0026w=2" }, { "name": "36199", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/36199" }, { "name": "36248", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/36248" }, { "name": "263490", "tags": [ "vendor-advisory", "x_refsource_SUNALERT" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-263490-1" }, { "name": "SSRT090250", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=125787273209737\u0026w=2" }, { "name": "20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded" }, { "name": "TA09-294A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA09-294A.html" }, { "name": "35946", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/35946" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2009-096303.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-125136-16-1" }, { "name": "36176", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/36176" }, { "name": "37300", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/37300" }, { "name": "SUSE-SA:2009:053", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00002.html" }, { "name": "SUSE-SA:2009:043", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2009-08/msg00003.html" }, { "name": "37386", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/37386" }, { "name": "oval:org.mitre.oval:def:8453", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8453" }, { "name": "ADV-2009-3316", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/3316" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2009-2676", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unspecified vulnerability in JNLPAppletlauncher in Sun Java SE, and SE for Business, in JDK and JRE 6 Update 14 and earlier and JDK and JRE 5.0 Update 19 and earlier; and Java SE for Business in SDK and JRE 1.4.2_21 and earlier; allows remote attackers to create or modify arbitrary files via vectors involving an untrusted Java applet that accesses an old version of JNLPAppletLauncher." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "RHSA-2009:1200", "refsource": "REDHAT", "url": "https://rhn.redhat.com/errata/RHSA-2009-1200.html" }, { "name": "RHSA-2009:1199", "refsource": "REDHAT", "url": "https://rhn.redhat.com/errata/RHSA-2009-1199.html" }, { "name": "56789", "refsource": "OSVDB", "url": "http://osvdb.org/56789" }, { "name": "37460", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/37460" }, { "name": "1022657", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1022657" }, { "name": "GLSA-200911-02", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200911-02.xml" }, { "name": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html", "refsource": "CONFIRM", "url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html" }, { "name": "HPSBUX02476", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=125787273209737\u0026w=2" }, { "name": "36199", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/36199" }, { "name": "36248", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/36248" }, { "name": "263490", "refsource": "SUNALERT", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-263490-1" }, { "name": "SSRT090250", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=125787273209737\u0026w=2" }, { "name": "20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded" }, { "name": "TA09-294A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA09-294A.html" }, { "name": "35946", "refsource": "BID", "url": "http://www.securityfocus.com/bid/35946" }, { "name": "http://www.oracle.com/technetwork/topics/security/cpuoct2009-096303.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2009-096303.html" }, { "name": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-125136-16-1", "refsource": "CONFIRM", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-125136-16-1" }, { "name": "36176", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/36176" }, { "name": "37300", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/37300" }, { "name": "SUSE-SA:2009:053", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00002.html" }, { "name": "SUSE-SA:2009:043", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2009-08/msg00003.html" }, { "name": "37386", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/37386" }, { "name": "oval:org.mitre.oval:def:8453", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8453" }, { "name": "ADV-2009-3316", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/3316" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2009-2676", "datePublished": "2009-08-05T19:00:00", "dateReserved": "2009-08-05T00:00:00", "dateUpdated": "2024-08-07T05:59:56.967Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2009-2689
Vulnerability from cvelistv5
Published
2009-08-10 18:00
Modified
2024-08-07 05:59
Severity ?
EPSS score ?
Summary
JDK13Services.getProviders in Sun Java SE 5.0 before Update 20 and 6 before Update 15, and OpenJDK, grants full privileges to instances of unspecified object types, which allows context-dependent attackers to bypass intended access restrictions via an untrusted (1) applet or (2) application.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T05:59:56.241Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "RHSA-2009:1199", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://rhn.redhat.com/errata/RHSA-2009-1199.html" }, { "name": "36162", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/36162" }, { "name": "ADV-2009-2543", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/2543" }, { "name": "oval:org.mitre.oval:def:9603", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9603" }, { "name": "GLSA-200911-02", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200911-02.xml" }, { "name": "36199", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/36199" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-125139-16-1" }, { "name": "MDVSA-2009:209", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:209" }, { "name": "FEDORA-2009-8329", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00310.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://java.sun.com/javase/6/webnotes/6u15.html" }, { "name": "36180", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/36180" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-118667-22-1" }, { "name": "FEDORA-2009-8337", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00325.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=513222" }, { "name": "SUSE-SR:2009:016", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00001.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://java.sun.com/j2se/1.5.0/ReleaseNotes.html" }, { "name": "APPLE-SA-2009-09-03-1", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2009/Sep/msg00000.html" }, { "name": "RHSA-2009:1201", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://rhn.redhat.com/errata/RHSA-2009-1201.html" }, { "name": "37386", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/37386" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2009-08-04T00:00:00", "descriptions": [ { "lang": "en", "value": "JDK13Services.getProviders in Sun Java SE 5.0 before Update 20 and 6 before Update 15, and OpenJDK, grants full privileges to instances of unspecified object types, which allows context-dependent attackers to bypass intended access restrictions via an untrusted (1) applet or (2) application." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-18T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "RHSA-2009:1199", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://rhn.redhat.com/errata/RHSA-2009-1199.html" }, { "name": "36162", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/36162" }, { "name": "ADV-2009-2543", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/2543" }, { "name": "oval:org.mitre.oval:def:9603", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9603" }, { "name": "GLSA-200911-02", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200911-02.xml" }, { "name": "36199", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/36199" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-125139-16-1" }, { "name": "MDVSA-2009:209", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:209" }, { "name": "FEDORA-2009-8329", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00310.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://java.sun.com/javase/6/webnotes/6u15.html" }, { "name": "36180", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/36180" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-118667-22-1" }, { "name": "FEDORA-2009-8337", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00325.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=513222" }, { "name": "SUSE-SR:2009:016", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00001.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://java.sun.com/j2se/1.5.0/ReleaseNotes.html" }, { "name": "APPLE-SA-2009-09-03-1", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2009/Sep/msg00000.html" }, { "name": "RHSA-2009:1201", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://rhn.redhat.com/errata/RHSA-2009-1201.html" }, { "name": "37386", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/37386" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2009-2689", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "JDK13Services.getProviders in Sun Java SE 5.0 before Update 20 and 6 before Update 15, and OpenJDK, grants full privileges to instances of unspecified object types, which allows context-dependent attackers to bypass intended access restrictions via an untrusted (1) applet or (2) application." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "RHSA-2009:1199", "refsource": "REDHAT", "url": "https://rhn.redhat.com/errata/RHSA-2009-1199.html" }, { "name": "36162", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/36162" }, { "name": "ADV-2009-2543", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/2543" }, { "name": "oval:org.mitre.oval:def:9603", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9603" }, { "name": "GLSA-200911-02", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200911-02.xml" }, { "name": "36199", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/36199" }, { "name": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-125139-16-1", "refsource": "CONFIRM", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-125139-16-1" }, { "name": "MDVSA-2009:209", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:209" }, { "name": "FEDORA-2009-8329", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00310.html" }, { "name": "http://java.sun.com/javase/6/webnotes/6u15.html", "refsource": "CONFIRM", "url": "http://java.sun.com/javase/6/webnotes/6u15.html" }, { "name": "36180", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/36180" }, { "name": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-118667-22-1", "refsource": "CONFIRM", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-118667-22-1" }, { "name": "FEDORA-2009-8337", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00325.html" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=513222", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=513222" }, { "name": "SUSE-SR:2009:016", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00001.html" }, { "name": "http://java.sun.com/j2se/1.5.0/ReleaseNotes.html", "refsource": "CONFIRM", "url": "http://java.sun.com/j2se/1.5.0/ReleaseNotes.html" }, { "name": "APPLE-SA-2009-09-03-1", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2009/Sep/msg00000.html" }, { "name": "RHSA-2009:1201", "refsource": "REDHAT", "url": "https://rhn.redhat.com/errata/RHSA-2009-1201.html" }, { "name": "37386", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/37386" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2009-2689", "datePublished": "2009-08-10T18:00:00", "dateReserved": "2009-08-05T00:00:00", "dateUpdated": "2024-08-07T05:59:56.241Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2009-3873
Vulnerability from cvelistv5
Published
2009-11-05 16:00
Modified
2024-08-07 06:45
Severity ?
EPSS score ?
Summary
The JPEG Image Writer in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to gain privileges via a crafted image file, related to a "quantization problem," aka Bug Id 6862968.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T06:45:50.492Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "HPSBUX02503", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=126566824131534\u0026w=2" }, { "name": "36881", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/36881" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.apple.com/kb/HT3970" }, { "name": "HPSBMU02799", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=134254866602253\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.apple.com/kb/HT3969" }, { "name": "oval:org.mitre.oval:def:9602", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9602" }, { "name": "HPSBMU02703", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=131593453929393\u0026w=2" }, { "name": "GLSA-200911-02", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200911-02.xml" }, { "name": "RHSA-2009:1694", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2009-1694.html" }, { "name": "APPLE-SA-2009-12-03-1", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2009/Dec/msg00000.html" }, { "name": "oval:org.mitre.oval:def:8396", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8396" }, { "name": "37231", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/37231" }, { "name": "SSRT100019", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=126566824131534\u0026w=2" }, { "name": "1023132", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1023132" }, { "name": "SSRT100242", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=131593453929393\u0026w=2" }, { "name": "SUSE-SA:2009:058", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00010.html" }, { "name": "270474", "tags": [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-270474-1" }, { "name": "ADV-2009-3131", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/3131" }, { "name": "APPLE-SA-2009-12-03-2", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2009/Dec/msg00001.html" }, { "name": "oval:org.mitre.oval:def:6970", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6970" }, { "name": "37581", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/37581" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2010-084891.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://java.sun.com/javase/6/webnotes/6u17.html" }, { "name": "37841", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/37841" }, { "name": "oval:org.mitre.oval:def:11746", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11746" }, { "name": "37239", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/37239" }, { "name": "MDVSA-2010:084", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:084" }, { "name": "37386", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/37386" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2009-11-03T00:00:00", "descriptions": [ { "lang": "en", "value": "The JPEG Image Writer in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to gain privileges via a crafted image file, related to a \"quantization problem,\" aka Bug Id 6862968." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-18T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "HPSBUX02503", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=126566824131534\u0026w=2" }, { "name": "36881", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/36881" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.apple.com/kb/HT3970" }, { "name": "HPSBMU02799", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=134254866602253\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.apple.com/kb/HT3969" }, { "name": "oval:org.mitre.oval:def:9602", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9602" }, { "name": "HPSBMU02703", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=131593453929393\u0026w=2" }, { "name": "GLSA-200911-02", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200911-02.xml" }, { "name": "RHSA-2009:1694", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2009-1694.html" }, { "name": "APPLE-SA-2009-12-03-1", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2009/Dec/msg00000.html" }, { "name": "oval:org.mitre.oval:def:8396", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8396" }, { "name": "37231", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/37231" }, { "name": "SSRT100019", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=126566824131534\u0026w=2" }, { "name": "1023132", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1023132" }, { "name": "SSRT100242", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=131593453929393\u0026w=2" }, { "name": "SUSE-SA:2009:058", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00010.html" }, { "name": "270474", "tags": [ "vendor-advisory", "x_refsource_SUNALERT" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-270474-1" }, { "name": "ADV-2009-3131", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/3131" }, { "name": "APPLE-SA-2009-12-03-2", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2009/Dec/msg00001.html" }, { "name": "oval:org.mitre.oval:def:6970", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6970" }, { "name": "37581", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/37581" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2010-084891.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://java.sun.com/javase/6/webnotes/6u17.html" }, { "name": "37841", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/37841" }, { "name": "oval:org.mitre.oval:def:11746", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11746" }, { "name": "37239", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/37239" }, { "name": "MDVSA-2010:084", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:084" }, { "name": "37386", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/37386" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2009-3873", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The JPEG Image Writer in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to gain privileges via a crafted image file, related to a \"quantization problem,\" aka Bug Id 6862968." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "HPSBUX02503", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=126566824131534\u0026w=2" }, { "name": "36881", "refsource": "BID", "url": "http://www.securityfocus.com/bid/36881" }, { "name": "http://support.apple.com/kb/HT3970", "refsource": "CONFIRM", "url": "http://support.apple.com/kb/HT3970" }, { "name": "HPSBMU02799", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=134254866602253\u0026w=2" }, { "name": "http://support.apple.com/kb/HT3969", "refsource": "CONFIRM", "url": "http://support.apple.com/kb/HT3969" }, { "name": "oval:org.mitre.oval:def:9602", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9602" }, { "name": "HPSBMU02703", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=131593453929393\u0026w=2" }, { "name": "GLSA-200911-02", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200911-02.xml" }, { "name": "RHSA-2009:1694", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2009-1694.html" }, { "name": "APPLE-SA-2009-12-03-1", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2009/Dec/msg00000.html" }, { "name": "oval:org.mitre.oval:def:8396", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8396" }, { "name": "37231", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/37231" }, { "name": "SSRT100019", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=126566824131534\u0026w=2" }, { "name": "1023132", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1023132" }, { "name": "SSRT100242", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=131593453929393\u0026w=2" }, { "name": "SUSE-SA:2009:058", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00010.html" }, { "name": "270474", "refsource": "SUNALERT", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-270474-1" }, { "name": "ADV-2009-3131", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/3131" }, { "name": "APPLE-SA-2009-12-03-2", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2009/Dec/msg00001.html" }, { "name": "oval:org.mitre.oval:def:6970", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6970" }, { "name": "37581", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/37581" }, { "name": "http://www.oracle.com/technetwork/topics/security/cpujan2010-084891.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/cpujan2010-084891.html" }, { "name": "http://java.sun.com/javase/6/webnotes/6u17.html", "refsource": "CONFIRM", "url": "http://java.sun.com/javase/6/webnotes/6u17.html" }, { "name": "37841", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/37841" }, { "name": "oval:org.mitre.oval:def:11746", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11746" }, { "name": "37239", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/37239" }, { "name": "MDVSA-2010:084", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:084" }, { "name": "37386", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/37386" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2009-3873", "datePublished": "2009-11-05T16:00:00", "dateReserved": "2009-11-05T00:00:00", "dateUpdated": "2024-08-07T06:45:50.492Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2009-2719
Vulnerability from cvelistv5
Published
2009-08-10 20:00
Modified
2024-08-07 05:59
Severity ?
EPSS score ?
Summary
The Java Web Start implementation in Sun Java SE 6 before Update 15 allows context-dependent attackers to cause a denial of service (NullPointerException) via a crafted .jnlp file, as demonstrated by the jnlp_file/appletDesc/index.html#misc test in the Technology Compatibility Kit (TCK) for the Java Network Launching Protocol (JNLP).
References
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/37460 | third-party-advisory, x_refsource_SECUNIA | |
http://security.gentoo.org/glsa/glsa-200911-02.xml | vendor-advisory, x_refsource_GENTOO | |
http://www.vmware.com/security/advisories/VMSA-2009-0016.html | x_refsource_CONFIRM | |
http://java.sun.com/javase/6/webnotes/6u15.html | x_refsource_CONFIRM | |
http://www.securityfocus.com/archive/1/507985/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://secunia.com/advisories/37386 | third-party-advisory, x_refsource_SECUNIA | |
http://www.vupen.com/english/advisories/2009/3316 | vdb-entry, x_refsource_VUPEN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T05:59:57.065Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "37460", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/37460" }, { "name": "GLSA-200911-02", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200911-02.xml" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://java.sun.com/javase/6/webnotes/6u15.html" }, { "name": "20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded" }, { "name": "37386", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/37386" }, { "name": "ADV-2009-3316", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/3316" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2009-08-04T00:00:00", "descriptions": [ { "lang": "en", "value": "The Java Web Start implementation in Sun Java SE 6 before Update 15 allows context-dependent attackers to cause a denial of service (NullPointerException) via a crafted .jnlp file, as demonstrated by the jnlp_file/appletDesc/index.html#misc test in the Technology Compatibility Kit (TCK) for the Java Network Launching Protocol (JNLP)." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-10T18:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "37460", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/37460" }, { "name": "GLSA-200911-02", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200911-02.xml" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://java.sun.com/javase/6/webnotes/6u15.html" }, { "name": "20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded" }, { "name": "37386", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/37386" }, { "name": "ADV-2009-3316", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/3316" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2009-2719", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Java Web Start implementation in Sun Java SE 6 before Update 15 allows context-dependent attackers to cause a denial of service (NullPointerException) via a crafted .jnlp file, as demonstrated by the jnlp_file/appletDesc/index.html#misc test in the Technology Compatibility Kit (TCK) for the Java Network Launching Protocol (JNLP)." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "37460", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/37460" }, { "name": "GLSA-200911-02", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200911-02.xml" }, { "name": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html", "refsource": "CONFIRM", "url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html" }, { "name": "http://java.sun.com/javase/6/webnotes/6u15.html", "refsource": "CONFIRM", "url": "http://java.sun.com/javase/6/webnotes/6u15.html" }, { "name": "20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded" }, { "name": "37386", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/37386" }, { "name": "ADV-2009-3316", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/3316" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2009-2719", "datePublished": "2009-08-10T20:00:00", "dateReserved": "2009-08-10T00:00:00", "dateUpdated": "2024-08-07T05:59:57.065Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2009-2690
Vulnerability from cvelistv5
Published
2009-08-10 18:00
Modified
2024-08-07 05:59
Severity ?
EPSS score ?
Summary
The encoder in Sun Java SE 6 before Update 15, and OpenJDK, grants read access to private variables with unspecified names, which allows context-dependent attackers to obtain sensitive information via an untrusted (1) applet or (2) application.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T05:59:56.702Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "RHSA-2009:1200", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://rhn.redhat.com/errata/RHSA-2009-1200.html" }, { "name": "36162", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/36162" }, { "name": "ADV-2009-2543", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/2543" }, { "name": "GLSA-200911-02", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200911-02.xml" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-125139-16-1" }, { "name": "oval:org.mitre.oval:def:9443", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9443" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=513223" }, { "name": "MDVSA-2009:209", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:209" }, { "name": "FEDORA-2009-8329", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00310.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://java.sun.com/javase/6/webnotes/6u15.html" }, { "name": "36180", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/36180" }, { "name": "36176", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/36176" }, { "name": "FEDORA-2009-8337", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00325.html" }, { "name": "SUSE-SR:2009:016", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00001.html" }, { "name": "APPLE-SA-2009-09-03-1", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2009/Sep/msg00000.html" }, { "name": "RHSA-2009:1201", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://rhn.redhat.com/errata/RHSA-2009-1201.html" }, { "name": "37386", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/37386" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2009-08-04T00:00:00", "descriptions": [ { "lang": "en", "value": "The encoder in Sun Java SE 6 before Update 15, and OpenJDK, grants read access to private variables with unspecified names, which allows context-dependent attackers to obtain sensitive information via an untrusted (1) applet or (2) application." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-18T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "RHSA-2009:1200", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://rhn.redhat.com/errata/RHSA-2009-1200.html" }, { "name": "36162", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/36162" }, { "name": "ADV-2009-2543", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/2543" }, { "name": "GLSA-200911-02", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200911-02.xml" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-125139-16-1" }, { "name": "oval:org.mitre.oval:def:9443", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9443" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=513223" }, { "name": "MDVSA-2009:209", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:209" }, { "name": "FEDORA-2009-8329", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00310.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://java.sun.com/javase/6/webnotes/6u15.html" }, { "name": "36180", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/36180" }, { "name": "36176", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/36176" }, { "name": "FEDORA-2009-8337", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00325.html" }, { "name": "SUSE-SR:2009:016", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00001.html" }, { "name": "APPLE-SA-2009-09-03-1", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2009/Sep/msg00000.html" }, { "name": "RHSA-2009:1201", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://rhn.redhat.com/errata/RHSA-2009-1201.html" }, { "name": "37386", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/37386" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2009-2690", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The encoder in Sun Java SE 6 before Update 15, and OpenJDK, grants read access to private variables with unspecified names, which allows context-dependent attackers to obtain sensitive information via an untrusted (1) applet or (2) application." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "RHSA-2009:1200", "refsource": "REDHAT", "url": "https://rhn.redhat.com/errata/RHSA-2009-1200.html" }, { "name": "36162", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/36162" }, { "name": "ADV-2009-2543", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/2543" }, { "name": "GLSA-200911-02", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200911-02.xml" }, { "name": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-125139-16-1", "refsource": "CONFIRM", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-125139-16-1" }, { "name": "oval:org.mitre.oval:def:9443", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9443" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=513223", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=513223" }, { "name": "MDVSA-2009:209", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:209" }, { "name": "FEDORA-2009-8329", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00310.html" }, { "name": "http://java.sun.com/javase/6/webnotes/6u15.html", "refsource": "CONFIRM", "url": "http://java.sun.com/javase/6/webnotes/6u15.html" }, { "name": "36180", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/36180" }, { "name": "36176", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/36176" }, { "name": "FEDORA-2009-8337", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00325.html" }, { "name": "SUSE-SR:2009:016", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00001.html" }, { "name": "APPLE-SA-2009-09-03-1", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2009/Sep/msg00000.html" }, { "name": "RHSA-2009:1201", "refsource": "REDHAT", "url": "https://rhn.redhat.com/errata/RHSA-2009-1201.html" }, { "name": "37386", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/37386" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2009-2690", "datePublished": "2009-08-10T18:00:00", "dateReserved": "2009-08-05T00:00:00", "dateUpdated": "2024-08-07T05:59:56.702Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2009-08-10 20:30
Modified
2024-11-21 01:05
Severity ?
Summary
The Abstract Window Toolkit (AWT) implementation in Sun Java SE 6 before Update 15 on X11 does not impose the intended constraint on distance from the window border to the Security Warning Icon, which makes it easier for context-dependent attackers to trick a user into interacting unsafely with an untrusted applet.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sun:java_se:6:14:*:*:*:*:*:*", "matchCriteriaId": "D55A27B8-F579-4A83-B423-0D3249643437", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:x.org:x11:*:*:*:*:*:*:*:*", "matchCriteriaId": "09AEE820-942F-47D3-9CBE-B1D25DE05132", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Abstract Window Toolkit (AWT) implementation in Sun Java SE 6 before Update 15 on X11 does not impose the intended constraint on distance from the window border to the Security Warning Icon, which makes it easier for context-dependent attackers to trick a user into interacting unsafely with an untrusted applet." }, { "lang": "es", "value": "La implementaci\u00f3n de Abstract Window Toolkit (AWT) en Sun Java SE v6 anteriores a Update 15 para X11 no impone la restricci\u00f3n de distancia prevista desde el borde de la ventana al Security Warning Icon, facilitando a atacantes dependientes del contexto que enga\u00f1en a un usuario para interactuar sin seguridad con un applet no confiable." } ], "id": "CVE-2009-2718", "lastModified": "2024-11-21T01:05:35.367", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2009-08-10T20:30:00.563", "references": [ { "source": "cve@mitre.org", "url": "http://java.sun.com/javase/6/webnotes/6u15.html" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/37386" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/37460" }, { "source": "cve@mitre.org", "url": "http://security.gentoo.org/glsa/glsa-200911-02.xml" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2009/3316" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://java.sun.com/javase/6/webnotes/6u15.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/37386" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/37460" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-200911-02.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2009/3316" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2009-11-05 16:30
Modified
2024-11-21 01:08
Severity ?
Summary
Stack-based buffer overflow in the HsbParser.getSoundBank function in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to execute arbitrary code via a long file: URL in an argument, aka Bug Id 6854303.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.4.2_1 | |
sun | jre | 1.4.2_2 | |
sun | jre | 1.4.2_02 | |
sun | jre | 1.4.2_03 | |
sun | jre | 1.4.2_3 | |
sun | jre | 1.4.2_4 | |
sun | jre | 1.4.2_04 | |
sun | jre | 1.4.2_05 | |
sun | jre | 1.4.2_5 | |
sun | jre | 1.4.2_06 | |
sun | jre | 1.4.2_6 | |
sun | jre | 1.4.2_7 | |
sun | jre | 1.4.2_07 | |
sun | jre | 1.4.2_8 | |
sun | jre | 1.4.2_08 | |
sun | jre | 1.4.2_09 | |
sun | jre | 1.4.2_9 | |
sun | jre | 1.4.2_10 | |
sun | jre | 1.4.2_11 | |
sun | jre | 1.4.2_12 | |
sun | jre | 1.4.2_13 | |
sun | jre | 1.4.2_14 | |
sun | jre | 1.4.2_15 | |
sun | jre | 1.4.2_16 | |
sun | jre | 1.4.2_17 | |
sun | jre | 1.4.2_18 | |
sun | jre | 1.4.2_19 | |
sun | jre | 1.4.2_20 | |
sun | jre | 1.4.2_21 | |
sun | jre | 1.4.2_22 | |
sun | sdk | 1.4.2_01 | |
sun | sdk | 1.4.2_1 | |
sun | sdk | 1.4.2_2 | |
sun | sdk | 1.4.2_02 | |
sun | sdk | 1.4.2_03 | |
sun | sdk | 1.4.2_3 | |
sun | sdk | 1.4.2_04 | |
sun | sdk | 1.4.2_4 | |
sun | sdk | 1.4.2_5 | |
sun | sdk | 1.4.2_05 | |
sun | sdk | 1.4.2_6 | |
sun | sdk | 1.4.2_06 | |
sun | sdk | 1.4.2_07 | |
sun | sdk | 1.4.2_7 | |
sun | sdk | 1.4.2_8 | |
sun | sdk | 1.4.2_08 | |
sun | sdk | 1.4.2_09 | |
sun | sdk | 1.4.2_9 | |
sun | sdk | 1.4.2_10 | |
sun | sdk | 1.4.2_11 | |
sun | sdk | 1.4.2_12 | |
sun | sdk | 1.4.2_13 | |
sun | sdk | 1.4.2_14 | |
sun | sdk | 1.4.2_15 | |
sun | sdk | 1.4.2_16 | |
sun | sdk | 1.4.2_17 | |
sun | sdk | 1.4.2_18 | |
sun | sdk | 1.4.2_19 | |
sun | sdk | 1.4.2_20 | |
sun | sdk | 1.4.2_21 | |
sun | sdk | 1.4.2_22 | |
sun | solaris | * | |
sun | jre | 1.3.1_1 | |
sun | jre | 1.3.1_01 | |
sun | jre | 1.3.1_01a | |
sun | jre | 1.3.1_02 | |
sun | jre | 1.3.1_2 | |
sun | jre | 1.3.1_03 | |
sun | jre | 1.3.1_3 | |
sun | jre | 1.3.1_4 | |
sun | jre | 1.3.1_04 | |
sun | jre | 1.3.1_05 | |
sun | jre | 1.3.1_5 | |
sun | jre | 1.3.1_06 | |
sun | jre | 1.3.1_6 | |
sun | jre | 1.3.1_07 | |
sun | jre | 1.3.1_7 | |
sun | jre | 1.3.1_8 | |
sun | jre | 1.3.1_08 | |
sun | jre | 1.3.1_9 | |
sun | jre | 1.3.1_09 | |
sun | jre | 1.3.1_10 | |
sun | jre | 1.3.1_11 | |
sun | jre | 1.3.1_12 | |
sun | jre | 1.3.1_13 | |
sun | jre | 1.3.1_14 | |
sun | jre | 1.3.1_15 | |
sun | jre | 1.3.1_16 | |
sun | jre | 1.3.1_17 | |
sun | jre | 1.3.1_18 | |
sun | jre | 1.3.1_19 | |
sun | jre | 1.3.1_20 | |
sun | jre | 1.3.1_21 | |
sun | jre | 1.3.1_22 | |
sun | jre | 1.3.1_23 | |
sun | jre | 1.3.1_24 | |
sun | jre | 1.3.1_25 | |
sun | sdk | 1.3.1_01 | |
sun | sdk | 1.3.1_01a | |
sun | sdk | 1.3.1_2 | |
sun | sdk | 1.3.1_02 | |
sun | sdk | 1.3.1_03 | |
sun | sdk | 1.3.1_3 | |
sun | sdk | 1.3.1_4 | |
sun | sdk | 1.3.1_04 | |
sun | sdk | 1.3.1_5 | |
sun | sdk | 1.3.1_05 | |
sun | sdk | 1.3.1_6 | |
sun | sdk | 1.3.1_06 | |
sun | sdk | 1.3.1_7 | |
sun | sdk | 1.3.1_07 | |
sun | sdk | 1.3.1_8 | |
sun | sdk | 1.3.1_08 | |
sun | sdk | 1.3.1_9 | |
sun | sdk | 1.3.1_09 | |
sun | sdk | 1.3.1_10 | |
sun | sdk | 1.3.1_11 | |
sun | sdk | 1.3.1_12 | |
sun | sdk | 1.3.1_13 | |
sun | sdk | 1.3.1_14 | |
sun | sdk | 1.3.1_15 | |
sun | sdk | 1.3.1_16 | |
sun | sdk | 1.3.1_17 | |
sun | sdk | 1.3.1_18 | |
sun | sdk | 1.3.1_19 | |
sun | sdk | 1.3.1_20 | |
sun | sdk | 1.3.1_21 | |
sun | sdk | 1.3.1_22 | |
sun | sdk | 1.3.1_23 | |
sun | sdk | 1.3.1_24 | |
sun | sdk | 1.3.1_25 | |
microsoft | windows | * | |
sun | java_se | * | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jre | 1.4.2_01 | |
sun | jre | 1.4.2_1 | |
sun | jre | 1.4.2_2 | |
sun | jre | 1.4.2_02 | |
sun | jre | 1.4.2_03 | |
sun | jre | 1.4.2_3 | |
sun | jre | 1.4.2_4 | |
sun | jre | 1.4.2_04 | |
sun | jre | 1.4.2_05 | |
sun | jre | 1.4.2_5 | |
sun | jre | 1.4.2_06 | |
sun | jre | 1.4.2_6 | |
sun | jre | 1.4.2_7 | |
sun | jre | 1.4.2_07 | |
sun | jre | 1.4.2_8 | |
sun | jre | 1.4.2_08 | |
sun | jre | 1.4.2_09 | |
sun | jre | 1.4.2_9 | |
sun | jre | 1.4.2_10 | |
sun | jre | 1.4.2_11 | |
sun | jre | 1.4.2_12 | |
sun | jre | 1.4.2_13 | |
sun | jre | 1.4.2_14 | |
sun | jre | 1.4.2_15 | |
sun | jre | 1.4.2_16 | |
sun | jre | 1.4.2_17 | |
sun | jre | 1.4.2_18 | |
sun | jre | 1.4.2_19 | |
sun | jre | 1.4.2_20 | |
sun | jre | 1.4.2_21 | |
sun | jre | 1.4.2_22 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | sdk | 1.4.2_1 | |
sun | sdk | 1.4.2_2 | |
sun | sdk | 1.4.2_02 | |
sun | sdk | 1.4.2_03 | |
sun | sdk | 1.4.2_3 | |
sun | sdk | 1.4.2_04 | |
sun | sdk | 1.4.2_4 | |
sun | sdk | 1.4.2_5 | |
sun | sdk | 1.4.2_05 | |
sun | sdk | 1.4.2_6 | |
sun | sdk | 1.4.2_06 | |
sun | sdk | 1.4.2_07 | |
sun | sdk | 1.4.2_7 | |
sun | sdk | 1.4.2_8 | |
sun | sdk | 1.4.2_08 | |
sun | sdk | 1.4.2_09 | |
sun | sdk | 1.4.2_9 | |
sun | sdk | 1.4.2_10 | |
sun | sdk | 1.4.2_11 | |
sun | sdk | 1.4.2_12 | |
sun | sdk | 1.4.2_13 | |
sun | sdk | 1.4.2_14 | |
sun | sdk | 1.4.2_15 | |
sun | sdk | 1.4.2_16 | |
sun | sdk | 1.4.2_17 | |
sun | sdk | 1.4.2_18 | |
sun | sdk | 1.4.2_19 | |
sun | sdk | 1.4.2_20 | |
sun | sdk | 1.4.2_21 | |
sun | sdk | 1.4.2_22 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_1:*:*:*:*:*:*", "matchCriteriaId": "8198F493-0447-4A87-9F16-5B6CB3572E38", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_10:*:*:*:*:*:*", "matchCriteriaId": "645BBE6D-BA5E-4D93-9152-759A2355013E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_11:*:*:*:*:*:*", "matchCriteriaId": "0EE694C9-940A-4899-844C-AC63412FA295", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_12:*:*:*:*:*:*", "matchCriteriaId": "BC9476DD-9B56-4811-A248-711C25181F29", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_13:*:*:*:*:*:*", "matchCriteriaId": "68D34082-2948-4D95-B43F-FBD59E2F3D28", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_14:*:*:*:*:*:*", "matchCriteriaId": "F2E01C07-4921-47CC-9AFC-D3B461D0B78D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_15:*:*:*:*:*:*", "matchCriteriaId": "7532E7D4-2F62-4DA0-B905-F95A0A735CE5", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_16:*:*:*:*:*:*", "matchCriteriaId": "0AF93193-889E-4F44-ADEB-E89E56DE6C7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_17:*:*:*:*:*:*", "matchCriteriaId": "68C19440-4172-4539-8E38-09DBCB1752E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_18:*:*:*:*:*:*", "matchCriteriaId": "3CC000EC-9717-47DA-B182-6C8CD3970F27", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_19:*:*:*:*:*:*", "matchCriteriaId": "115083C5-811F-47BA-8549-3BDFF9CA0740", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_2:*:*:*:*:*:*", "matchCriteriaId": "51337B8C-78F2-4207-998E-A3FC591F538B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_20:*:*:*:*:*:*", "matchCriteriaId": "48193108-CD9F-476E-A7D2-E0796F659BA5", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_21:*:*:*:*:*:*", "matchCriteriaId": "A0A80299-783A-4FBA-9EBF-5913942949A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_3:*:*:*:*:*:*", "matchCriteriaId": "76A4F852-0240-44D6-9BD5-FE79DEF16438", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_4:*:*:*:*:*:*", "matchCriteriaId": "F57E5943-5CC3-4736-85E8-FE7CC4F38735", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_5:*:*:*:*:*:*", "matchCriteriaId": "3C228E00-0F5C-41D2-8BD0-46AF682AE842", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_6:*:*:*:*:*:*", "matchCriteriaId": "0329E813-B2C8-4C84-BCAF-2D54C4AE0472", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_7:*:*:*:*:*:*", "matchCriteriaId": "7E3C40E1-7005-4F83-B347-177BEC9EE339", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_8:*:*:*:*:*:*", "matchCriteriaId": "6855E3F5-6F8E-44FA-A913-0D0F6A803DFF", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_9:*:*:*:*:*:*", "matchCriteriaId": "C79BDB6E-442B-41F1-A025-C17648A81FD9", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_1:*:*:*:*:*:*", "matchCriteriaId": "EBB09CE1-F4AC-472C-8D5D-594AEB322CFD", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_10:*:*:*:*:*:*", "matchCriteriaId": "722A93D8-B5BC-42F3-92A2-E424F61269A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_11:*:*:*:*:*:*", "matchCriteriaId": "775F2611-F11C-4B84-8F40-0D034B81BF18", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_12:*:*:*:*:*:*", "matchCriteriaId": "F20FDD9F-FF45-48BC-9207-54FB02E76071", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_13:*:*:*:*:*:*", "matchCriteriaId": "9FA326F5-894A-4B01-BCA3-B126DA81CA59", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_14:*:*:*:*:*:*", "matchCriteriaId": "228AB7B4-4BA4-43D4-B562-D438884DB152", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_15:*:*:*:*:*:*", "matchCriteriaId": "AFD5C688-2103-4D60-979E-D9BE69A989C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_16:*:*:*:*:*:*", "matchCriteriaId": "21421215-F722-4207-A2E5-E2DF4B29859B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_3:*:*:*:*:*:*", "matchCriteriaId": "D98175BF-B084-4FA5-899D-9E80DC3923EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_4:*:*:*:*:*:*", "matchCriteriaId": "820632CE-F8DF-47EE-B716-7530E60008B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_5:*:*:*:*:*:*", "matchCriteriaId": "FA2BD0A3-7B2D-447B-ABAC-7B867B03B632", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_6:*:*:*:*:*:*", "matchCriteriaId": "D54AB785-E9B7-47BD-B756-0C3A629D67DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_7:*:*:*:*:*:*", "matchCriteriaId": "E9412098-0353-4F7B-9245-010557E6C651", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_8:*:*:*:*:*:*", "matchCriteriaId": "FB0E9224-3D12-47E2-8E69-7B682284CDDD", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_9:*:*:*:*:*:*", "matchCriteriaId": "77BCD102-59A4-45A6-ADEF-CAB7F70E2377", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_1:*:*:*:*:*:*", "matchCriteriaId": "14E6127E-A40D-437D-B57B-0D7F57D08559", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_11:*:*:*:*:*:*", "matchCriteriaId": "28AE4411-45D1-4978-BA61-334AD04FF8FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_12:*:*:*:*:*:*", "matchCriteriaId": "479EB097-495A-4730-AF51-F2C0064EBA6E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_13:*:*:*:*:*:*", "matchCriteriaId": "9B3E7C12-8D97-42CC-9B2B-A0AE3267DE69", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_14:*:*:*:*:*:*", "matchCriteriaId": "5024BE9F-CE32-4099-A646-F3EC5DB6F63C", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_15:*:*:*:*:*:*", "matchCriteriaId": "DA9FB72A-C55F-4878-89D5-375FDA08163B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_16:*:*:*:*:*:*", "matchCriteriaId": "1CBC2A9C-9F21-4509-BA72-28B5DB16E55D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_17:*:*:*:*:*:*", "matchCriteriaId": "485F5ED3-062D-4A8E-AA34-9DC95D0D9646", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_18:*:*:*:*:*:*", "matchCriteriaId": "124364C5-0616-4C7A-A78F-08FABAA785CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_19:*:*:*:*:*:*", "matchCriteriaId": "A6BFFF1E-20D6-4508-9842-E7AB35F12B1D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_2:*:*:*:*:*:*", "matchCriteriaId": "DB7307A5-6F20-44FD-9D09-8FB76E444500", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_20:*:*:*:*:*:*", "matchCriteriaId": "2E7F3992-0C15-4371-BE14-0D2046B3976E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_21:*:*:*:*:*:*", "matchCriteriaId": "C5759CBC-D910-407D-83DF-A77FBDC8555D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_3:*:*:*:*:*:*", "matchCriteriaId": "0E45DE8A-477B-4BF7-893B-D11DDEE82E82", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_4:*:*:*:*:*:*", "matchCriteriaId": "D107CE0B-2EF2-4CF0-869E-3E27CBCA4997", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_5:*:*:*:*:*:*", "matchCriteriaId": "81DABB45-F39C-4BF4-8F2B-0CEE60A44C00", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_6:*:*:*:*:*:*", "matchCriteriaId": "CDDBD68A-771C-44FD-96A3-3AE189DE2591", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_7:*:*:*:*:*:*", "matchCriteriaId": "8FBD21F3-AC92-4154-948E-509FB8E097F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_8:*:*:*:*:*:*", "matchCriteriaId": "D91F9E0C-0A76-4DBC-A4E5-74E6682A5765", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_9:*:*:*:*:*:*", "matchCriteriaId": "86F7EF21-5395-4F1F-A15D-A1C7EDBFAB2A", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:*", "matchCriteriaId": "09027C19-D442-446F-B7A8-21DB6787CF43", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_10:*:*:*:*:*:*", "matchCriteriaId": "0A0FEC28-0707-4F42-9740-78F3D2D551EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_11:*:*:*:*:*:*", "matchCriteriaId": "C3C5879A-A608-4230-9DC1-C27F0F48A13B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_12:*:*:*:*:*:*", "matchCriteriaId": "0C71089A-BDDE-41FC-9DF9-9AEF4C2374DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_13:*:*:*:*:*:*", "matchCriteriaId": "2DBB6B73-8D6B-41FF-BEE0-E0C7F5F1EB41", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_14:*:*:*:*:*:*", "matchCriteriaId": "12A3B254-8580-45DB-BDE4-5B5A29CBFFB3", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_15:*:*:*:*:*:*", "matchCriteriaId": "1DB1DE6A-66AE-499B-AD92-9E6ACE474C6D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_16:*:*:*:*:*:*", "matchCriteriaId": "AADBB4F9-E43E-428B-9979-F47A15696C85", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_2:*:*:*:*:*:*", "matchCriteriaId": "7158D2C0-E9AC-4CD6-B777-EA7B7A181997", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_3:*:*:*:*:*:*", "matchCriteriaId": "90EC6C13-4B37-48E5-8199-A702A944D5A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_4:*:*:*:*:*:*", "matchCriteriaId": "2528152C-E20A-4D97-931C-A5EC3CEAA06D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_5:*:*:*:*:*:*", "matchCriteriaId": "A99DAB4C-272B-4C91-BC70-7729E1152590", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_6:*:*:*:*:*:*", "matchCriteriaId": "30DFC10A-A4D9-4F89-B17C-AB9260087D29", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_7:*:*:*:*:*:*", "matchCriteriaId": "272A5C44-18EC-41A9-8233-E9D4D0734EA6", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_8:*:*:*:*:*:*", "matchCriteriaId": "3DA21490-E253-4BDC-9BA8-5D068BE35189", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_9:*:*:*:*:*:*", "matchCriteriaId": "81C2C04D-D4BA-4C87-9609-C53AA63BFF19", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sun:jre:1.4.2_1:*:*:*:*:*:*:*", "matchCriteriaId": "1EEAB662-644A-4D7B-8237-64142CF48724", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_2:*:*:*:*:*:*:*", "matchCriteriaId": "D9598A49-95F2-42DB-B92C-CD026F739B83", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_02:*:*:*:*:*:*:*", "matchCriteriaId": "DB48B161-C239-4BB5-8667-7ACA5A5437F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_03:*:*:*:*:*:*:*", "matchCriteriaId": "83629616-1814-4858-B09F-79BEA82D6F55", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_3:*:*:*:*:*:*:*", "matchCriteriaId": "BED1009E-AE60-43A0-A0F5-38526EFCF423", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_4:*:*:*:*:*:*:*", "matchCriteriaId": "D011585C-0E62-4233-85FA-F29A07D68DA7", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_04:*:*:*:*:*:*:*", "matchCriteriaId": "03E8F351-F900-436E-A726-55AE31FBF832", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_05:*:*:*:*:*:*:*", "matchCriteriaId": "F76B79C6-ADD0-4992-A4BD-423A0AD38714", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_5:*:*:*:*:*:*:*", "matchCriteriaId": "F226D898-F0E8-41D8-BF40-54DE9FB5426D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_06:*:*:*:*:*:*:*", "matchCriteriaId": "FBFD41B5-6E33-4B00-81E8-9D91B0A03BD8", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_6:*:*:*:*:*:*:*", "matchCriteriaId": "4CB9CCD1-A67D-4800-9EC5-6E1A0B0B76E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_7:*:*:*:*:*:*:*", "matchCriteriaId": "CE28C283-447A-4F83-B96B-69F96E663C1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_07:*:*:*:*:*:*:*", "matchCriteriaId": "685D3F7F-30B9-4EB8-90FC-66A2A067A510", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_8:*:*:*:*:*:*:*", "matchCriteriaId": "D102063B-2434-4141-98E7-2DE501AE1728", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_08:*:*:*:*:*:*:*", "matchCriteriaId": "722B704B-A422-4163-AD48-F30CA4A07002", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_09:*:*:*:*:*:*:*", "matchCriteriaId": "C05784DC-626B-4D8D-A4DF-A42AC87131DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_9:*:*:*:*:*:*:*", "matchCriteriaId": "03B8CD03-CD31-4F4D-BA90-59435578A4F9", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_10:*:*:*:*:*:*:*", "matchCriteriaId": "41A994BF-1F64-480A-8AA5-748DDD0AB68C", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_11:*:*:*:*:*:*:*", "matchCriteriaId": "88519F2D-AD06-4F05-BEDA-A09216F1B481", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_12:*:*:*:*:*:*:*", "matchCriteriaId": "AC728978-368D-4B36-B149-70473E92BD1B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_13:*:*:*:*:*:*:*", "matchCriteriaId": "FD5187B1-CB86-48E8-A595-9FCFD9822C0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_14:*:*:*:*:*:*:*", "matchCriteriaId": "6C660DE4-543A-4E9B-825D-CD099D08CBD8", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_15:*:*:*:*:*:*:*", "matchCriteriaId": "98C1942E-16C0-4EB2-AB57-43EC6EC9C3A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_16:*:*:*:*:*:*:*", "matchCriteriaId": "318719C9-7B01-4021-B2EF-8341254DFE6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_17:*:*:*:*:*:*:*", "matchCriteriaId": "DB8FA9BA-51CA-4473-9FE1-9A32FB8C8041", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_18:*:*:*:*:*:*:*", "matchCriteriaId": "CC5E64B6-77DA-44BC-B646-AE01041B1830", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_19:*:*:*:*:*:*:*", "matchCriteriaId": "2DA35E80-9E0E-4A26-B631-A61542BE4739", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_20:*:*:*:*:*:*:*", "matchCriteriaId": "7EEB5367-1BB8-4ED3-8C04-ABA6BAA5AD10", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_21:*:*:*:*:*:*:*", "matchCriteriaId": "BED9E7C8-0418-4733-A496-61CCFD638859", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_22:*:*:*:*:*:*:*", "matchCriteriaId": "6566CE32-E042-424A-893B-C8A9E26E2869", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_01:*:*:*:*:*:*:*", "matchCriteriaId": "E6C4CA79-9D0A-4E47-A1A4-9CBEDDCFE05E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_1:*:*:*:*:*:*:*", "matchCriteriaId": "6F6453C9-7EE0-4FFB-861D-C2D9416DCABA", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_2:*:*:*:*:*:*:*", "matchCriteriaId": "89BF16DE-EEAB-4DA5-BFF1-7A0A58DE141F", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_02:*:*:*:*:*:*:*", "matchCriteriaId": "AF4E34FD-D927-42BB-8A16-031D77CB4B9E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_03:*:*:*:*:*:*:*", "matchCriteriaId": "37A3D49A-BE20-47BF-A85F-122357BAB098", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_3:*:*:*:*:*:*:*", "matchCriteriaId": "6DDE253E-C8B6-4C1D-AECE-ABEA1A67306B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_04:*:*:*:*:*:*:*", "matchCriteriaId": "F45DB5D3-7F35-4531-9A82-24EB50034787", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_4:*:*:*:*:*:*:*", "matchCriteriaId": "A56D9A60-F272-4D4C-A9DD-C93DAF783585", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_5:*:*:*:*:*:*:*", "matchCriteriaId": "EF109CAA-E8D2-4BD7-BE7C-AF8B2A78672E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_05:*:*:*:*:*:*:*", "matchCriteriaId": "4695F707-12E8-4BA4-BBE1-C21CB7213A2A", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_6:*:*:*:*:*:*:*", "matchCriteriaId": "976F4ACB-3725-45B7-B2EF-DEE4B88254E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_06:*:*:*:*:*:*:*", "matchCriteriaId": "C918FB49-DA13-4326-BE86-6F6BEA4CE4E1", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_07:*:*:*:*:*:*:*", "matchCriteriaId": "5573CAD1-39D1-4ADB-BB95-EBB554B43B4E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_7:*:*:*:*:*:*:*", "matchCriteriaId": "52BDD6A8-1611-4C3C-865D-6EDB5B9F8D88", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_8:*:*:*:*:*:*:*", "matchCriteriaId": "6A1F28FF-652A-4C89-9AC6-5E212F890811", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_08:*:*:*:*:*:*:*", "matchCriteriaId": "DD02EBDF-6E51-4538-9EDD-B1DE914D09C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_09:*:*:*:*:*:*:*", "matchCriteriaId": "53C3C0E3-5F40-412B-A4AD-A7A291DE2A08", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_9:*:*:*:*:*:*:*", "matchCriteriaId": "96A8C351-E9CD-431B-8B9D-712CA54C7213", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_10:*:*:*:*:*:*:*", "matchCriteriaId": "36888382-79C8-4C97-A654-C668CD68556F", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_11:*:*:*:*:*:*:*", "matchCriteriaId": "F34C99E6-F9F0-4EF3-8601-B47EAE3D7273", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_12:*:*:*:*:*:*:*", "matchCriteriaId": "A74DD08D-CEDB-460E-BED5-78F6CAF18BF5", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_13:*:*:*:*:*:*:*", "matchCriteriaId": "E60560EC-6DBD-4A17-BFFA-FAD9193A0BC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_14:*:*:*:*:*:*:*", "matchCriteriaId": "E4F64FBC-DC97-4FE3-A235-18B87945AF7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_15:*:*:*:*:*:*:*", "matchCriteriaId": "85048406-9051-4E69-94A8-5C449F3B89E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_16:*:*:*:*:*:*:*", "matchCriteriaId": "B1C88DD7-0B46-4405-BD35-60D27E2DBA14", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_17:*:*:*:*:*:*:*", "matchCriteriaId": "08D23B7C-7B8C-41B8-8D94-BB0F27C7F0A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_18:*:*:*:*:*:*:*", "matchCriteriaId": "1C49B997-95D3-4DA4-A353-DB41AD461C5E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_19:*:*:*:*:*:*:*", "matchCriteriaId": "6F70EF76-ED5F-4835-8252-FE613604FA3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_20:*:*:*:*:*:*:*", "matchCriteriaId": "6BDBCAD8-CDF7-4550-8EA2-1409B02FFAD6", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_21:*:*:*:*:*:*:*", "matchCriteriaId": "7E691333-0434-4808-9ED4-E82C6EC2FD37", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_22:*:*:*:*:*:*:*", "matchCriteriaId": "BBE7A538-FF2E-4622-8479-781AB73CBA45", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:sun:solaris:*:*:*:*:*:*:*:*", "matchCriteriaId": "469B74F2-4B89-42B8-8638-731E92D463B9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sun:jre:1.3.1_1:*:*:*:*:*:*:*", "matchCriteriaId": "EA460D9A-662F-4861-9835-3D3116FB9488", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_01:*:*:*:*:*:*:*", "matchCriteriaId": "7E49A68E-0886-4AED-8FF4-9455914BFE16", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_01a:*:*:*:*:*:*:*", "matchCriteriaId": "E94B0A27-60D3-42F5-9DF6-75F481C2460D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_02:*:*:*:*:*:*:*", "matchCriteriaId": "89E95205-DB64-44AD-81A4-B77BD7595AAF", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_2:*:*:*:*:*:*:*", "matchCriteriaId": "0875E34D-8544-49B9-BAD9-8191CC103A07", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_03:*:*:*:*:*:*:*", "matchCriteriaId": "62E772B9-8E41-476F-81F5-87B41F1827A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_3:*:*:*:*:*:*:*", "matchCriteriaId": "B9643B49-FC4B-4AD4-90AC-939DDAA96518", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_4:*:*:*:*:*:*:*", "matchCriteriaId": "F76773E5-0A91-49B8-8C9C-DD64AB9F74BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_04:*:*:*:*:*:*:*", "matchCriteriaId": "7CE78463-2CE8-43C6-BB06-AA40C72B1A4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_05:*:*:*:*:*:*:*", "matchCriteriaId": "31A04480-92DF-49AD-9B36-7F1FCB29DE90", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_5:*:*:*:*:*:*:*", "matchCriteriaId": "ADF93A34-0535-4289-B12C-A1E1E22C13D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_06:*:*:*:*:*:*:*", "matchCriteriaId": "E2FD0B72-683D-4FF6-BCF5-5DE85BF3064B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_6:*:*:*:*:*:*:*", "matchCriteriaId": "EC85B851-FEC7-4299-9EC5-D8A69E16B89C", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_07:*:*:*:*:*:*:*", "matchCriteriaId": "F78CD4B5-4B1D-4128-8AEA-2F967C38C6C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_7:*:*:*:*:*:*:*", "matchCriteriaId": "1B4E5018-6A0B-4F26-96AA-AD8F6EA7FB3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_8:*:*:*:*:*:*:*", "matchCriteriaId": "2978CF34-D48B-4ED2-A0C1-3CFAA5867223", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_08:*:*:*:*:*:*:*", "matchCriteriaId": "62CAA3E7-9D65-48F3-ACF7-9D705D94DE54", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_9:*:*:*:*:*:*:*", "matchCriteriaId": "2C0E6EA5-0D9F-4B15-860A-5DA3FD1765B8", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_09:*:*:*:*:*:*:*", "matchCriteriaId": "477C310B-50AD-4D40-8EDB-4A80F0BF321D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_10:*:*:*:*:*:*:*", "matchCriteriaId": "60A1F526-6B28-47A3-8D2C-06CA067E9164", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_11:*:*:*:*:*:*:*", "matchCriteriaId": "17F09D9E-B04B-477E-86E6-E1B1F9650973", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_12:*:*:*:*:*:*:*", "matchCriteriaId": "6F929C59-9602-4962-95B4-4165D66E5935", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_13:*:*:*:*:*:*:*", "matchCriteriaId": "E8B76949-9282-44D0-8075-74E482CE9A82", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_14:*:*:*:*:*:*:*", "matchCriteriaId": "B9B072DD-FC4F-4E07-9837-0E16017CA4AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_15:*:*:*:*:*:*:*", "matchCriteriaId": "969BE4EC-4D13-4B74-8137-FA0F83F0FDC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_16:*:*:*:*:*:*:*", "matchCriteriaId": "86408019-1B53-4AA8-9F05-47EBD0466EE2", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_17:*:*:*:*:*:*:*", "matchCriteriaId": "81F47561-F59C-4904-8E05-D8A9629405A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_18:*:*:*:*:*:*:*", "matchCriteriaId": "FB067445-8EA5-460F-B625-C21251E5A8D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_19:*:*:*:*:*:*:*", "matchCriteriaId": "B4C075BC-607E-47A1-A32D-B912D2FA03BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_20:*:*:*:*:*:*:*", "matchCriteriaId": "007175B8-48DB-46BE-B971-FB57B6A33723", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_21:*:*:*:*:*:*:*", "matchCriteriaId": "D5E6F92A-FC59-4CE7-B7F8-94CBF3DC8F21", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_22:*:*:*:*:*:*:*", "matchCriteriaId": "496901D5-014D-4920-A343-91A56F6FEFA0", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_23:*:*:*:*:*:*:*", "matchCriteriaId": "B2D18FBC-4C9B-4722-90AB-028D281654F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_24:*:*:*:*:*:*:*", "matchCriteriaId": "853BC114-592C-43FE-B227-EF41C494DC98", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_25:*:*:*:*:*:*:*", "matchCriteriaId": "B1F4E031-CE92-48C4-BECC-7C1190DB477A", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_01:*:*:*:*:*:*:*", "matchCriteriaId": "34710306-D6CF-4D07-84BF-71A8839BE416", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_01a:*:*:*:*:*:*:*", "matchCriteriaId": "44B93DC8-6375-4B41-B9BC-F22F592C56B9", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_2:*:*:*:*:*:*:*", "matchCriteriaId": "16AD9E9E-D6BD-4FCD-B857-F5013033200F", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_02:*:*:*:*:*:*:*", "matchCriteriaId": "87BF46A9-8E4A-4583-B35F-052FD481DF66", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_03:*:*:*:*:*:*:*", "matchCriteriaId": "32B351BB-6CA6-4CEF-9F5D-ED47774FC676", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_3:*:*:*:*:*:*:*", "matchCriteriaId": "21300F7C-6904-456C-949D-C0AFA630F4A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_4:*:*:*:*:*:*:*", "matchCriteriaId": "776FA44E-6277-4236-A872-103E7DDE5040", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_04:*:*:*:*:*:*:*", "matchCriteriaId": "CDA40FCD-1D34-4C47-908F-697433236153", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_5:*:*:*:*:*:*:*", "matchCriteriaId": "63267A02-DCE2-4B86-B370-B90F03C7E341", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_05:*:*:*:*:*:*:*", "matchCriteriaId": "00639A84-BD03-4BD9-A655-F806693DBC8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_6:*:*:*:*:*:*:*", "matchCriteriaId": "2E2AE42E-0E25-468F-A8CB-03991F356338", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_06:*:*:*:*:*:*:*", "matchCriteriaId": "14824B23-FF9F-4D6D-9D02-12B79BE346A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_7:*:*:*:*:*:*:*", "matchCriteriaId": "5E015A65-708E-45B9-B66A-2D0F09638FF5", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_07:*:*:*:*:*:*:*", "matchCriteriaId": "6493744C-A69D-4377-937E-85E7F5535EA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_8:*:*:*:*:*:*:*", "matchCriteriaId": "F86BA5FB-A611-458E-8E37-4D4927D04D89", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_08:*:*:*:*:*:*:*", "matchCriteriaId": "C09019B1-B873-41CE-951E-4777F324729C", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_9:*:*:*:*:*:*:*", "matchCriteriaId": "03949794-A1DD-420F-A468-8F00AEA7B69E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_09:*:*:*:*:*:*:*", "matchCriteriaId": "EC4209A0-E73F-4B5A-9925-B5D20F879455", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_10:*:*:*:*:*:*:*", "matchCriteriaId": "297DF5AD-FC22-432B-AE6A-2B1E6CFE1BE4", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_11:*:*:*:*:*:*:*", "matchCriteriaId": "BFB8516D-03C4-478D-AFE2-824867FDC739", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_12:*:*:*:*:*:*:*", "matchCriteriaId": "F82AED17-FEC3-47D0-A395-26ACD07FBE52", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_13:*:*:*:*:*:*:*", "matchCriteriaId": "9630BC7B-9039-4FA6-86F8-5274783F3EB1", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_14:*:*:*:*:*:*:*", "matchCriteriaId": "F1A6A15C-216A-42B1-84EF-B3D9A313D4A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_15:*:*:*:*:*:*:*", "matchCriteriaId": "EC39C819-9439-4029-8377-F6D58B3DFDFB", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_16:*:*:*:*:*:*:*", "matchCriteriaId": "A053DEF6-1317-4DA8-91D7-E1970DA62351", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_17:*:*:*:*:*:*:*", "matchCriteriaId": "F0DBFDD8-40AE-44F2-8F02-FB7A4FAE5235", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_18:*:*:*:*:*:*:*", "matchCriteriaId": "EB0605FF-3DDC-4F3A-8171-F3A447E9C292", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_19:*:*:*:*:*:*:*", "matchCriteriaId": "801FF3B4-0729-4710-BFC2-4B078029944F", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_20:*:*:*:*:*:*:*", "matchCriteriaId": "8EB8591E-3D6E-489B-B0D6-CEBB9D09EA68", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_21:*:*:*:*:*:*:*", "matchCriteriaId": "8A411676-6666-4B54-A008-443B9B42F670", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_22:*:*:*:*:*:*:*", "matchCriteriaId": "0AEDC9B2-8AA6-4DA2-A187-49A1DD106725", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_23:*:*:*:*:*:*:*", "matchCriteriaId": "8F69BEE4-CB4B-436A-9838-13239B368CF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_24:*:*:*:*:*:*:*", "matchCriteriaId": "11AC1050-38AF-49F4-A40C-AAF9710204AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_25:*:*:*:*:*:*:*", "matchCriteriaId": "8FA939E8-8747-4532-B6B4-6E83824C7067", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sun:java_se:*:*:business:*:*:*:*:*", "matchCriteriaId": "CB9A3291-3F2C-40E9-81D3-D148002E1782", "vulnerable": false } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_1:*:*:*:*:*:*", "matchCriteriaId": "8198F493-0447-4A87-9F16-5B6CB3572E38", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_10:*:*:*:*:*:*", "matchCriteriaId": "645BBE6D-BA5E-4D93-9152-759A2355013E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_11:*:*:*:*:*:*", "matchCriteriaId": "0EE694C9-940A-4899-844C-AC63412FA295", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_12:*:*:*:*:*:*", "matchCriteriaId": "BC9476DD-9B56-4811-A248-711C25181F29", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_13:*:*:*:*:*:*", "matchCriteriaId": "68D34082-2948-4D95-B43F-FBD59E2F3D28", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_14:*:*:*:*:*:*", "matchCriteriaId": "F2E01C07-4921-47CC-9AFC-D3B461D0B78D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_15:*:*:*:*:*:*", "matchCriteriaId": "7532E7D4-2F62-4DA0-B905-F95A0A735CE5", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_16:*:*:*:*:*:*", "matchCriteriaId": "0AF93193-889E-4F44-ADEB-E89E56DE6C7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_17:*:*:*:*:*:*", "matchCriteriaId": "68C19440-4172-4539-8E38-09DBCB1752E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_18:*:*:*:*:*:*", "matchCriteriaId": "3CC000EC-9717-47DA-B182-6C8CD3970F27", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_19:*:*:*:*:*:*", "matchCriteriaId": "115083C5-811F-47BA-8549-3BDFF9CA0740", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_2:*:*:*:*:*:*", "matchCriteriaId": "51337B8C-78F2-4207-998E-A3FC591F538B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_20:*:*:*:*:*:*", "matchCriteriaId": "48193108-CD9F-476E-A7D2-E0796F659BA5", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_21:*:*:*:*:*:*", "matchCriteriaId": "A0A80299-783A-4FBA-9EBF-5913942949A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_3:*:*:*:*:*:*", "matchCriteriaId": "76A4F852-0240-44D6-9BD5-FE79DEF16438", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_4:*:*:*:*:*:*", "matchCriteriaId": "F57E5943-5CC3-4736-85E8-FE7CC4F38735", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_5:*:*:*:*:*:*", "matchCriteriaId": "3C228E00-0F5C-41D2-8BD0-46AF682AE842", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_6:*:*:*:*:*:*", "matchCriteriaId": "0329E813-B2C8-4C84-BCAF-2D54C4AE0472", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_7:*:*:*:*:*:*", "matchCriteriaId": "7E3C40E1-7005-4F83-B347-177BEC9EE339", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_8:*:*:*:*:*:*", "matchCriteriaId": "6855E3F5-6F8E-44FA-A913-0D0F6A803DFF", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_9:*:*:*:*:*:*", "matchCriteriaId": "C79BDB6E-442B-41F1-A025-C17648A81FD9", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_1:*:*:*:*:*:*", "matchCriteriaId": "EBB09CE1-F4AC-472C-8D5D-594AEB322CFD", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_10:*:*:*:*:*:*", "matchCriteriaId": "722A93D8-B5BC-42F3-92A2-E424F61269A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_11:*:*:*:*:*:*", "matchCriteriaId": "775F2611-F11C-4B84-8F40-0D034B81BF18", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_12:*:*:*:*:*:*", "matchCriteriaId": "F20FDD9F-FF45-48BC-9207-54FB02E76071", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_13:*:*:*:*:*:*", "matchCriteriaId": "9FA326F5-894A-4B01-BCA3-B126DA81CA59", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_14:*:*:*:*:*:*", "matchCriteriaId": "228AB7B4-4BA4-43D4-B562-D438884DB152", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_15:*:*:*:*:*:*", "matchCriteriaId": "AFD5C688-2103-4D60-979E-D9BE69A989C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_16:*:*:*:*:*:*", "matchCriteriaId": "21421215-F722-4207-A2E5-E2DF4B29859B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_3:*:*:*:*:*:*", "matchCriteriaId": "D98175BF-B084-4FA5-899D-9E80DC3923EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_4:*:*:*:*:*:*", "matchCriteriaId": "820632CE-F8DF-47EE-B716-7530E60008B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_5:*:*:*:*:*:*", "matchCriteriaId": "FA2BD0A3-7B2D-447B-ABAC-7B867B03B632", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_6:*:*:*:*:*:*", "matchCriteriaId": "D54AB785-E9B7-47BD-B756-0C3A629D67DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_7:*:*:*:*:*:*", "matchCriteriaId": "E9412098-0353-4F7B-9245-010557E6C651", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_8:*:*:*:*:*:*", "matchCriteriaId": "FB0E9224-3D12-47E2-8E69-7B682284CDDD", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_9:*:*:*:*:*:*", "matchCriteriaId": "77BCD102-59A4-45A6-ADEF-CAB7F70E2377", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update2:*:*:*:*:*:*", "matchCriteriaId": "B8F93BBE-1E8C-4EB3-BCC7-20AB2D813F98", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_01:*:*:*:*:*:*:*", "matchCriteriaId": "27A472AF-049D-4D63-841C-1EF737E8D64D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_1:*:*:*:*:*:*:*", "matchCriteriaId": "1EEAB662-644A-4D7B-8237-64142CF48724", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_2:*:*:*:*:*:*:*", "matchCriteriaId": "D9598A49-95F2-42DB-B92C-CD026F739B83", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_02:*:*:*:*:*:*:*", "matchCriteriaId": "DB48B161-C239-4BB5-8667-7ACA5A5437F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_03:*:*:*:*:*:*:*", "matchCriteriaId": "83629616-1814-4858-B09F-79BEA82D6F55", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_3:*:*:*:*:*:*:*", "matchCriteriaId": "BED1009E-AE60-43A0-A0F5-38526EFCF423", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_4:*:*:*:*:*:*:*", "matchCriteriaId": "D011585C-0E62-4233-85FA-F29A07D68DA7", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_04:*:*:*:*:*:*:*", "matchCriteriaId": "03E8F351-F900-436E-A726-55AE31FBF832", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_05:*:*:*:*:*:*:*", "matchCriteriaId": "F76B79C6-ADD0-4992-A4BD-423A0AD38714", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_5:*:*:*:*:*:*:*", "matchCriteriaId": "F226D898-F0E8-41D8-BF40-54DE9FB5426D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_06:*:*:*:*:*:*:*", "matchCriteriaId": "FBFD41B5-6E33-4B00-81E8-9D91B0A03BD8", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_6:*:*:*:*:*:*:*", "matchCriteriaId": "4CB9CCD1-A67D-4800-9EC5-6E1A0B0B76E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_7:*:*:*:*:*:*:*", "matchCriteriaId": "CE28C283-447A-4F83-B96B-69F96E663C1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_07:*:*:*:*:*:*:*", "matchCriteriaId": "685D3F7F-30B9-4EB8-90FC-66A2A067A510", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_8:*:*:*:*:*:*:*", "matchCriteriaId": "D102063B-2434-4141-98E7-2DE501AE1728", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_08:*:*:*:*:*:*:*", "matchCriteriaId": "722B704B-A422-4163-AD48-F30CA4A07002", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_09:*:*:*:*:*:*:*", "matchCriteriaId": "C05784DC-626B-4D8D-A4DF-A42AC87131DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_9:*:*:*:*:*:*:*", "matchCriteriaId": "03B8CD03-CD31-4F4D-BA90-59435578A4F9", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_10:*:*:*:*:*:*:*", "matchCriteriaId": "41A994BF-1F64-480A-8AA5-748DDD0AB68C", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_11:*:*:*:*:*:*:*", "matchCriteriaId": "88519F2D-AD06-4F05-BEDA-A09216F1B481", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_12:*:*:*:*:*:*:*", "matchCriteriaId": "AC728978-368D-4B36-B149-70473E92BD1B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_13:*:*:*:*:*:*:*", "matchCriteriaId": "FD5187B1-CB86-48E8-A595-9FCFD9822C0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_14:*:*:*:*:*:*:*", "matchCriteriaId": "6C660DE4-543A-4E9B-825D-CD099D08CBD8", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_15:*:*:*:*:*:*:*", "matchCriteriaId": "98C1942E-16C0-4EB2-AB57-43EC6EC9C3A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_16:*:*:*:*:*:*:*", "matchCriteriaId": "318719C9-7B01-4021-B2EF-8341254DFE6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_17:*:*:*:*:*:*:*", "matchCriteriaId": "DB8FA9BA-51CA-4473-9FE1-9A32FB8C8041", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_18:*:*:*:*:*:*:*", "matchCriteriaId": "CC5E64B6-77DA-44BC-B646-AE01041B1830", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_19:*:*:*:*:*:*:*", "matchCriteriaId": "2DA35E80-9E0E-4A26-B631-A61542BE4739", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_20:*:*:*:*:*:*:*", "matchCriteriaId": "7EEB5367-1BB8-4ED3-8C04-ABA6BAA5AD10", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_21:*:*:*:*:*:*:*", "matchCriteriaId": "BED9E7C8-0418-4733-A496-61CCFD638859", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_22:*:*:*:*:*:*:*", "matchCriteriaId": "6566CE32-E042-424A-893B-C8A9E26E2869", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_1:*:*:*:*:*:*", "matchCriteriaId": "14E6127E-A40D-437D-B57B-0D7F57D08559", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_11:*:*:*:*:*:*", "matchCriteriaId": "28AE4411-45D1-4978-BA61-334AD04FF8FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_12:*:*:*:*:*:*", "matchCriteriaId": "479EB097-495A-4730-AF51-F2C0064EBA6E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_13:*:*:*:*:*:*", "matchCriteriaId": "9B3E7C12-8D97-42CC-9B2B-A0AE3267DE69", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_14:*:*:*:*:*:*", "matchCriteriaId": "5024BE9F-CE32-4099-A646-F3EC5DB6F63C", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_15:*:*:*:*:*:*", "matchCriteriaId": "DA9FB72A-C55F-4878-89D5-375FDA08163B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_16:*:*:*:*:*:*", "matchCriteriaId": "1CBC2A9C-9F21-4509-BA72-28B5DB16E55D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_17:*:*:*:*:*:*", "matchCriteriaId": "485F5ED3-062D-4A8E-AA34-9DC95D0D9646", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_18:*:*:*:*:*:*", "matchCriteriaId": "124364C5-0616-4C7A-A78F-08FABAA785CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_19:*:*:*:*:*:*", "matchCriteriaId": "A6BFFF1E-20D6-4508-9842-E7AB35F12B1D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_2:*:*:*:*:*:*", "matchCriteriaId": "DB7307A5-6F20-44FD-9D09-8FB76E444500", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_20:*:*:*:*:*:*", "matchCriteriaId": "2E7F3992-0C15-4371-BE14-0D2046B3976E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_21:*:*:*:*:*:*", "matchCriteriaId": "C5759CBC-D910-407D-83DF-A77FBDC8555D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_3:*:*:*:*:*:*", "matchCriteriaId": "0E45DE8A-477B-4BF7-893B-D11DDEE82E82", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_4:*:*:*:*:*:*", "matchCriteriaId": "D107CE0B-2EF2-4CF0-869E-3E27CBCA4997", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_5:*:*:*:*:*:*", "matchCriteriaId": "81DABB45-F39C-4BF4-8F2B-0CEE60A44C00", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_6:*:*:*:*:*:*", "matchCriteriaId": "CDDBD68A-771C-44FD-96A3-3AE189DE2591", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_7:*:*:*:*:*:*", "matchCriteriaId": "8FBD21F3-AC92-4154-948E-509FB8E097F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_8:*:*:*:*:*:*", "matchCriteriaId": "D91F9E0C-0A76-4DBC-A4E5-74E6682A5765", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_9:*:*:*:*:*:*", "matchCriteriaId": "86F7EF21-5395-4F1F-A15D-A1C7EDBFAB2A", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:*", "matchCriteriaId": "09027C19-D442-446F-B7A8-21DB6787CF43", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_10:*:*:*:*:*:*", "matchCriteriaId": "0A0FEC28-0707-4F42-9740-78F3D2D551EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_11:*:*:*:*:*:*", "matchCriteriaId": "C3C5879A-A608-4230-9DC1-C27F0F48A13B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_12:*:*:*:*:*:*", "matchCriteriaId": "0C71089A-BDDE-41FC-9DF9-9AEF4C2374DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_13:*:*:*:*:*:*", "matchCriteriaId": "2DBB6B73-8D6B-41FF-BEE0-E0C7F5F1EB41", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_14:*:*:*:*:*:*", "matchCriteriaId": "12A3B254-8580-45DB-BDE4-5B5A29CBFFB3", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_15:*:*:*:*:*:*", "matchCriteriaId": "1DB1DE6A-66AE-499B-AD92-9E6ACE474C6D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_16:*:*:*:*:*:*", "matchCriteriaId": "AADBB4F9-E43E-428B-9979-F47A15696C85", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_2:*:*:*:*:*:*", "matchCriteriaId": "7158D2C0-E9AC-4CD6-B777-EA7B7A181997", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_3:*:*:*:*:*:*", "matchCriteriaId": "90EC6C13-4B37-48E5-8199-A702A944D5A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_4:*:*:*:*:*:*", "matchCriteriaId": "2528152C-E20A-4D97-931C-A5EC3CEAA06D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_5:*:*:*:*:*:*", "matchCriteriaId": "A99DAB4C-272B-4C91-BC70-7729E1152590", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_6:*:*:*:*:*:*", "matchCriteriaId": "30DFC10A-A4D9-4F89-B17C-AB9260087D29", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_7:*:*:*:*:*:*", "matchCriteriaId": "272A5C44-18EC-41A9-8233-E9D4D0734EA6", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_8:*:*:*:*:*:*", "matchCriteriaId": "3DA21490-E253-4BDC-9BA8-5D068BE35189", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_9:*:*:*:*:*:*", "matchCriteriaId": "81C2C04D-D4BA-4C87-9609-C53AA63BFF19", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_1:*:*:*:*:*:*:*", "matchCriteriaId": "6F6453C9-7EE0-4FFB-861D-C2D9416DCABA", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_2:*:*:*:*:*:*:*", "matchCriteriaId": "89BF16DE-EEAB-4DA5-BFF1-7A0A58DE141F", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_02:*:*:*:*:*:*:*", "matchCriteriaId": "AF4E34FD-D927-42BB-8A16-031D77CB4B9E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_03:*:*:*:*:*:*:*", "matchCriteriaId": "37A3D49A-BE20-47BF-A85F-122357BAB098", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_3:*:*:*:*:*:*:*", "matchCriteriaId": "6DDE253E-C8B6-4C1D-AECE-ABEA1A67306B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_04:*:*:*:*:*:*:*", "matchCriteriaId": "F45DB5D3-7F35-4531-9A82-24EB50034787", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_4:*:*:*:*:*:*:*", "matchCriteriaId": "A56D9A60-F272-4D4C-A9DD-C93DAF783585", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_5:*:*:*:*:*:*:*", "matchCriteriaId": "EF109CAA-E8D2-4BD7-BE7C-AF8B2A78672E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_05:*:*:*:*:*:*:*", "matchCriteriaId": "4695F707-12E8-4BA4-BBE1-C21CB7213A2A", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_6:*:*:*:*:*:*:*", "matchCriteriaId": "976F4ACB-3725-45B7-B2EF-DEE4B88254E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_06:*:*:*:*:*:*:*", "matchCriteriaId": "C918FB49-DA13-4326-BE86-6F6BEA4CE4E1", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_07:*:*:*:*:*:*:*", "matchCriteriaId": "5573CAD1-39D1-4ADB-BB95-EBB554B43B4E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_7:*:*:*:*:*:*:*", "matchCriteriaId": "52BDD6A8-1611-4C3C-865D-6EDB5B9F8D88", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_8:*:*:*:*:*:*:*", "matchCriteriaId": "6A1F28FF-652A-4C89-9AC6-5E212F890811", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_08:*:*:*:*:*:*:*", "matchCriteriaId": "DD02EBDF-6E51-4538-9EDD-B1DE914D09C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_09:*:*:*:*:*:*:*", "matchCriteriaId": "53C3C0E3-5F40-412B-A4AD-A7A291DE2A08", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_9:*:*:*:*:*:*:*", "matchCriteriaId": "96A8C351-E9CD-431B-8B9D-712CA54C7213", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_10:*:*:*:*:*:*:*", "matchCriteriaId": "36888382-79C8-4C97-A654-C668CD68556F", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_11:*:*:*:*:*:*:*", "matchCriteriaId": "F34C99E6-F9F0-4EF3-8601-B47EAE3D7273", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_12:*:*:*:*:*:*:*", "matchCriteriaId": "A74DD08D-CEDB-460E-BED5-78F6CAF18BF5", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_13:*:*:*:*:*:*:*", "matchCriteriaId": "E60560EC-6DBD-4A17-BFFA-FAD9193A0BC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_14:*:*:*:*:*:*:*", "matchCriteriaId": "E4F64FBC-DC97-4FE3-A235-18B87945AF7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_15:*:*:*:*:*:*:*", "matchCriteriaId": "85048406-9051-4E69-94A8-5C449F3B89E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_16:*:*:*:*:*:*:*", "matchCriteriaId": "B1C88DD7-0B46-4405-BD35-60D27E2DBA14", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_17:*:*:*:*:*:*:*", "matchCriteriaId": "08D23B7C-7B8C-41B8-8D94-BB0F27C7F0A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_18:*:*:*:*:*:*:*", "matchCriteriaId": "1C49B997-95D3-4DA4-A353-DB41AD461C5E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_19:*:*:*:*:*:*:*", "matchCriteriaId": "6F70EF76-ED5F-4835-8252-FE613604FA3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_20:*:*:*:*:*:*:*", "matchCriteriaId": "6BDBCAD8-CDF7-4550-8EA2-1409B02FFAD6", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_21:*:*:*:*:*:*:*", "matchCriteriaId": "7E691333-0434-4808-9ED4-E82C6EC2FD37", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_22:*:*:*:*:*:*:*", "matchCriteriaId": "BBE7A538-FF2E-4622-8479-781AB73CBA45", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in the HsbParser.getSoundBank function in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to execute arbitrary code via a long file: URL in an argument, aka Bug Id 6854303." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer basado en pila en la funci\u00f3n HsbParser.getSoundBank en Sun Java SE en JDK y JRE 5.0 anteriores a Update 22, JDK y JRE 6 anteriores a Update 17, SDK y JRE v1.3.x anteriores a v1.3.1_27, y SDK y JRE v1.4.x anteriores a v1.4.2_24 permite a los atacantes remotos ejecutar arbitrariamente c\u00f3digo a trav\u00e9s de un un archivo largo: URL en un argumento, tambi\u00e9n conocido como Id 6854303." } ], "id": "CVE-2009-3867", "lastModified": "2024-11-21T01:08:22.370", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2009-11-05T16:30:00.343", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://java.sun.com/javase/6/webnotes/6u17.html" }, { "source": "cve@mitre.org", "url": "http://lists.apple.com/archives/security-announce/2009/Dec/msg00000.html" }, { "source": "cve@mitre.org", "url": "http://lists.apple.com/archives/security-announce/2009/Dec/msg00001.html" }, { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00010.html" }, { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=126566824131534\u0026w=2" }, { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=126566824131534\u0026w=2" }, { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=131593453929393\u0026w=2" }, { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=131593453929393\u0026w=2" }, { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=134254866602253\u0026w=2" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/37231" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/37239" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/37386" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/37581" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/37841" }, { "source": "cve@mitre.org", "url": "http://security.gentoo.org/glsa/glsa-200911-02.xml" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://securitytracker.com/id?1023132" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-270474-1" }, { "source": "cve@mitre.org", "url": "http://support.apple.com/kb/HT3969" }, { "source": "cve@mitre.org", "url": "http://support.apple.com/kb/HT3970" }, { "source": "cve@mitre.org", "url": "http://www.oracle.com/technetwork/topics/security/cpujan2010-084891.html" }, { "source": "cve@mitre.org", "url": "http://www.redhat.com/support/errata/RHSA-2009-1694.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/36881" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2009/3131" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://zerodayinitiative.com/advisories/ZDI-09-076/" }, { "source": "cve@mitre.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11903" }, { "source": "cve@mitre.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6746" }, { "source": "cve@mitre.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7750" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://java.sun.com/javase/6/webnotes/6u17.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.apple.com/archives/security-announce/2009/Dec/msg00000.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.apple.com/archives/security-announce/2009/Dec/msg00001.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00010.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=126566824131534\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=126566824131534\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=131593453929393\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=131593453929393\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=134254866602253\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/37231" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/37239" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/37386" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/37581" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/37841" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-200911-02.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://securitytracker.com/id?1023132" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-270474-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://support.apple.com/kb/HT3969" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://support.apple.com/kb/HT3970" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.oracle.com/technetwork/topics/security/cpujan2010-084891.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2009-1694.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/36881" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2009/3131" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://zerodayinitiative.com/advisories/ZDI-09-076/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11903" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6746" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7750" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2009-08-10 18:30
Modified
2024-11-21 01:05
Severity ?
Summary
JDK13Services.getProviders in Sun Java SE 5.0 before Update 20 and 6 before Update 15, and OpenJDK, grants full privileges to instances of unspecified object types, which allows context-dependent attackers to bypass intended access restrictions via an untrusted (1) applet or (2) application.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sun:java_se:*:20:*:*:*:*:*:*", "matchCriteriaId": "625B941A-B638-46C2-A840-83724D5F826B", "versionEndIncluding": "5.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_se:*:14:*:*:*:*:*:*", "matchCriteriaId": "EB9DE8D5-D4F6-45DE-9DB4-9E5BB7E518F9", "versionEndIncluding": "6", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:openjdk:*:*:*:*:*:*:*:*", "matchCriteriaId": "0E78309B-E13F-4B65-9F59-39A993B900AF", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "JDK13Services.getProviders in Sun Java SE 5.0 before Update 20 and 6 before Update 15, and OpenJDK, grants full privileges to instances of unspecified object types, which allows context-dependent attackers to bypass intended access restrictions via an untrusted (1) applet or (2) application." }, { "lang": "es", "value": "JDK13Services.getProviders en Sun Java SE v5.0 anteriores a Update 20 y v6 anteriores a Update 15, y en OpenJDK, proporciona privilegios completos a instancias de tipos de objeto no especificadas, permitiendo a atacantes dependientes del contexto saltar las restricciones de acceso previstas mediante (1)un applet o (2) una aplicaci\u00f3n no confiables." } ], "id": "CVE-2009-2689", "lastModified": "2024-11-21T01:05:30.780", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2009-08-10T18:30:00.420", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://java.sun.com/j2se/1.5.0/ReleaseNotes.html" }, { "source": "cve@mitre.org", "url": "http://java.sun.com/javase/6/webnotes/6u15.html" }, { "source": "cve@mitre.org", "url": "http://lists.apple.com/archives/security-announce/2009/Sep/msg00000.html" }, { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00001.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/36162" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/36180" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/36199" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/37386" }, { "source": "cve@mitre.org", "url": "http://security.gentoo.org/glsa/glsa-200911-02.xml" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-118667-22-1" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-125139-16-1" }, { "source": "cve@mitre.org", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:209" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2009/2543" }, { "source": "cve@mitre.org", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=513222" }, { "source": "cve@mitre.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9603" }, { "source": "cve@mitre.org", "url": "https://rhn.redhat.com/errata/RHSA-2009-1199.html" }, { "source": "cve@mitre.org", "url": "https://rhn.redhat.com/errata/RHSA-2009-1201.html" }, { "source": "cve@mitre.org", "url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00310.html" }, { "source": "cve@mitre.org", "url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00325.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://java.sun.com/j2se/1.5.0/ReleaseNotes.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://java.sun.com/javase/6/webnotes/6u15.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.apple.com/archives/security-announce/2009/Sep/msg00000.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00001.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/36162" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/36180" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/36199" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/37386" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-200911-02.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-118667-22-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-125139-16-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:209" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2009/2543" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=513222" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9603" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://rhn.redhat.com/errata/RHSA-2009-1199.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://rhn.redhat.com/errata/RHSA-2009-1201.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00310.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00325.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2009-08-10 20:30
Modified
2024-11-21 01:05
Severity ?
Summary
The Abstract Window Toolkit (AWT) implementation in Sun Java SE 6 before Update 15 on Windows 2000 Professional does not provide a Security Warning Icon, which makes it easier for context-dependent attackers to trick a user into interacting unsafely with an untrusted applet.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://java.sun.com/javase/6/webnotes/6u15.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://java.sun.com/javase/6/webnotes/6u15.html | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
sun | java_se | * | |
microsoft | windows_2000 | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sun:java_se:*:14:*:*:*:*:*:*", "matchCriteriaId": "EB9DE8D5-D4F6-45DE-9DB4-9E5BB7E518F9", "versionEndIncluding": "6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*", "matchCriteriaId": "4E545C63-FE9C-4CA1-AF0F-D999D84D2AFD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Abstract Window Toolkit (AWT) implementation in Sun Java SE 6 before Update 15 on Windows 2000 Professional does not provide a Security Warning Icon, which makes it easier for context-dependent attackers to trick a user into interacting unsafely with an untrusted applet." }, { "lang": "es", "value": "La implementaci\u00f3n de Abstract Window Toolkit (AWT) en Sun Java SE v6 anteriores a Update 15 para Windows 2000 Professional no proporciona un Security Warning Icon, facilitando a atacantes dependientes del contexto que enga\u00f1en a un usuario al interactuar sin seguridad con un applet no confiable." } ], "id": "CVE-2009-2717", "lastModified": "2024-11-21T01:05:35.220", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2009-08-10T20:30:00.530", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://java.sun.com/javase/6/webnotes/6u15.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://java.sun.com/javase/6/webnotes/6u15.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2009-11-05 16:30
Modified
2024-11-21 01:08
Severity ?
Summary
Stack-based buffer overflow in the setDiffICM function in the Abstract Window Toolkit (AWT) in Java Runtime Environment (JRE) in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to execute arbitrary code via a crafted argument, aka Bug Id 6872357.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.4.2_1 | |
sun | jre | 1.4.2_2 | |
sun | jre | 1.4.2_02 | |
sun | jre | 1.4.2_03 | |
sun | jre | 1.4.2_3 | |
sun | jre | 1.4.2_4 | |
sun | jre | 1.4.2_04 | |
sun | jre | 1.4.2_05 | |
sun | jre | 1.4.2_5 | |
sun | jre | 1.4.2_06 | |
sun | jre | 1.4.2_6 | |
sun | jre | 1.4.2_7 | |
sun | jre | 1.4.2_07 | |
sun | jre | 1.4.2_8 | |
sun | jre | 1.4.2_08 | |
sun | jre | 1.4.2_09 | |
sun | jre | 1.4.2_9 | |
sun | jre | 1.4.2_10 | |
sun | jre | 1.4.2_11 | |
sun | jre | 1.4.2_12 | |
sun | jre | 1.4.2_13 | |
sun | jre | 1.4.2_14 | |
sun | jre | 1.4.2_15 | |
sun | jre | 1.4.2_16 | |
sun | jre | 1.4.2_17 | |
sun | jre | 1.4.2_18 | |
sun | jre | 1.4.2_19 | |
sun | jre | 1.4.2_20 | |
sun | jre | 1.4.2_21 | |
sun | jre | 1.4.2_22 | |
sun | sdk | 1.4.2_01 | |
sun | sdk | 1.4.2_1 | |
sun | sdk | 1.4.2_2 | |
sun | sdk | 1.4.2_02 | |
sun | sdk | 1.4.2_03 | |
sun | sdk | 1.4.2_3 | |
sun | sdk | 1.4.2_04 | |
sun | sdk | 1.4.2_4 | |
sun | sdk | 1.4.2_5 | |
sun | sdk | 1.4.2_05 | |
sun | sdk | 1.4.2_6 | |
sun | sdk | 1.4.2_06 | |
sun | sdk | 1.4.2_07 | |
sun | sdk | 1.4.2_7 | |
sun | sdk | 1.4.2_8 | |
sun | sdk | 1.4.2_08 | |
sun | sdk | 1.4.2_09 | |
sun | sdk | 1.4.2_9 | |
sun | sdk | 1.4.2_10 | |
sun | sdk | 1.4.2_11 | |
sun | sdk | 1.4.2_12 | |
sun | sdk | 1.4.2_13 | |
sun | sdk | 1.4.2_14 | |
sun | sdk | 1.4.2_15 | |
sun | sdk | 1.4.2_16 | |
sun | sdk | 1.4.2_17 | |
sun | sdk | 1.4.2_18 | |
sun | sdk | 1.4.2_19 | |
sun | sdk | 1.4.2_20 | |
sun | sdk | 1.4.2_21 | |
sun | sdk | 1.4.2_22 | |
sun | solaris | * | |
sun | jre | 1.3.1_1 | |
sun | jre | 1.3.1_01 | |
sun | jre | 1.3.1_01a | |
sun | jre | 1.3.1_02 | |
sun | jre | 1.3.1_2 | |
sun | jre | 1.3.1_03 | |
sun | jre | 1.3.1_3 | |
sun | jre | 1.3.1_4 | |
sun | jre | 1.3.1_04 | |
sun | jre | 1.3.1_05 | |
sun | jre | 1.3.1_5 | |
sun | jre | 1.3.1_06 | |
sun | jre | 1.3.1_6 | |
sun | jre | 1.3.1_07 | |
sun | jre | 1.3.1_7 | |
sun | jre | 1.3.1_8 | |
sun | jre | 1.3.1_08 | |
sun | jre | 1.3.1_9 | |
sun | jre | 1.3.1_09 | |
sun | jre | 1.3.1_10 | |
sun | jre | 1.3.1_11 | |
sun | jre | 1.3.1_12 | |
sun | jre | 1.3.1_13 | |
sun | jre | 1.3.1_14 | |
sun | jre | 1.3.1_15 | |
sun | jre | 1.3.1_16 | |
sun | jre | 1.3.1_17 | |
sun | jre | 1.3.1_18 | |
sun | jre | 1.3.1_19 | |
sun | jre | 1.3.1_20 | |
sun | jre | 1.3.1_21 | |
sun | jre | 1.3.1_22 | |
sun | jre | 1.3.1_23 | |
sun | jre | 1.3.1_24 | |
sun | jre | 1.3.1_25 | |
sun | sdk | 1.3.1_01 | |
sun | sdk | 1.3.1_01a | |
sun | sdk | 1.3.1_2 | |
sun | sdk | 1.3.1_02 | |
sun | sdk | 1.3.1_03 | |
sun | sdk | 1.3.1_3 | |
sun | sdk | 1.3.1_4 | |
sun | sdk | 1.3.1_04 | |
sun | sdk | 1.3.1_5 | |
sun | sdk | 1.3.1_05 | |
sun | sdk | 1.3.1_6 | |
sun | sdk | 1.3.1_06 | |
sun | sdk | 1.3.1_7 | |
sun | sdk | 1.3.1_07 | |
sun | sdk | 1.3.1_8 | |
sun | sdk | 1.3.1_08 | |
sun | sdk | 1.3.1_9 | |
sun | sdk | 1.3.1_09 | |
sun | sdk | 1.3.1_10 | |
sun | sdk | 1.3.1_11 | |
sun | sdk | 1.3.1_12 | |
sun | sdk | 1.3.1_13 | |
sun | sdk | 1.3.1_14 | |
sun | sdk | 1.3.1_15 | |
sun | sdk | 1.3.1_16 | |
sun | sdk | 1.3.1_17 | |
sun | sdk | 1.3.1_18 | |
sun | sdk | 1.3.1_19 | |
sun | sdk | 1.3.1_20 | |
sun | sdk | 1.3.1_21 | |
sun | sdk | 1.3.1_22 | |
sun | sdk | 1.3.1_23 | |
sun | sdk | 1.3.1_24 | |
sun | sdk | 1.3.1_25 | |
microsoft | windows | * | |
sun | java_se | * | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jre | 1.4.2_01 | |
sun | jre | 1.4.2_1 | |
sun | jre | 1.4.2_2 | |
sun | jre | 1.4.2_02 | |
sun | jre | 1.4.2_03 | |
sun | jre | 1.4.2_3 | |
sun | jre | 1.4.2_4 | |
sun | jre | 1.4.2_04 | |
sun | jre | 1.4.2_05 | |
sun | jre | 1.4.2_5 | |
sun | jre | 1.4.2_06 | |
sun | jre | 1.4.2_6 | |
sun | jre | 1.4.2_7 | |
sun | jre | 1.4.2_07 | |
sun | jre | 1.4.2_8 | |
sun | jre | 1.4.2_08 | |
sun | jre | 1.4.2_09 | |
sun | jre | 1.4.2_9 | |
sun | jre | 1.4.2_10 | |
sun | jre | 1.4.2_11 | |
sun | jre | 1.4.2_12 | |
sun | jre | 1.4.2_13 | |
sun | jre | 1.4.2_14 | |
sun | jre | 1.4.2_15 | |
sun | jre | 1.4.2_16 | |
sun | jre | 1.4.2_17 | |
sun | jre | 1.4.2_18 | |
sun | jre | 1.4.2_19 | |
sun | jre | 1.4.2_20 | |
sun | jre | 1.4.2_21 | |
sun | jre | 1.4.2_22 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | sdk | 1.4.2_1 | |
sun | sdk | 1.4.2_2 | |
sun | sdk | 1.4.2_02 | |
sun | sdk | 1.4.2_03 | |
sun | sdk | 1.4.2_3 | |
sun | sdk | 1.4.2_04 | |
sun | sdk | 1.4.2_4 | |
sun | sdk | 1.4.2_5 | |
sun | sdk | 1.4.2_05 | |
sun | sdk | 1.4.2_6 | |
sun | sdk | 1.4.2_06 | |
sun | sdk | 1.4.2_07 | |
sun | sdk | 1.4.2_7 | |
sun | sdk | 1.4.2_8 | |
sun | sdk | 1.4.2_08 | |
sun | sdk | 1.4.2_09 | |
sun | sdk | 1.4.2_9 | |
sun | sdk | 1.4.2_10 | |
sun | sdk | 1.4.2_11 | |
sun | sdk | 1.4.2_12 | |
sun | sdk | 1.4.2_13 | |
sun | sdk | 1.4.2_14 | |
sun | sdk | 1.4.2_15 | |
sun | sdk | 1.4.2_16 | |
sun | sdk | 1.4.2_17 | |
sun | sdk | 1.4.2_18 | |
sun | sdk | 1.4.2_19 | |
sun | sdk | 1.4.2_20 | |
sun | sdk | 1.4.2_21 | |
sun | sdk | 1.4.2_22 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_1:*:*:*:*:*:*", "matchCriteriaId": "8198F493-0447-4A87-9F16-5B6CB3572E38", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_10:*:*:*:*:*:*", "matchCriteriaId": "645BBE6D-BA5E-4D93-9152-759A2355013E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_11:*:*:*:*:*:*", "matchCriteriaId": "0EE694C9-940A-4899-844C-AC63412FA295", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_12:*:*:*:*:*:*", "matchCriteriaId": "BC9476DD-9B56-4811-A248-711C25181F29", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_13:*:*:*:*:*:*", "matchCriteriaId": "68D34082-2948-4D95-B43F-FBD59E2F3D28", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_14:*:*:*:*:*:*", "matchCriteriaId": "F2E01C07-4921-47CC-9AFC-D3B461D0B78D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_15:*:*:*:*:*:*", "matchCriteriaId": "7532E7D4-2F62-4DA0-B905-F95A0A735CE5", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_16:*:*:*:*:*:*", "matchCriteriaId": "0AF93193-889E-4F44-ADEB-E89E56DE6C7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_17:*:*:*:*:*:*", "matchCriteriaId": "68C19440-4172-4539-8E38-09DBCB1752E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_18:*:*:*:*:*:*", "matchCriteriaId": "3CC000EC-9717-47DA-B182-6C8CD3970F27", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_19:*:*:*:*:*:*", "matchCriteriaId": "115083C5-811F-47BA-8549-3BDFF9CA0740", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_2:*:*:*:*:*:*", "matchCriteriaId": "51337B8C-78F2-4207-998E-A3FC591F538B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_20:*:*:*:*:*:*", "matchCriteriaId": "48193108-CD9F-476E-A7D2-E0796F659BA5", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_21:*:*:*:*:*:*", "matchCriteriaId": "A0A80299-783A-4FBA-9EBF-5913942949A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_3:*:*:*:*:*:*", "matchCriteriaId": "76A4F852-0240-44D6-9BD5-FE79DEF16438", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_4:*:*:*:*:*:*", "matchCriteriaId": "F57E5943-5CC3-4736-85E8-FE7CC4F38735", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_5:*:*:*:*:*:*", "matchCriteriaId": "3C228E00-0F5C-41D2-8BD0-46AF682AE842", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_6:*:*:*:*:*:*", "matchCriteriaId": "0329E813-B2C8-4C84-BCAF-2D54C4AE0472", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_7:*:*:*:*:*:*", "matchCriteriaId": "7E3C40E1-7005-4F83-B347-177BEC9EE339", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_8:*:*:*:*:*:*", "matchCriteriaId": "6855E3F5-6F8E-44FA-A913-0D0F6A803DFF", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_9:*:*:*:*:*:*", "matchCriteriaId": "C79BDB6E-442B-41F1-A025-C17648A81FD9", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_1:*:*:*:*:*:*", "matchCriteriaId": "EBB09CE1-F4AC-472C-8D5D-594AEB322CFD", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_10:*:*:*:*:*:*", "matchCriteriaId": "722A93D8-B5BC-42F3-92A2-E424F61269A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_11:*:*:*:*:*:*", "matchCriteriaId": "775F2611-F11C-4B84-8F40-0D034B81BF18", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_12:*:*:*:*:*:*", "matchCriteriaId": "F20FDD9F-FF45-48BC-9207-54FB02E76071", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_13:*:*:*:*:*:*", "matchCriteriaId": "9FA326F5-894A-4B01-BCA3-B126DA81CA59", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_14:*:*:*:*:*:*", "matchCriteriaId": "228AB7B4-4BA4-43D4-B562-D438884DB152", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_15:*:*:*:*:*:*", "matchCriteriaId": "AFD5C688-2103-4D60-979E-D9BE69A989C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_16:*:*:*:*:*:*", "matchCriteriaId": "21421215-F722-4207-A2E5-E2DF4B29859B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_3:*:*:*:*:*:*", "matchCriteriaId": "D98175BF-B084-4FA5-899D-9E80DC3923EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_4:*:*:*:*:*:*", "matchCriteriaId": "820632CE-F8DF-47EE-B716-7530E60008B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_5:*:*:*:*:*:*", "matchCriteriaId": "FA2BD0A3-7B2D-447B-ABAC-7B867B03B632", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_6:*:*:*:*:*:*", "matchCriteriaId": "D54AB785-E9B7-47BD-B756-0C3A629D67DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_7:*:*:*:*:*:*", "matchCriteriaId": "E9412098-0353-4F7B-9245-010557E6C651", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_8:*:*:*:*:*:*", "matchCriteriaId": "FB0E9224-3D12-47E2-8E69-7B682284CDDD", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_9:*:*:*:*:*:*", "matchCriteriaId": "77BCD102-59A4-45A6-ADEF-CAB7F70E2377", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_1:*:*:*:*:*:*", "matchCriteriaId": "14E6127E-A40D-437D-B57B-0D7F57D08559", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_11:*:*:*:*:*:*", "matchCriteriaId": "28AE4411-45D1-4978-BA61-334AD04FF8FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_12:*:*:*:*:*:*", "matchCriteriaId": "479EB097-495A-4730-AF51-F2C0064EBA6E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_13:*:*:*:*:*:*", "matchCriteriaId": "9B3E7C12-8D97-42CC-9B2B-A0AE3267DE69", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_14:*:*:*:*:*:*", "matchCriteriaId": "5024BE9F-CE32-4099-A646-F3EC5DB6F63C", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_15:*:*:*:*:*:*", "matchCriteriaId": "DA9FB72A-C55F-4878-89D5-375FDA08163B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_16:*:*:*:*:*:*", "matchCriteriaId": "1CBC2A9C-9F21-4509-BA72-28B5DB16E55D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_17:*:*:*:*:*:*", "matchCriteriaId": "485F5ED3-062D-4A8E-AA34-9DC95D0D9646", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_18:*:*:*:*:*:*", "matchCriteriaId": "124364C5-0616-4C7A-A78F-08FABAA785CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_19:*:*:*:*:*:*", "matchCriteriaId": "A6BFFF1E-20D6-4508-9842-E7AB35F12B1D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_2:*:*:*:*:*:*", "matchCriteriaId": "DB7307A5-6F20-44FD-9D09-8FB76E444500", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_20:*:*:*:*:*:*", "matchCriteriaId": "2E7F3992-0C15-4371-BE14-0D2046B3976E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_21:*:*:*:*:*:*", "matchCriteriaId": "C5759CBC-D910-407D-83DF-A77FBDC8555D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_3:*:*:*:*:*:*", "matchCriteriaId": "0E45DE8A-477B-4BF7-893B-D11DDEE82E82", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_4:*:*:*:*:*:*", "matchCriteriaId": "D107CE0B-2EF2-4CF0-869E-3E27CBCA4997", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_5:*:*:*:*:*:*", "matchCriteriaId": "81DABB45-F39C-4BF4-8F2B-0CEE60A44C00", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_6:*:*:*:*:*:*", "matchCriteriaId": "CDDBD68A-771C-44FD-96A3-3AE189DE2591", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_7:*:*:*:*:*:*", "matchCriteriaId": "8FBD21F3-AC92-4154-948E-509FB8E097F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_8:*:*:*:*:*:*", "matchCriteriaId": "D91F9E0C-0A76-4DBC-A4E5-74E6682A5765", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_9:*:*:*:*:*:*", "matchCriteriaId": "86F7EF21-5395-4F1F-A15D-A1C7EDBFAB2A", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:*", "matchCriteriaId": "09027C19-D442-446F-B7A8-21DB6787CF43", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_10:*:*:*:*:*:*", "matchCriteriaId": "0A0FEC28-0707-4F42-9740-78F3D2D551EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_11:*:*:*:*:*:*", "matchCriteriaId": "C3C5879A-A608-4230-9DC1-C27F0F48A13B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_12:*:*:*:*:*:*", "matchCriteriaId": "0C71089A-BDDE-41FC-9DF9-9AEF4C2374DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_13:*:*:*:*:*:*", "matchCriteriaId": "2DBB6B73-8D6B-41FF-BEE0-E0C7F5F1EB41", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_14:*:*:*:*:*:*", "matchCriteriaId": "12A3B254-8580-45DB-BDE4-5B5A29CBFFB3", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_15:*:*:*:*:*:*", "matchCriteriaId": "1DB1DE6A-66AE-499B-AD92-9E6ACE474C6D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_16:*:*:*:*:*:*", "matchCriteriaId": "AADBB4F9-E43E-428B-9979-F47A15696C85", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_2:*:*:*:*:*:*", "matchCriteriaId": "7158D2C0-E9AC-4CD6-B777-EA7B7A181997", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_3:*:*:*:*:*:*", "matchCriteriaId": "90EC6C13-4B37-48E5-8199-A702A944D5A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_4:*:*:*:*:*:*", "matchCriteriaId": "2528152C-E20A-4D97-931C-A5EC3CEAA06D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_5:*:*:*:*:*:*", "matchCriteriaId": "A99DAB4C-272B-4C91-BC70-7729E1152590", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_6:*:*:*:*:*:*", "matchCriteriaId": "30DFC10A-A4D9-4F89-B17C-AB9260087D29", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_7:*:*:*:*:*:*", "matchCriteriaId": "272A5C44-18EC-41A9-8233-E9D4D0734EA6", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_8:*:*:*:*:*:*", "matchCriteriaId": "3DA21490-E253-4BDC-9BA8-5D068BE35189", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_9:*:*:*:*:*:*", "matchCriteriaId": "81C2C04D-D4BA-4C87-9609-C53AA63BFF19", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sun:jre:1.4.2_1:*:*:*:*:*:*:*", "matchCriteriaId": "1EEAB662-644A-4D7B-8237-64142CF48724", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_2:*:*:*:*:*:*:*", "matchCriteriaId": "D9598A49-95F2-42DB-B92C-CD026F739B83", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_02:*:*:*:*:*:*:*", "matchCriteriaId": "DB48B161-C239-4BB5-8667-7ACA5A5437F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_03:*:*:*:*:*:*:*", "matchCriteriaId": "83629616-1814-4858-B09F-79BEA82D6F55", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_3:*:*:*:*:*:*:*", "matchCriteriaId": "BED1009E-AE60-43A0-A0F5-38526EFCF423", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_4:*:*:*:*:*:*:*", "matchCriteriaId": "D011585C-0E62-4233-85FA-F29A07D68DA7", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_04:*:*:*:*:*:*:*", "matchCriteriaId": "03E8F351-F900-436E-A726-55AE31FBF832", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_05:*:*:*:*:*:*:*", "matchCriteriaId": "F76B79C6-ADD0-4992-A4BD-423A0AD38714", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_5:*:*:*:*:*:*:*", "matchCriteriaId": "F226D898-F0E8-41D8-BF40-54DE9FB5426D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_06:*:*:*:*:*:*:*", "matchCriteriaId": "FBFD41B5-6E33-4B00-81E8-9D91B0A03BD8", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_6:*:*:*:*:*:*:*", "matchCriteriaId": "4CB9CCD1-A67D-4800-9EC5-6E1A0B0B76E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_7:*:*:*:*:*:*:*", "matchCriteriaId": "CE28C283-447A-4F83-B96B-69F96E663C1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_07:*:*:*:*:*:*:*", "matchCriteriaId": "685D3F7F-30B9-4EB8-90FC-66A2A067A510", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_8:*:*:*:*:*:*:*", "matchCriteriaId": "D102063B-2434-4141-98E7-2DE501AE1728", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_08:*:*:*:*:*:*:*", "matchCriteriaId": "722B704B-A422-4163-AD48-F30CA4A07002", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_09:*:*:*:*:*:*:*", "matchCriteriaId": "C05784DC-626B-4D8D-A4DF-A42AC87131DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_9:*:*:*:*:*:*:*", "matchCriteriaId": "03B8CD03-CD31-4F4D-BA90-59435578A4F9", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_10:*:*:*:*:*:*:*", "matchCriteriaId": "41A994BF-1F64-480A-8AA5-748DDD0AB68C", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_11:*:*:*:*:*:*:*", "matchCriteriaId": "88519F2D-AD06-4F05-BEDA-A09216F1B481", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_12:*:*:*:*:*:*:*", "matchCriteriaId": "AC728978-368D-4B36-B149-70473E92BD1B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_13:*:*:*:*:*:*:*", "matchCriteriaId": "FD5187B1-CB86-48E8-A595-9FCFD9822C0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_14:*:*:*:*:*:*:*", "matchCriteriaId": "6C660DE4-543A-4E9B-825D-CD099D08CBD8", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_15:*:*:*:*:*:*:*", "matchCriteriaId": "98C1942E-16C0-4EB2-AB57-43EC6EC9C3A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_16:*:*:*:*:*:*:*", "matchCriteriaId": "318719C9-7B01-4021-B2EF-8341254DFE6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_17:*:*:*:*:*:*:*", "matchCriteriaId": "DB8FA9BA-51CA-4473-9FE1-9A32FB8C8041", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_18:*:*:*:*:*:*:*", "matchCriteriaId": "CC5E64B6-77DA-44BC-B646-AE01041B1830", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_19:*:*:*:*:*:*:*", "matchCriteriaId": "2DA35E80-9E0E-4A26-B631-A61542BE4739", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_20:*:*:*:*:*:*:*", "matchCriteriaId": "7EEB5367-1BB8-4ED3-8C04-ABA6BAA5AD10", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_21:*:*:*:*:*:*:*", "matchCriteriaId": "BED9E7C8-0418-4733-A496-61CCFD638859", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_22:*:*:*:*:*:*:*", "matchCriteriaId": "6566CE32-E042-424A-893B-C8A9E26E2869", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_01:*:*:*:*:*:*:*", "matchCriteriaId": "E6C4CA79-9D0A-4E47-A1A4-9CBEDDCFE05E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_1:*:*:*:*:*:*:*", "matchCriteriaId": "6F6453C9-7EE0-4FFB-861D-C2D9416DCABA", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_2:*:*:*:*:*:*:*", "matchCriteriaId": "89BF16DE-EEAB-4DA5-BFF1-7A0A58DE141F", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_02:*:*:*:*:*:*:*", "matchCriteriaId": "AF4E34FD-D927-42BB-8A16-031D77CB4B9E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_03:*:*:*:*:*:*:*", "matchCriteriaId": "37A3D49A-BE20-47BF-A85F-122357BAB098", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_3:*:*:*:*:*:*:*", "matchCriteriaId": "6DDE253E-C8B6-4C1D-AECE-ABEA1A67306B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_04:*:*:*:*:*:*:*", "matchCriteriaId": "F45DB5D3-7F35-4531-9A82-24EB50034787", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_4:*:*:*:*:*:*:*", "matchCriteriaId": "A56D9A60-F272-4D4C-A9DD-C93DAF783585", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_5:*:*:*:*:*:*:*", "matchCriteriaId": "EF109CAA-E8D2-4BD7-BE7C-AF8B2A78672E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_05:*:*:*:*:*:*:*", "matchCriteriaId": "4695F707-12E8-4BA4-BBE1-C21CB7213A2A", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_6:*:*:*:*:*:*:*", "matchCriteriaId": "976F4ACB-3725-45B7-B2EF-DEE4B88254E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_06:*:*:*:*:*:*:*", "matchCriteriaId": "C918FB49-DA13-4326-BE86-6F6BEA4CE4E1", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_07:*:*:*:*:*:*:*", "matchCriteriaId": "5573CAD1-39D1-4ADB-BB95-EBB554B43B4E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_7:*:*:*:*:*:*:*", "matchCriteriaId": "52BDD6A8-1611-4C3C-865D-6EDB5B9F8D88", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_8:*:*:*:*:*:*:*", "matchCriteriaId": "6A1F28FF-652A-4C89-9AC6-5E212F890811", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_08:*:*:*:*:*:*:*", "matchCriteriaId": "DD02EBDF-6E51-4538-9EDD-B1DE914D09C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_09:*:*:*:*:*:*:*", "matchCriteriaId": "53C3C0E3-5F40-412B-A4AD-A7A291DE2A08", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_9:*:*:*:*:*:*:*", "matchCriteriaId": "96A8C351-E9CD-431B-8B9D-712CA54C7213", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_10:*:*:*:*:*:*:*", "matchCriteriaId": "36888382-79C8-4C97-A654-C668CD68556F", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_11:*:*:*:*:*:*:*", "matchCriteriaId": "F34C99E6-F9F0-4EF3-8601-B47EAE3D7273", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_12:*:*:*:*:*:*:*", "matchCriteriaId": "A74DD08D-CEDB-460E-BED5-78F6CAF18BF5", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_13:*:*:*:*:*:*:*", "matchCriteriaId": "E60560EC-6DBD-4A17-BFFA-FAD9193A0BC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_14:*:*:*:*:*:*:*", "matchCriteriaId": "E4F64FBC-DC97-4FE3-A235-18B87945AF7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_15:*:*:*:*:*:*:*", "matchCriteriaId": "85048406-9051-4E69-94A8-5C449F3B89E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_16:*:*:*:*:*:*:*", "matchCriteriaId": "B1C88DD7-0B46-4405-BD35-60D27E2DBA14", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_17:*:*:*:*:*:*:*", "matchCriteriaId": "08D23B7C-7B8C-41B8-8D94-BB0F27C7F0A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_18:*:*:*:*:*:*:*", "matchCriteriaId": "1C49B997-95D3-4DA4-A353-DB41AD461C5E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_19:*:*:*:*:*:*:*", "matchCriteriaId": "6F70EF76-ED5F-4835-8252-FE613604FA3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_20:*:*:*:*:*:*:*", "matchCriteriaId": "6BDBCAD8-CDF7-4550-8EA2-1409B02FFAD6", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_21:*:*:*:*:*:*:*", "matchCriteriaId": "7E691333-0434-4808-9ED4-E82C6EC2FD37", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_22:*:*:*:*:*:*:*", "matchCriteriaId": "BBE7A538-FF2E-4622-8479-781AB73CBA45", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:sun:solaris:*:*:*:*:*:*:*:*", "matchCriteriaId": "469B74F2-4B89-42B8-8638-731E92D463B9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sun:jre:1.3.1_1:*:*:*:*:*:*:*", "matchCriteriaId": "EA460D9A-662F-4861-9835-3D3116FB9488", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_01:*:*:*:*:*:*:*", "matchCriteriaId": "7E49A68E-0886-4AED-8FF4-9455914BFE16", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_01a:*:*:*:*:*:*:*", "matchCriteriaId": "E94B0A27-60D3-42F5-9DF6-75F481C2460D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_02:*:*:*:*:*:*:*", "matchCriteriaId": "89E95205-DB64-44AD-81A4-B77BD7595AAF", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_2:*:*:*:*:*:*:*", "matchCriteriaId": "0875E34D-8544-49B9-BAD9-8191CC103A07", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_03:*:*:*:*:*:*:*", "matchCriteriaId": "62E772B9-8E41-476F-81F5-87B41F1827A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_3:*:*:*:*:*:*:*", "matchCriteriaId": "B9643B49-FC4B-4AD4-90AC-939DDAA96518", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_4:*:*:*:*:*:*:*", "matchCriteriaId": "F76773E5-0A91-49B8-8C9C-DD64AB9F74BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_04:*:*:*:*:*:*:*", "matchCriteriaId": "7CE78463-2CE8-43C6-BB06-AA40C72B1A4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_05:*:*:*:*:*:*:*", "matchCriteriaId": "31A04480-92DF-49AD-9B36-7F1FCB29DE90", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_5:*:*:*:*:*:*:*", "matchCriteriaId": "ADF93A34-0535-4289-B12C-A1E1E22C13D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_06:*:*:*:*:*:*:*", "matchCriteriaId": "E2FD0B72-683D-4FF6-BCF5-5DE85BF3064B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_6:*:*:*:*:*:*:*", "matchCriteriaId": "EC85B851-FEC7-4299-9EC5-D8A69E16B89C", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_07:*:*:*:*:*:*:*", "matchCriteriaId": "F78CD4B5-4B1D-4128-8AEA-2F967C38C6C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_7:*:*:*:*:*:*:*", "matchCriteriaId": "1B4E5018-6A0B-4F26-96AA-AD8F6EA7FB3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_8:*:*:*:*:*:*:*", "matchCriteriaId": "2978CF34-D48B-4ED2-A0C1-3CFAA5867223", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_08:*:*:*:*:*:*:*", "matchCriteriaId": "62CAA3E7-9D65-48F3-ACF7-9D705D94DE54", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_9:*:*:*:*:*:*:*", "matchCriteriaId": "2C0E6EA5-0D9F-4B15-860A-5DA3FD1765B8", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_09:*:*:*:*:*:*:*", "matchCriteriaId": "477C310B-50AD-4D40-8EDB-4A80F0BF321D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_10:*:*:*:*:*:*:*", "matchCriteriaId": "60A1F526-6B28-47A3-8D2C-06CA067E9164", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_11:*:*:*:*:*:*:*", "matchCriteriaId": "17F09D9E-B04B-477E-86E6-E1B1F9650973", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_12:*:*:*:*:*:*:*", "matchCriteriaId": "6F929C59-9602-4962-95B4-4165D66E5935", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_13:*:*:*:*:*:*:*", "matchCriteriaId": "E8B76949-9282-44D0-8075-74E482CE9A82", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_14:*:*:*:*:*:*:*", "matchCriteriaId": "B9B072DD-FC4F-4E07-9837-0E16017CA4AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_15:*:*:*:*:*:*:*", "matchCriteriaId": "969BE4EC-4D13-4B74-8137-FA0F83F0FDC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_16:*:*:*:*:*:*:*", "matchCriteriaId": "86408019-1B53-4AA8-9F05-47EBD0466EE2", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_17:*:*:*:*:*:*:*", "matchCriteriaId": "81F47561-F59C-4904-8E05-D8A9629405A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_18:*:*:*:*:*:*:*", "matchCriteriaId": "FB067445-8EA5-460F-B625-C21251E5A8D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_19:*:*:*:*:*:*:*", "matchCriteriaId": "B4C075BC-607E-47A1-A32D-B912D2FA03BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_20:*:*:*:*:*:*:*", "matchCriteriaId": "007175B8-48DB-46BE-B971-FB57B6A33723", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_21:*:*:*:*:*:*:*", "matchCriteriaId": "D5E6F92A-FC59-4CE7-B7F8-94CBF3DC8F21", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_22:*:*:*:*:*:*:*", "matchCriteriaId": "496901D5-014D-4920-A343-91A56F6FEFA0", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_23:*:*:*:*:*:*:*", "matchCriteriaId": "B2D18FBC-4C9B-4722-90AB-028D281654F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_24:*:*:*:*:*:*:*", "matchCriteriaId": "853BC114-592C-43FE-B227-EF41C494DC98", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_25:*:*:*:*:*:*:*", "matchCriteriaId": "B1F4E031-CE92-48C4-BECC-7C1190DB477A", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_01:*:*:*:*:*:*:*", "matchCriteriaId": "34710306-D6CF-4D07-84BF-71A8839BE416", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_01a:*:*:*:*:*:*:*", "matchCriteriaId": "44B93DC8-6375-4B41-B9BC-F22F592C56B9", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_2:*:*:*:*:*:*:*", "matchCriteriaId": "16AD9E9E-D6BD-4FCD-B857-F5013033200F", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_02:*:*:*:*:*:*:*", "matchCriteriaId": "87BF46A9-8E4A-4583-B35F-052FD481DF66", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_03:*:*:*:*:*:*:*", "matchCriteriaId": "32B351BB-6CA6-4CEF-9F5D-ED47774FC676", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_3:*:*:*:*:*:*:*", "matchCriteriaId": "21300F7C-6904-456C-949D-C0AFA630F4A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_4:*:*:*:*:*:*:*", "matchCriteriaId": "776FA44E-6277-4236-A872-103E7DDE5040", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_04:*:*:*:*:*:*:*", "matchCriteriaId": "CDA40FCD-1D34-4C47-908F-697433236153", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_5:*:*:*:*:*:*:*", "matchCriteriaId": "63267A02-DCE2-4B86-B370-B90F03C7E341", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_05:*:*:*:*:*:*:*", "matchCriteriaId": "00639A84-BD03-4BD9-A655-F806693DBC8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_6:*:*:*:*:*:*:*", "matchCriteriaId": "2E2AE42E-0E25-468F-A8CB-03991F356338", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_06:*:*:*:*:*:*:*", "matchCriteriaId": "14824B23-FF9F-4D6D-9D02-12B79BE346A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_7:*:*:*:*:*:*:*", "matchCriteriaId": "5E015A65-708E-45B9-B66A-2D0F09638FF5", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_07:*:*:*:*:*:*:*", "matchCriteriaId": "6493744C-A69D-4377-937E-85E7F5535EA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_8:*:*:*:*:*:*:*", "matchCriteriaId": "F86BA5FB-A611-458E-8E37-4D4927D04D89", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_08:*:*:*:*:*:*:*", "matchCriteriaId": "C09019B1-B873-41CE-951E-4777F324729C", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_9:*:*:*:*:*:*:*", "matchCriteriaId": "03949794-A1DD-420F-A468-8F00AEA7B69E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_09:*:*:*:*:*:*:*", "matchCriteriaId": "EC4209A0-E73F-4B5A-9925-B5D20F879455", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_10:*:*:*:*:*:*:*", "matchCriteriaId": "297DF5AD-FC22-432B-AE6A-2B1E6CFE1BE4", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_11:*:*:*:*:*:*:*", "matchCriteriaId": "BFB8516D-03C4-478D-AFE2-824867FDC739", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_12:*:*:*:*:*:*:*", "matchCriteriaId": "F82AED17-FEC3-47D0-A395-26ACD07FBE52", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_13:*:*:*:*:*:*:*", "matchCriteriaId": "9630BC7B-9039-4FA6-86F8-5274783F3EB1", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_14:*:*:*:*:*:*:*", "matchCriteriaId": "F1A6A15C-216A-42B1-84EF-B3D9A313D4A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_15:*:*:*:*:*:*:*", "matchCriteriaId": "EC39C819-9439-4029-8377-F6D58B3DFDFB", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_16:*:*:*:*:*:*:*", "matchCriteriaId": "A053DEF6-1317-4DA8-91D7-E1970DA62351", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_17:*:*:*:*:*:*:*", "matchCriteriaId": "F0DBFDD8-40AE-44F2-8F02-FB7A4FAE5235", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_18:*:*:*:*:*:*:*", "matchCriteriaId": "EB0605FF-3DDC-4F3A-8171-F3A447E9C292", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_19:*:*:*:*:*:*:*", "matchCriteriaId": "801FF3B4-0729-4710-BFC2-4B078029944F", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_20:*:*:*:*:*:*:*", "matchCriteriaId": "8EB8591E-3D6E-489B-B0D6-CEBB9D09EA68", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_21:*:*:*:*:*:*:*", "matchCriteriaId": "8A411676-6666-4B54-A008-443B9B42F670", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_22:*:*:*:*:*:*:*", "matchCriteriaId": "0AEDC9B2-8AA6-4DA2-A187-49A1DD106725", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_23:*:*:*:*:*:*:*", "matchCriteriaId": "8F69BEE4-CB4B-436A-9838-13239B368CF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_24:*:*:*:*:*:*:*", "matchCriteriaId": "11AC1050-38AF-49F4-A40C-AAF9710204AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_25:*:*:*:*:*:*:*", "matchCriteriaId": "8FA939E8-8747-4532-B6B4-6E83824C7067", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sun:java_se:*:*:business:*:*:*:*:*", "matchCriteriaId": "CB9A3291-3F2C-40E9-81D3-D148002E1782", "vulnerable": false } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_1:*:*:*:*:*:*", "matchCriteriaId": "8198F493-0447-4A87-9F16-5B6CB3572E38", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_10:*:*:*:*:*:*", "matchCriteriaId": "645BBE6D-BA5E-4D93-9152-759A2355013E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_11:*:*:*:*:*:*", "matchCriteriaId": "0EE694C9-940A-4899-844C-AC63412FA295", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_12:*:*:*:*:*:*", "matchCriteriaId": "BC9476DD-9B56-4811-A248-711C25181F29", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_13:*:*:*:*:*:*", "matchCriteriaId": "68D34082-2948-4D95-B43F-FBD59E2F3D28", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_14:*:*:*:*:*:*", "matchCriteriaId": "F2E01C07-4921-47CC-9AFC-D3B461D0B78D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_15:*:*:*:*:*:*", "matchCriteriaId": "7532E7D4-2F62-4DA0-B905-F95A0A735CE5", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_16:*:*:*:*:*:*", "matchCriteriaId": "0AF93193-889E-4F44-ADEB-E89E56DE6C7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_17:*:*:*:*:*:*", "matchCriteriaId": "68C19440-4172-4539-8E38-09DBCB1752E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_18:*:*:*:*:*:*", "matchCriteriaId": "3CC000EC-9717-47DA-B182-6C8CD3970F27", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_19:*:*:*:*:*:*", "matchCriteriaId": "115083C5-811F-47BA-8549-3BDFF9CA0740", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_2:*:*:*:*:*:*", "matchCriteriaId": "51337B8C-78F2-4207-998E-A3FC591F538B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_20:*:*:*:*:*:*", "matchCriteriaId": "48193108-CD9F-476E-A7D2-E0796F659BA5", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_21:*:*:*:*:*:*", "matchCriteriaId": "A0A80299-783A-4FBA-9EBF-5913942949A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_3:*:*:*:*:*:*", "matchCriteriaId": "76A4F852-0240-44D6-9BD5-FE79DEF16438", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_4:*:*:*:*:*:*", "matchCriteriaId": "F57E5943-5CC3-4736-85E8-FE7CC4F38735", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_5:*:*:*:*:*:*", "matchCriteriaId": "3C228E00-0F5C-41D2-8BD0-46AF682AE842", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_6:*:*:*:*:*:*", "matchCriteriaId": "0329E813-B2C8-4C84-BCAF-2D54C4AE0472", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_7:*:*:*:*:*:*", "matchCriteriaId": "7E3C40E1-7005-4F83-B347-177BEC9EE339", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_8:*:*:*:*:*:*", "matchCriteriaId": "6855E3F5-6F8E-44FA-A913-0D0F6A803DFF", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_9:*:*:*:*:*:*", "matchCriteriaId": "C79BDB6E-442B-41F1-A025-C17648A81FD9", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_1:*:*:*:*:*:*", "matchCriteriaId": "EBB09CE1-F4AC-472C-8D5D-594AEB322CFD", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_10:*:*:*:*:*:*", "matchCriteriaId": "722A93D8-B5BC-42F3-92A2-E424F61269A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_11:*:*:*:*:*:*", "matchCriteriaId": "775F2611-F11C-4B84-8F40-0D034B81BF18", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_12:*:*:*:*:*:*", "matchCriteriaId": "F20FDD9F-FF45-48BC-9207-54FB02E76071", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_13:*:*:*:*:*:*", "matchCriteriaId": "9FA326F5-894A-4B01-BCA3-B126DA81CA59", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_14:*:*:*:*:*:*", "matchCriteriaId": "228AB7B4-4BA4-43D4-B562-D438884DB152", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_15:*:*:*:*:*:*", "matchCriteriaId": "AFD5C688-2103-4D60-979E-D9BE69A989C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_16:*:*:*:*:*:*", "matchCriteriaId": "21421215-F722-4207-A2E5-E2DF4B29859B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_3:*:*:*:*:*:*", "matchCriteriaId": "D98175BF-B084-4FA5-899D-9E80DC3923EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_4:*:*:*:*:*:*", "matchCriteriaId": "820632CE-F8DF-47EE-B716-7530E60008B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_5:*:*:*:*:*:*", "matchCriteriaId": "FA2BD0A3-7B2D-447B-ABAC-7B867B03B632", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_6:*:*:*:*:*:*", "matchCriteriaId": "D54AB785-E9B7-47BD-B756-0C3A629D67DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_7:*:*:*:*:*:*", "matchCriteriaId": "E9412098-0353-4F7B-9245-010557E6C651", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_8:*:*:*:*:*:*", "matchCriteriaId": "FB0E9224-3D12-47E2-8E69-7B682284CDDD", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_9:*:*:*:*:*:*", "matchCriteriaId": "77BCD102-59A4-45A6-ADEF-CAB7F70E2377", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update2:*:*:*:*:*:*", "matchCriteriaId": "B8F93BBE-1E8C-4EB3-BCC7-20AB2D813F98", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_01:*:*:*:*:*:*:*", "matchCriteriaId": "27A472AF-049D-4D63-841C-1EF737E8D64D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_1:*:*:*:*:*:*:*", "matchCriteriaId": "1EEAB662-644A-4D7B-8237-64142CF48724", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_2:*:*:*:*:*:*:*", "matchCriteriaId": "D9598A49-95F2-42DB-B92C-CD026F739B83", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_02:*:*:*:*:*:*:*", "matchCriteriaId": "DB48B161-C239-4BB5-8667-7ACA5A5437F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_03:*:*:*:*:*:*:*", "matchCriteriaId": "83629616-1814-4858-B09F-79BEA82D6F55", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_3:*:*:*:*:*:*:*", "matchCriteriaId": "BED1009E-AE60-43A0-A0F5-38526EFCF423", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_4:*:*:*:*:*:*:*", "matchCriteriaId": "D011585C-0E62-4233-85FA-F29A07D68DA7", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_04:*:*:*:*:*:*:*", "matchCriteriaId": "03E8F351-F900-436E-A726-55AE31FBF832", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_05:*:*:*:*:*:*:*", "matchCriteriaId": "F76B79C6-ADD0-4992-A4BD-423A0AD38714", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_5:*:*:*:*:*:*:*", "matchCriteriaId": "F226D898-F0E8-41D8-BF40-54DE9FB5426D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_06:*:*:*:*:*:*:*", "matchCriteriaId": "FBFD41B5-6E33-4B00-81E8-9D91B0A03BD8", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_6:*:*:*:*:*:*:*", "matchCriteriaId": "4CB9CCD1-A67D-4800-9EC5-6E1A0B0B76E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_7:*:*:*:*:*:*:*", "matchCriteriaId": "CE28C283-447A-4F83-B96B-69F96E663C1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_07:*:*:*:*:*:*:*", "matchCriteriaId": "685D3F7F-30B9-4EB8-90FC-66A2A067A510", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_8:*:*:*:*:*:*:*", "matchCriteriaId": "D102063B-2434-4141-98E7-2DE501AE1728", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_08:*:*:*:*:*:*:*", "matchCriteriaId": "722B704B-A422-4163-AD48-F30CA4A07002", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_09:*:*:*:*:*:*:*", "matchCriteriaId": "C05784DC-626B-4D8D-A4DF-A42AC87131DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_9:*:*:*:*:*:*:*", "matchCriteriaId": "03B8CD03-CD31-4F4D-BA90-59435578A4F9", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_10:*:*:*:*:*:*:*", "matchCriteriaId": "41A994BF-1F64-480A-8AA5-748DDD0AB68C", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_11:*:*:*:*:*:*:*", "matchCriteriaId": "88519F2D-AD06-4F05-BEDA-A09216F1B481", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_12:*:*:*:*:*:*:*", "matchCriteriaId": "AC728978-368D-4B36-B149-70473E92BD1B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_13:*:*:*:*:*:*:*", "matchCriteriaId": "FD5187B1-CB86-48E8-A595-9FCFD9822C0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_14:*:*:*:*:*:*:*", "matchCriteriaId": "6C660DE4-543A-4E9B-825D-CD099D08CBD8", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_15:*:*:*:*:*:*:*", "matchCriteriaId": "98C1942E-16C0-4EB2-AB57-43EC6EC9C3A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_16:*:*:*:*:*:*:*", "matchCriteriaId": "318719C9-7B01-4021-B2EF-8341254DFE6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_17:*:*:*:*:*:*:*", "matchCriteriaId": "DB8FA9BA-51CA-4473-9FE1-9A32FB8C8041", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_18:*:*:*:*:*:*:*", "matchCriteriaId": "CC5E64B6-77DA-44BC-B646-AE01041B1830", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_19:*:*:*:*:*:*:*", "matchCriteriaId": "2DA35E80-9E0E-4A26-B631-A61542BE4739", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_20:*:*:*:*:*:*:*", "matchCriteriaId": "7EEB5367-1BB8-4ED3-8C04-ABA6BAA5AD10", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_21:*:*:*:*:*:*:*", "matchCriteriaId": "BED9E7C8-0418-4733-A496-61CCFD638859", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_22:*:*:*:*:*:*:*", "matchCriteriaId": "6566CE32-E042-424A-893B-C8A9E26E2869", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_1:*:*:*:*:*:*", "matchCriteriaId": "14E6127E-A40D-437D-B57B-0D7F57D08559", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_11:*:*:*:*:*:*", "matchCriteriaId": "28AE4411-45D1-4978-BA61-334AD04FF8FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_12:*:*:*:*:*:*", "matchCriteriaId": "479EB097-495A-4730-AF51-F2C0064EBA6E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_13:*:*:*:*:*:*", "matchCriteriaId": "9B3E7C12-8D97-42CC-9B2B-A0AE3267DE69", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_14:*:*:*:*:*:*", "matchCriteriaId": "5024BE9F-CE32-4099-A646-F3EC5DB6F63C", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_15:*:*:*:*:*:*", "matchCriteriaId": "DA9FB72A-C55F-4878-89D5-375FDA08163B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_16:*:*:*:*:*:*", "matchCriteriaId": "1CBC2A9C-9F21-4509-BA72-28B5DB16E55D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_17:*:*:*:*:*:*", "matchCriteriaId": "485F5ED3-062D-4A8E-AA34-9DC95D0D9646", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_18:*:*:*:*:*:*", "matchCriteriaId": "124364C5-0616-4C7A-A78F-08FABAA785CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_19:*:*:*:*:*:*", "matchCriteriaId": "A6BFFF1E-20D6-4508-9842-E7AB35F12B1D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_2:*:*:*:*:*:*", "matchCriteriaId": "DB7307A5-6F20-44FD-9D09-8FB76E444500", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_20:*:*:*:*:*:*", "matchCriteriaId": "2E7F3992-0C15-4371-BE14-0D2046B3976E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_21:*:*:*:*:*:*", "matchCriteriaId": "C5759CBC-D910-407D-83DF-A77FBDC8555D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_3:*:*:*:*:*:*", "matchCriteriaId": "0E45DE8A-477B-4BF7-893B-D11DDEE82E82", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_4:*:*:*:*:*:*", "matchCriteriaId": "D107CE0B-2EF2-4CF0-869E-3E27CBCA4997", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_5:*:*:*:*:*:*", "matchCriteriaId": "81DABB45-F39C-4BF4-8F2B-0CEE60A44C00", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_6:*:*:*:*:*:*", "matchCriteriaId": "CDDBD68A-771C-44FD-96A3-3AE189DE2591", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_7:*:*:*:*:*:*", "matchCriteriaId": "8FBD21F3-AC92-4154-948E-509FB8E097F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_8:*:*:*:*:*:*", "matchCriteriaId": "D91F9E0C-0A76-4DBC-A4E5-74E6682A5765", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_9:*:*:*:*:*:*", "matchCriteriaId": "86F7EF21-5395-4F1F-A15D-A1C7EDBFAB2A", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:*", "matchCriteriaId": "09027C19-D442-446F-B7A8-21DB6787CF43", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_10:*:*:*:*:*:*", "matchCriteriaId": "0A0FEC28-0707-4F42-9740-78F3D2D551EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_11:*:*:*:*:*:*", "matchCriteriaId": "C3C5879A-A608-4230-9DC1-C27F0F48A13B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_12:*:*:*:*:*:*", "matchCriteriaId": "0C71089A-BDDE-41FC-9DF9-9AEF4C2374DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_13:*:*:*:*:*:*", "matchCriteriaId": "2DBB6B73-8D6B-41FF-BEE0-E0C7F5F1EB41", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_14:*:*:*:*:*:*", "matchCriteriaId": "12A3B254-8580-45DB-BDE4-5B5A29CBFFB3", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_15:*:*:*:*:*:*", "matchCriteriaId": "1DB1DE6A-66AE-499B-AD92-9E6ACE474C6D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_16:*:*:*:*:*:*", "matchCriteriaId": "AADBB4F9-E43E-428B-9979-F47A15696C85", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_2:*:*:*:*:*:*", "matchCriteriaId": "7158D2C0-E9AC-4CD6-B777-EA7B7A181997", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_3:*:*:*:*:*:*", "matchCriteriaId": "90EC6C13-4B37-48E5-8199-A702A944D5A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_4:*:*:*:*:*:*", "matchCriteriaId": "2528152C-E20A-4D97-931C-A5EC3CEAA06D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_5:*:*:*:*:*:*", "matchCriteriaId": "A99DAB4C-272B-4C91-BC70-7729E1152590", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_6:*:*:*:*:*:*", "matchCriteriaId": "30DFC10A-A4D9-4F89-B17C-AB9260087D29", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_7:*:*:*:*:*:*", "matchCriteriaId": "272A5C44-18EC-41A9-8233-E9D4D0734EA6", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_8:*:*:*:*:*:*", "matchCriteriaId": "3DA21490-E253-4BDC-9BA8-5D068BE35189", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_9:*:*:*:*:*:*", "matchCriteriaId": "81C2C04D-D4BA-4C87-9609-C53AA63BFF19", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_1:*:*:*:*:*:*:*", "matchCriteriaId": "6F6453C9-7EE0-4FFB-861D-C2D9416DCABA", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_2:*:*:*:*:*:*:*", "matchCriteriaId": "89BF16DE-EEAB-4DA5-BFF1-7A0A58DE141F", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_02:*:*:*:*:*:*:*", "matchCriteriaId": "AF4E34FD-D927-42BB-8A16-031D77CB4B9E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_03:*:*:*:*:*:*:*", "matchCriteriaId": "37A3D49A-BE20-47BF-A85F-122357BAB098", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_3:*:*:*:*:*:*:*", "matchCriteriaId": "6DDE253E-C8B6-4C1D-AECE-ABEA1A67306B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_04:*:*:*:*:*:*:*", "matchCriteriaId": "F45DB5D3-7F35-4531-9A82-24EB50034787", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_4:*:*:*:*:*:*:*", "matchCriteriaId": "A56D9A60-F272-4D4C-A9DD-C93DAF783585", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_5:*:*:*:*:*:*:*", "matchCriteriaId": "EF109CAA-E8D2-4BD7-BE7C-AF8B2A78672E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_05:*:*:*:*:*:*:*", "matchCriteriaId": "4695F707-12E8-4BA4-BBE1-C21CB7213A2A", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_6:*:*:*:*:*:*:*", "matchCriteriaId": "976F4ACB-3725-45B7-B2EF-DEE4B88254E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_06:*:*:*:*:*:*:*", "matchCriteriaId": "C918FB49-DA13-4326-BE86-6F6BEA4CE4E1", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_07:*:*:*:*:*:*:*", "matchCriteriaId": "5573CAD1-39D1-4ADB-BB95-EBB554B43B4E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_7:*:*:*:*:*:*:*", "matchCriteriaId": "52BDD6A8-1611-4C3C-865D-6EDB5B9F8D88", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_8:*:*:*:*:*:*:*", "matchCriteriaId": "6A1F28FF-652A-4C89-9AC6-5E212F890811", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_08:*:*:*:*:*:*:*", "matchCriteriaId": "DD02EBDF-6E51-4538-9EDD-B1DE914D09C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_09:*:*:*:*:*:*:*", "matchCriteriaId": "53C3C0E3-5F40-412B-A4AD-A7A291DE2A08", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_9:*:*:*:*:*:*:*", "matchCriteriaId": "96A8C351-E9CD-431B-8B9D-712CA54C7213", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_10:*:*:*:*:*:*:*", "matchCriteriaId": "36888382-79C8-4C97-A654-C668CD68556F", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_11:*:*:*:*:*:*:*", "matchCriteriaId": "F34C99E6-F9F0-4EF3-8601-B47EAE3D7273", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_12:*:*:*:*:*:*:*", "matchCriteriaId": "A74DD08D-CEDB-460E-BED5-78F6CAF18BF5", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_13:*:*:*:*:*:*:*", "matchCriteriaId": "E60560EC-6DBD-4A17-BFFA-FAD9193A0BC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_14:*:*:*:*:*:*:*", "matchCriteriaId": "E4F64FBC-DC97-4FE3-A235-18B87945AF7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_15:*:*:*:*:*:*:*", "matchCriteriaId": "85048406-9051-4E69-94A8-5C449F3B89E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_16:*:*:*:*:*:*:*", "matchCriteriaId": "B1C88DD7-0B46-4405-BD35-60D27E2DBA14", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_17:*:*:*:*:*:*:*", "matchCriteriaId": "08D23B7C-7B8C-41B8-8D94-BB0F27C7F0A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_18:*:*:*:*:*:*:*", "matchCriteriaId": "1C49B997-95D3-4DA4-A353-DB41AD461C5E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_19:*:*:*:*:*:*:*", "matchCriteriaId": "6F70EF76-ED5F-4835-8252-FE613604FA3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_20:*:*:*:*:*:*:*", "matchCriteriaId": "6BDBCAD8-CDF7-4550-8EA2-1409B02FFAD6", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_21:*:*:*:*:*:*:*", "matchCriteriaId": "7E691333-0434-4808-9ED4-E82C6EC2FD37", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_22:*:*:*:*:*:*:*", "matchCriteriaId": "BBE7A538-FF2E-4622-8479-781AB73CBA45", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in the setDiffICM function in the Abstract Window Toolkit (AWT) in Java Runtime Environment (JRE) in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to execute arbitrary code via a crafted argument, aka Bug Id 6872357." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer basado en pila en la funci\u00f3n setDiffICM en Abstract Window Toolkit (AWT) en Java Runtime Environment (JRE) en Sun Java SE en JDK y JRE v5.0 anteriores a Update 22, JDK y JRE 6 anteriores a Update 17, SDK y JRE v1.3.x anteriores a v1.3.1_27, y SDK y JRE v1.4.x anteriores a v1.4.2_24 permite a los atacantes remotos ejecutar arbitrariamente c\u00f3digo a trav\u00e9s de argumentos manipulados, tambi\u00e9n conocido como Id 6872357." } ], "id": "CVE-2009-3869", "lastModified": "2024-11-21T01:08:22.913", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2009-11-05T16:30:00.390", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://java.sun.com/javase/6/webnotes/6u17.html" }, { "source": "cve@mitre.org", "url": "http://lists.apple.com/archives/security-announce/2009/Dec/msg00000.html" }, { "source": "cve@mitre.org", "url": "http://lists.apple.com/archives/security-announce/2009/Dec/msg00001.html" }, { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00010.html" }, { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=126566824131534\u0026w=2" }, { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=126566824131534\u0026w=2" }, { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=131593453929393\u0026w=2" }, { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=131593453929393\u0026w=2" }, { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=134254866602253\u0026w=2" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/37231" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/37239" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/37386" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/37581" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/37841" }, { "source": "cve@mitre.org", "url": "http://security.gentoo.org/glsa/glsa-200911-02.xml" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1023132" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-270474-1" }, { "source": "cve@mitre.org", "url": "http://support.apple.com/kb/HT3969" }, { "source": "cve@mitre.org", "url": "http://support.apple.com/kb/HT3970" }, { "source": "cve@mitre.org", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:084" }, { "source": "cve@mitre.org", "url": "http://www.oracle.com/technetwork/topics/security/cpujan2010-084891.html" }, { "source": "cve@mitre.org", "url": "http://www.redhat.com/support/errata/RHSA-2009-1694.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/36881" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2009/3131" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://zerodayinitiative.com/advisories/ZDI-09-078/" }, { "source": "cve@mitre.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10741" }, { "source": "cve@mitre.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11262" }, { "source": "cve@mitre.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7400" }, { "source": "cve@mitre.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8566" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://java.sun.com/javase/6/webnotes/6u17.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.apple.com/archives/security-announce/2009/Dec/msg00000.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.apple.com/archives/security-announce/2009/Dec/msg00001.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00010.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=126566824131534\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=126566824131534\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=131593453929393\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=131593453929393\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=134254866602253\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/37231" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/37239" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/37386" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/37581" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/37841" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-200911-02.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1023132" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-270474-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://support.apple.com/kb/HT3969" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://support.apple.com/kb/HT3970" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:084" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.oracle.com/technetwork/topics/security/cpujan2010-084891.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2009-1694.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/36881" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2009/3131" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://zerodayinitiative.com/advisories/ZDI-09-078/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10741" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11262" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7400" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8566" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2009-08-10 20:30
Modified
2024-11-21 01:05
Severity ?
Summary
Multiple unspecified vulnerabilities in the Provider class in Sun Java SE 5.0 before Update 20 have unknown impact and attack vectors, aka BugId 6406003.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sun:java_se:*:19:*:*:*:*:*:*", "matchCriteriaId": "DC8CDBBF-43EC-4FC0-BD17-C54BEB14F547", "versionEndIncluding": "5.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple unspecified vulnerabilities in the Provider class in Sun Java SE 5.0 before Update 20 have unknown impact and attack vectors, aka BugId 6406003." }, { "lang": "es", "value": "M\u00faltiples vulnerabilidades no especificadas en la clase \"Provider\" en Sun Java SE v5.0 anteriores a Update 20 tienen un impacto y vectores de ataque desconocidos, tambi\u00e9n conocido como BugId 6406003." } ], "id": "CVE-2009-2721", "lastModified": "2024-11-21T01:05:35.910", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2009-08-10T20:30:00.640", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://java.sun.com/j2se/1.5.0/ReleaseNotes.html" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/37386" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/37460" }, { "source": "cve@mitre.org", "url": "http://security.gentoo.org/glsa/glsa-200911-02.xml" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-118667-22-1" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2009/3316" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://java.sun.com/j2se/1.5.0/ReleaseNotes.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/37386" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/37460" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-200911-02.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-118667-22-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2009/3316" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2009-08-10 20:30
Modified
2024-11-21 01:05
Severity ?
Summary
Unspecified vulnerability in deserialization in the Provider class in Sun Java SE 5.0 before Update 20 has unknown impact and attack vectors, aka BugId 6444262.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sun:java_se:*:19:*:*:*:*:*:*", "matchCriteriaId": "DC8CDBBF-43EC-4FC0-BD17-C54BEB14F547", "versionEndIncluding": "5.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in deserialization in the Provider class in Sun Java SE 5.0 before Update 20 has unknown impact and attack vectors, aka BugId 6444262." }, { "lang": "es", "value": "Vulnerabilidad sin especificar en la deserializaci\u00f3n en la clase Provider en Sun Java SE v5.0 anterior a la actualizaci\u00f3n 20, tiene un impacto y vectores de ataque desconocidos, tambi\u00e9n conocido como BufId 6444262" } ], "id": "CVE-2009-2723", "lastModified": "2024-11-21T01:05:36.260", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2009-08-10T20:30:00.687", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://java.sun.com/j2se/1.5.0/ReleaseNotes.html" }, { "source": "cve@mitre.org", "url": "http://lists.apple.com/archives/security-announce/2009/Sep/msg00000.html" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/37386" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/37460" }, { "source": "cve@mitre.org", "url": "http://security.gentoo.org/glsa/glsa-200911-02.xml" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-118667-22-1" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2009/2543" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2009/3316" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://java.sun.com/j2se/1.5.0/ReleaseNotes.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.apple.com/archives/security-announce/2009/Sep/msg00000.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/37386" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/37460" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-200911-02.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-118667-22-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2009/2543" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2009/3316" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2009-08-10 20:30
Modified
2024-11-21 01:05
Severity ?
Summary
The Java Web Start implementation in Sun Java SE 6 before Update 15 allows context-dependent attackers to cause a denial of service (NullPointerException) via a crafted .jnlp file, as demonstrated by the jnlp_file/appletDesc/index.html#misc test in the Technology Compatibility Kit (TCK) for the Java Network Launching Protocol (JNLP).
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sun:java_se:*:14:*:*:*:*:*:*", "matchCriteriaId": "EB9DE8D5-D4F6-45DE-9DB4-9E5BB7E518F9", "versionEndIncluding": "6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Java Web Start implementation in Sun Java SE 6 before Update 15 allows context-dependent attackers to cause a denial of service (NullPointerException) via a crafted .jnlp file, as demonstrated by the jnlp_file/appletDesc/index.html#misc test in the Technology Compatibility Kit (TCK) for the Java Network Launching Protocol (JNLP)." }, { "lang": "es", "value": "La implementaci\u00f3n de Java Web Start en Sun Java SE v6 anteriores a Update 15 permite a los atacantes dependientes del contexto provocar una denegaci\u00f3n de servicio (excepci\u00f3n de puntero nulo) mediante un fichero .jnlp modificado, como se ha demostrado al probar jnlp_file/appletDesc/index.html#misc en el Technology Compatibility Kit (TCK) para el Java Network Launching Protocol (JNLP)." } ], "id": "CVE-2009-2719", "lastModified": "2024-11-21T01:05:35.550", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2009-08-10T20:30:00.577", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://java.sun.com/javase/6/webnotes/6u15.html" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/37386" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/37460" }, { "source": "cve@mitre.org", "url": "http://security.gentoo.org/glsa/glsa-200911-02.xml" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2009/3316" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://java.sun.com/javase/6/webnotes/6u15.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/37386" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/37460" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-200911-02.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2009/3316" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2009-11-05 16:30
Modified
2024-11-21 01:08
Severity ?
Summary
Heap-based buffer overflow in the setBytePixels function in the Abstract Window Toolkit (AWT) in Java Runtime Environment (JRE) in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to execute arbitrary code via crafted arguments, aka Bug Id 6872358.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.4.2_1 | |
sun | jre | 1.4.2_2 | |
sun | jre | 1.4.2_02 | |
sun | jre | 1.4.2_03 | |
sun | jre | 1.4.2_3 | |
sun | jre | 1.4.2_4 | |
sun | jre | 1.4.2_04 | |
sun | jre | 1.4.2_05 | |
sun | jre | 1.4.2_5 | |
sun | jre | 1.4.2_06 | |
sun | jre | 1.4.2_6 | |
sun | jre | 1.4.2_7 | |
sun | jre | 1.4.2_07 | |
sun | jre | 1.4.2_8 | |
sun | jre | 1.4.2_08 | |
sun | jre | 1.4.2_09 | |
sun | jre | 1.4.2_9 | |
sun | jre | 1.4.2_10 | |
sun | jre | 1.4.2_11 | |
sun | jre | 1.4.2_12 | |
sun | jre | 1.4.2_13 | |
sun | jre | 1.4.2_14 | |
sun | jre | 1.4.2_15 | |
sun | jre | 1.4.2_16 | |
sun | jre | 1.4.2_17 | |
sun | jre | 1.4.2_18 | |
sun | jre | 1.4.2_19 | |
sun | jre | 1.4.2_20 | |
sun | jre | 1.4.2_21 | |
sun | jre | 1.4.2_22 | |
sun | sdk | 1.4.2_01 | |
sun | sdk | 1.4.2_1 | |
sun | sdk | 1.4.2_2 | |
sun | sdk | 1.4.2_02 | |
sun | sdk | 1.4.2_03 | |
sun | sdk | 1.4.2_3 | |
sun | sdk | 1.4.2_04 | |
sun | sdk | 1.4.2_4 | |
sun | sdk | 1.4.2_5 | |
sun | sdk | 1.4.2_05 | |
sun | sdk | 1.4.2_6 | |
sun | sdk | 1.4.2_06 | |
sun | sdk | 1.4.2_07 | |
sun | sdk | 1.4.2_7 | |
sun | sdk | 1.4.2_8 | |
sun | sdk | 1.4.2_08 | |
sun | sdk | 1.4.2_09 | |
sun | sdk | 1.4.2_9 | |
sun | sdk | 1.4.2_10 | |
sun | sdk | 1.4.2_11 | |
sun | sdk | 1.4.2_12 | |
sun | sdk | 1.4.2_13 | |
sun | sdk | 1.4.2_14 | |
sun | sdk | 1.4.2_15 | |
sun | sdk | 1.4.2_16 | |
sun | sdk | 1.4.2_17 | |
sun | sdk | 1.4.2_18 | |
sun | sdk | 1.4.2_19 | |
sun | sdk | 1.4.2_20 | |
sun | sdk | 1.4.2_21 | |
sun | sdk | 1.4.2_22 | |
sun | solaris | * | |
sun | jre | 1.3.1_1 | |
sun | jre | 1.3.1_01 | |
sun | jre | 1.3.1_01a | |
sun | jre | 1.3.1_02 | |
sun | jre | 1.3.1_2 | |
sun | jre | 1.3.1_03 | |
sun | jre | 1.3.1_3 | |
sun | jre | 1.3.1_4 | |
sun | jre | 1.3.1_04 | |
sun | jre | 1.3.1_05 | |
sun | jre | 1.3.1_5 | |
sun | jre | 1.3.1_06 | |
sun | jre | 1.3.1_6 | |
sun | jre | 1.3.1_07 | |
sun | jre | 1.3.1_7 | |
sun | jre | 1.3.1_8 | |
sun | jre | 1.3.1_08 | |
sun | jre | 1.3.1_9 | |
sun | jre | 1.3.1_09 | |
sun | jre | 1.3.1_10 | |
sun | jre | 1.3.1_11 | |
sun | jre | 1.3.1_12 | |
sun | jre | 1.3.1_13 | |
sun | jre | 1.3.1_14 | |
sun | jre | 1.3.1_15 | |
sun | jre | 1.3.1_16 | |
sun | jre | 1.3.1_17 | |
sun | jre | 1.3.1_18 | |
sun | jre | 1.3.1_19 | |
sun | jre | 1.3.1_20 | |
sun | jre | 1.3.1_21 | |
sun | jre | 1.3.1_22 | |
sun | jre | 1.3.1_23 | |
sun | jre | 1.3.1_24 | |
sun | jre | 1.3.1_25 | |
sun | sdk | 1.3.1_01 | |
sun | sdk | 1.3.1_01a | |
sun | sdk | 1.3.1_2 | |
sun | sdk | 1.3.1_02 | |
sun | sdk | 1.3.1_03 | |
sun | sdk | 1.3.1_3 | |
sun | sdk | 1.3.1_4 | |
sun | sdk | 1.3.1_04 | |
sun | sdk | 1.3.1_5 | |
sun | sdk | 1.3.1_05 | |
sun | sdk | 1.3.1_6 | |
sun | sdk | 1.3.1_06 | |
sun | sdk | 1.3.1_7 | |
sun | sdk | 1.3.1_07 | |
sun | sdk | 1.3.1_8 | |
sun | sdk | 1.3.1_08 | |
sun | sdk | 1.3.1_9 | |
sun | sdk | 1.3.1_09 | |
sun | sdk | 1.3.1_10 | |
sun | sdk | 1.3.1_11 | |
sun | sdk | 1.3.1_12 | |
sun | sdk | 1.3.1_13 | |
sun | sdk | 1.3.1_14 | |
sun | sdk | 1.3.1_15 | |
sun | sdk | 1.3.1_16 | |
sun | sdk | 1.3.1_17 | |
sun | sdk | 1.3.1_18 | |
sun | sdk | 1.3.1_19 | |
sun | sdk | 1.3.1_20 | |
sun | sdk | 1.3.1_21 | |
sun | sdk | 1.3.1_22 | |
sun | sdk | 1.3.1_23 | |
sun | sdk | 1.3.1_24 | |
sun | sdk | 1.3.1_25 | |
microsoft | windows | * | |
sun | java_se | * | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jre | 1.4.2_01 | |
sun | jre | 1.4.2_1 | |
sun | jre | 1.4.2_2 | |
sun | jre | 1.4.2_02 | |
sun | jre | 1.4.2_03 | |
sun | jre | 1.4.2_3 | |
sun | jre | 1.4.2_4 | |
sun | jre | 1.4.2_04 | |
sun | jre | 1.4.2_05 | |
sun | jre | 1.4.2_5 | |
sun | jre | 1.4.2_06 | |
sun | jre | 1.4.2_6 | |
sun | jre | 1.4.2_7 | |
sun | jre | 1.4.2_07 | |
sun | jre | 1.4.2_8 | |
sun | jre | 1.4.2_08 | |
sun | jre | 1.4.2_09 | |
sun | jre | 1.4.2_9 | |
sun | jre | 1.4.2_10 | |
sun | jre | 1.4.2_11 | |
sun | jre | 1.4.2_12 | |
sun | jre | 1.4.2_13 | |
sun | jre | 1.4.2_14 | |
sun | jre | 1.4.2_15 | |
sun | jre | 1.4.2_16 | |
sun | jre | 1.4.2_17 | |
sun | jre | 1.4.2_18 | |
sun | jre | 1.4.2_19 | |
sun | jre | 1.4.2_20 | |
sun | jre | 1.4.2_21 | |
sun | jre | 1.4.2_22 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | sdk | 1.4.2_1 | |
sun | sdk | 1.4.2_2 | |
sun | sdk | 1.4.2_02 | |
sun | sdk | 1.4.2_03 | |
sun | sdk | 1.4.2_3 | |
sun | sdk | 1.4.2_04 | |
sun | sdk | 1.4.2_4 | |
sun | sdk | 1.4.2_5 | |
sun | sdk | 1.4.2_05 | |
sun | sdk | 1.4.2_6 | |
sun | sdk | 1.4.2_06 | |
sun | sdk | 1.4.2_07 | |
sun | sdk | 1.4.2_7 | |
sun | sdk | 1.4.2_8 | |
sun | sdk | 1.4.2_08 | |
sun | sdk | 1.4.2_09 | |
sun | sdk | 1.4.2_9 | |
sun | sdk | 1.4.2_10 | |
sun | sdk | 1.4.2_11 | |
sun | sdk | 1.4.2_12 | |
sun | sdk | 1.4.2_13 | |
sun | sdk | 1.4.2_14 | |
sun | sdk | 1.4.2_15 | |
sun | sdk | 1.4.2_16 | |
sun | sdk | 1.4.2_17 | |
sun | sdk | 1.4.2_18 | |
sun | sdk | 1.4.2_19 | |
sun | sdk | 1.4.2_20 | |
sun | sdk | 1.4.2_21 | |
sun | sdk | 1.4.2_22 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_1:*:*:*:*:*:*", "matchCriteriaId": "8198F493-0447-4A87-9F16-5B6CB3572E38", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_10:*:*:*:*:*:*", "matchCriteriaId": "645BBE6D-BA5E-4D93-9152-759A2355013E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_11:*:*:*:*:*:*", "matchCriteriaId": "0EE694C9-940A-4899-844C-AC63412FA295", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_12:*:*:*:*:*:*", "matchCriteriaId": "BC9476DD-9B56-4811-A248-711C25181F29", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_13:*:*:*:*:*:*", "matchCriteriaId": "68D34082-2948-4D95-B43F-FBD59E2F3D28", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_14:*:*:*:*:*:*", "matchCriteriaId": "F2E01C07-4921-47CC-9AFC-D3B461D0B78D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_15:*:*:*:*:*:*", "matchCriteriaId": "7532E7D4-2F62-4DA0-B905-F95A0A735CE5", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_16:*:*:*:*:*:*", "matchCriteriaId": "0AF93193-889E-4F44-ADEB-E89E56DE6C7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_17:*:*:*:*:*:*", "matchCriteriaId": "68C19440-4172-4539-8E38-09DBCB1752E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_18:*:*:*:*:*:*", "matchCriteriaId": "3CC000EC-9717-47DA-B182-6C8CD3970F27", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_19:*:*:*:*:*:*", "matchCriteriaId": "115083C5-811F-47BA-8549-3BDFF9CA0740", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_2:*:*:*:*:*:*", "matchCriteriaId": "51337B8C-78F2-4207-998E-A3FC591F538B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_20:*:*:*:*:*:*", "matchCriteriaId": "48193108-CD9F-476E-A7D2-E0796F659BA5", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_21:*:*:*:*:*:*", "matchCriteriaId": "A0A80299-783A-4FBA-9EBF-5913942949A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_3:*:*:*:*:*:*", "matchCriteriaId": "76A4F852-0240-44D6-9BD5-FE79DEF16438", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_4:*:*:*:*:*:*", "matchCriteriaId": "F57E5943-5CC3-4736-85E8-FE7CC4F38735", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_5:*:*:*:*:*:*", "matchCriteriaId": "3C228E00-0F5C-41D2-8BD0-46AF682AE842", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_6:*:*:*:*:*:*", "matchCriteriaId": "0329E813-B2C8-4C84-BCAF-2D54C4AE0472", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_7:*:*:*:*:*:*", "matchCriteriaId": "7E3C40E1-7005-4F83-B347-177BEC9EE339", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_8:*:*:*:*:*:*", "matchCriteriaId": "6855E3F5-6F8E-44FA-A913-0D0F6A803DFF", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_9:*:*:*:*:*:*", "matchCriteriaId": "C79BDB6E-442B-41F1-A025-C17648A81FD9", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_1:*:*:*:*:*:*", "matchCriteriaId": "EBB09CE1-F4AC-472C-8D5D-594AEB322CFD", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_10:*:*:*:*:*:*", "matchCriteriaId": "722A93D8-B5BC-42F3-92A2-E424F61269A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_11:*:*:*:*:*:*", "matchCriteriaId": "775F2611-F11C-4B84-8F40-0D034B81BF18", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_12:*:*:*:*:*:*", "matchCriteriaId": "F20FDD9F-FF45-48BC-9207-54FB02E76071", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_13:*:*:*:*:*:*", "matchCriteriaId": "9FA326F5-894A-4B01-BCA3-B126DA81CA59", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_14:*:*:*:*:*:*", "matchCriteriaId": "228AB7B4-4BA4-43D4-B562-D438884DB152", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_15:*:*:*:*:*:*", "matchCriteriaId": "AFD5C688-2103-4D60-979E-D9BE69A989C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_16:*:*:*:*:*:*", "matchCriteriaId": "21421215-F722-4207-A2E5-E2DF4B29859B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_3:*:*:*:*:*:*", "matchCriteriaId": "D98175BF-B084-4FA5-899D-9E80DC3923EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_4:*:*:*:*:*:*", "matchCriteriaId": "820632CE-F8DF-47EE-B716-7530E60008B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_5:*:*:*:*:*:*", "matchCriteriaId": "FA2BD0A3-7B2D-447B-ABAC-7B867B03B632", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_6:*:*:*:*:*:*", "matchCriteriaId": "D54AB785-E9B7-47BD-B756-0C3A629D67DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_7:*:*:*:*:*:*", "matchCriteriaId": "E9412098-0353-4F7B-9245-010557E6C651", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_8:*:*:*:*:*:*", "matchCriteriaId": "FB0E9224-3D12-47E2-8E69-7B682284CDDD", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_9:*:*:*:*:*:*", "matchCriteriaId": "77BCD102-59A4-45A6-ADEF-CAB7F70E2377", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_1:*:*:*:*:*:*", "matchCriteriaId": "14E6127E-A40D-437D-B57B-0D7F57D08559", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_11:*:*:*:*:*:*", "matchCriteriaId": "28AE4411-45D1-4978-BA61-334AD04FF8FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_12:*:*:*:*:*:*", "matchCriteriaId": "479EB097-495A-4730-AF51-F2C0064EBA6E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_13:*:*:*:*:*:*", "matchCriteriaId": "9B3E7C12-8D97-42CC-9B2B-A0AE3267DE69", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_14:*:*:*:*:*:*", "matchCriteriaId": "5024BE9F-CE32-4099-A646-F3EC5DB6F63C", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_15:*:*:*:*:*:*", "matchCriteriaId": "DA9FB72A-C55F-4878-89D5-375FDA08163B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_16:*:*:*:*:*:*", "matchCriteriaId": "1CBC2A9C-9F21-4509-BA72-28B5DB16E55D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_17:*:*:*:*:*:*", "matchCriteriaId": "485F5ED3-062D-4A8E-AA34-9DC95D0D9646", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_18:*:*:*:*:*:*", "matchCriteriaId": "124364C5-0616-4C7A-A78F-08FABAA785CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_19:*:*:*:*:*:*", "matchCriteriaId": "A6BFFF1E-20D6-4508-9842-E7AB35F12B1D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_2:*:*:*:*:*:*", "matchCriteriaId": "DB7307A5-6F20-44FD-9D09-8FB76E444500", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_20:*:*:*:*:*:*", "matchCriteriaId": "2E7F3992-0C15-4371-BE14-0D2046B3976E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_21:*:*:*:*:*:*", "matchCriteriaId": "C5759CBC-D910-407D-83DF-A77FBDC8555D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_3:*:*:*:*:*:*", "matchCriteriaId": "0E45DE8A-477B-4BF7-893B-D11DDEE82E82", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_4:*:*:*:*:*:*", "matchCriteriaId": "D107CE0B-2EF2-4CF0-869E-3E27CBCA4997", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_5:*:*:*:*:*:*", "matchCriteriaId": "81DABB45-F39C-4BF4-8F2B-0CEE60A44C00", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_6:*:*:*:*:*:*", "matchCriteriaId": "CDDBD68A-771C-44FD-96A3-3AE189DE2591", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_7:*:*:*:*:*:*", "matchCriteriaId": "8FBD21F3-AC92-4154-948E-509FB8E097F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_8:*:*:*:*:*:*", "matchCriteriaId": "D91F9E0C-0A76-4DBC-A4E5-74E6682A5765", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_9:*:*:*:*:*:*", "matchCriteriaId": "86F7EF21-5395-4F1F-A15D-A1C7EDBFAB2A", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:*", "matchCriteriaId": "09027C19-D442-446F-B7A8-21DB6787CF43", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_10:*:*:*:*:*:*", "matchCriteriaId": "0A0FEC28-0707-4F42-9740-78F3D2D551EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_11:*:*:*:*:*:*", "matchCriteriaId": "C3C5879A-A608-4230-9DC1-C27F0F48A13B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_12:*:*:*:*:*:*", "matchCriteriaId": "0C71089A-BDDE-41FC-9DF9-9AEF4C2374DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_13:*:*:*:*:*:*", "matchCriteriaId": "2DBB6B73-8D6B-41FF-BEE0-E0C7F5F1EB41", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_14:*:*:*:*:*:*", "matchCriteriaId": "12A3B254-8580-45DB-BDE4-5B5A29CBFFB3", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_15:*:*:*:*:*:*", "matchCriteriaId": "1DB1DE6A-66AE-499B-AD92-9E6ACE474C6D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_16:*:*:*:*:*:*", "matchCriteriaId": "AADBB4F9-E43E-428B-9979-F47A15696C85", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_2:*:*:*:*:*:*", "matchCriteriaId": "7158D2C0-E9AC-4CD6-B777-EA7B7A181997", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_3:*:*:*:*:*:*", "matchCriteriaId": "90EC6C13-4B37-48E5-8199-A702A944D5A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_4:*:*:*:*:*:*", "matchCriteriaId": "2528152C-E20A-4D97-931C-A5EC3CEAA06D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_5:*:*:*:*:*:*", "matchCriteriaId": "A99DAB4C-272B-4C91-BC70-7729E1152590", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_6:*:*:*:*:*:*", "matchCriteriaId": "30DFC10A-A4D9-4F89-B17C-AB9260087D29", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_7:*:*:*:*:*:*", "matchCriteriaId": "272A5C44-18EC-41A9-8233-E9D4D0734EA6", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_8:*:*:*:*:*:*", "matchCriteriaId": "3DA21490-E253-4BDC-9BA8-5D068BE35189", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_9:*:*:*:*:*:*", "matchCriteriaId": "81C2C04D-D4BA-4C87-9609-C53AA63BFF19", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sun:jre:1.4.2_1:*:*:*:*:*:*:*", "matchCriteriaId": "1EEAB662-644A-4D7B-8237-64142CF48724", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_2:*:*:*:*:*:*:*", "matchCriteriaId": "D9598A49-95F2-42DB-B92C-CD026F739B83", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_02:*:*:*:*:*:*:*", "matchCriteriaId": "DB48B161-C239-4BB5-8667-7ACA5A5437F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_03:*:*:*:*:*:*:*", "matchCriteriaId": "83629616-1814-4858-B09F-79BEA82D6F55", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_3:*:*:*:*:*:*:*", "matchCriteriaId": "BED1009E-AE60-43A0-A0F5-38526EFCF423", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_4:*:*:*:*:*:*:*", "matchCriteriaId": "D011585C-0E62-4233-85FA-F29A07D68DA7", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_04:*:*:*:*:*:*:*", "matchCriteriaId": "03E8F351-F900-436E-A726-55AE31FBF832", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_05:*:*:*:*:*:*:*", "matchCriteriaId": "F76B79C6-ADD0-4992-A4BD-423A0AD38714", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_5:*:*:*:*:*:*:*", "matchCriteriaId": "F226D898-F0E8-41D8-BF40-54DE9FB5426D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_06:*:*:*:*:*:*:*", "matchCriteriaId": "FBFD41B5-6E33-4B00-81E8-9D91B0A03BD8", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_6:*:*:*:*:*:*:*", "matchCriteriaId": "4CB9CCD1-A67D-4800-9EC5-6E1A0B0B76E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_7:*:*:*:*:*:*:*", "matchCriteriaId": "CE28C283-447A-4F83-B96B-69F96E663C1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_07:*:*:*:*:*:*:*", "matchCriteriaId": "685D3F7F-30B9-4EB8-90FC-66A2A067A510", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_8:*:*:*:*:*:*:*", "matchCriteriaId": "D102063B-2434-4141-98E7-2DE501AE1728", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_08:*:*:*:*:*:*:*", "matchCriteriaId": "722B704B-A422-4163-AD48-F30CA4A07002", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_09:*:*:*:*:*:*:*", "matchCriteriaId": "C05784DC-626B-4D8D-A4DF-A42AC87131DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_9:*:*:*:*:*:*:*", "matchCriteriaId": "03B8CD03-CD31-4F4D-BA90-59435578A4F9", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_10:*:*:*:*:*:*:*", "matchCriteriaId": "41A994BF-1F64-480A-8AA5-748DDD0AB68C", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_11:*:*:*:*:*:*:*", "matchCriteriaId": "88519F2D-AD06-4F05-BEDA-A09216F1B481", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_12:*:*:*:*:*:*:*", "matchCriteriaId": "AC728978-368D-4B36-B149-70473E92BD1B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_13:*:*:*:*:*:*:*", "matchCriteriaId": "FD5187B1-CB86-48E8-A595-9FCFD9822C0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_14:*:*:*:*:*:*:*", "matchCriteriaId": "6C660DE4-543A-4E9B-825D-CD099D08CBD8", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_15:*:*:*:*:*:*:*", "matchCriteriaId": "98C1942E-16C0-4EB2-AB57-43EC6EC9C3A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_16:*:*:*:*:*:*:*", "matchCriteriaId": "318719C9-7B01-4021-B2EF-8341254DFE6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_17:*:*:*:*:*:*:*", "matchCriteriaId": "DB8FA9BA-51CA-4473-9FE1-9A32FB8C8041", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_18:*:*:*:*:*:*:*", "matchCriteriaId": "CC5E64B6-77DA-44BC-B646-AE01041B1830", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_19:*:*:*:*:*:*:*", "matchCriteriaId": "2DA35E80-9E0E-4A26-B631-A61542BE4739", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_20:*:*:*:*:*:*:*", "matchCriteriaId": "7EEB5367-1BB8-4ED3-8C04-ABA6BAA5AD10", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_21:*:*:*:*:*:*:*", "matchCriteriaId": "BED9E7C8-0418-4733-A496-61CCFD638859", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_22:*:*:*:*:*:*:*", "matchCriteriaId": "6566CE32-E042-424A-893B-C8A9E26E2869", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_01:*:*:*:*:*:*:*", "matchCriteriaId": "E6C4CA79-9D0A-4E47-A1A4-9CBEDDCFE05E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_1:*:*:*:*:*:*:*", "matchCriteriaId": "6F6453C9-7EE0-4FFB-861D-C2D9416DCABA", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_2:*:*:*:*:*:*:*", "matchCriteriaId": "89BF16DE-EEAB-4DA5-BFF1-7A0A58DE141F", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_02:*:*:*:*:*:*:*", "matchCriteriaId": "AF4E34FD-D927-42BB-8A16-031D77CB4B9E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_03:*:*:*:*:*:*:*", "matchCriteriaId": "37A3D49A-BE20-47BF-A85F-122357BAB098", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_3:*:*:*:*:*:*:*", "matchCriteriaId": "6DDE253E-C8B6-4C1D-AECE-ABEA1A67306B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_04:*:*:*:*:*:*:*", "matchCriteriaId": "F45DB5D3-7F35-4531-9A82-24EB50034787", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_4:*:*:*:*:*:*:*", "matchCriteriaId": "A56D9A60-F272-4D4C-A9DD-C93DAF783585", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_5:*:*:*:*:*:*:*", "matchCriteriaId": "EF109CAA-E8D2-4BD7-BE7C-AF8B2A78672E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_05:*:*:*:*:*:*:*", "matchCriteriaId": "4695F707-12E8-4BA4-BBE1-C21CB7213A2A", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_6:*:*:*:*:*:*:*", "matchCriteriaId": "976F4ACB-3725-45B7-B2EF-DEE4B88254E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_06:*:*:*:*:*:*:*", "matchCriteriaId": "C918FB49-DA13-4326-BE86-6F6BEA4CE4E1", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_07:*:*:*:*:*:*:*", "matchCriteriaId": "5573CAD1-39D1-4ADB-BB95-EBB554B43B4E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_7:*:*:*:*:*:*:*", "matchCriteriaId": "52BDD6A8-1611-4C3C-865D-6EDB5B9F8D88", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_8:*:*:*:*:*:*:*", "matchCriteriaId": "6A1F28FF-652A-4C89-9AC6-5E212F890811", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_08:*:*:*:*:*:*:*", "matchCriteriaId": "DD02EBDF-6E51-4538-9EDD-B1DE914D09C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_09:*:*:*:*:*:*:*", "matchCriteriaId": "53C3C0E3-5F40-412B-A4AD-A7A291DE2A08", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_9:*:*:*:*:*:*:*", "matchCriteriaId": "96A8C351-E9CD-431B-8B9D-712CA54C7213", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_10:*:*:*:*:*:*:*", "matchCriteriaId": "36888382-79C8-4C97-A654-C668CD68556F", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_11:*:*:*:*:*:*:*", "matchCriteriaId": "F34C99E6-F9F0-4EF3-8601-B47EAE3D7273", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_12:*:*:*:*:*:*:*", "matchCriteriaId": "A74DD08D-CEDB-460E-BED5-78F6CAF18BF5", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_13:*:*:*:*:*:*:*", "matchCriteriaId": "E60560EC-6DBD-4A17-BFFA-FAD9193A0BC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_14:*:*:*:*:*:*:*", "matchCriteriaId": "E4F64FBC-DC97-4FE3-A235-18B87945AF7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_15:*:*:*:*:*:*:*", "matchCriteriaId": "85048406-9051-4E69-94A8-5C449F3B89E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_16:*:*:*:*:*:*:*", "matchCriteriaId": "B1C88DD7-0B46-4405-BD35-60D27E2DBA14", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_17:*:*:*:*:*:*:*", "matchCriteriaId": "08D23B7C-7B8C-41B8-8D94-BB0F27C7F0A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_18:*:*:*:*:*:*:*", "matchCriteriaId": "1C49B997-95D3-4DA4-A353-DB41AD461C5E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_19:*:*:*:*:*:*:*", "matchCriteriaId": "6F70EF76-ED5F-4835-8252-FE613604FA3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_20:*:*:*:*:*:*:*", "matchCriteriaId": "6BDBCAD8-CDF7-4550-8EA2-1409B02FFAD6", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_21:*:*:*:*:*:*:*", "matchCriteriaId": "7E691333-0434-4808-9ED4-E82C6EC2FD37", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_22:*:*:*:*:*:*:*", "matchCriteriaId": "BBE7A538-FF2E-4622-8479-781AB73CBA45", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:sun:solaris:*:*:*:*:*:*:*:*", "matchCriteriaId": "469B74F2-4B89-42B8-8638-731E92D463B9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sun:jre:1.3.1_1:*:*:*:*:*:*:*", "matchCriteriaId": "EA460D9A-662F-4861-9835-3D3116FB9488", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_01:*:*:*:*:*:*:*", "matchCriteriaId": "7E49A68E-0886-4AED-8FF4-9455914BFE16", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_01a:*:*:*:*:*:*:*", "matchCriteriaId": "E94B0A27-60D3-42F5-9DF6-75F481C2460D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_02:*:*:*:*:*:*:*", "matchCriteriaId": "89E95205-DB64-44AD-81A4-B77BD7595AAF", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_2:*:*:*:*:*:*:*", "matchCriteriaId": "0875E34D-8544-49B9-BAD9-8191CC103A07", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_03:*:*:*:*:*:*:*", "matchCriteriaId": "62E772B9-8E41-476F-81F5-87B41F1827A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_3:*:*:*:*:*:*:*", "matchCriteriaId": "B9643B49-FC4B-4AD4-90AC-939DDAA96518", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_4:*:*:*:*:*:*:*", "matchCriteriaId": "F76773E5-0A91-49B8-8C9C-DD64AB9F74BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_04:*:*:*:*:*:*:*", "matchCriteriaId": "7CE78463-2CE8-43C6-BB06-AA40C72B1A4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_05:*:*:*:*:*:*:*", "matchCriteriaId": "31A04480-92DF-49AD-9B36-7F1FCB29DE90", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_5:*:*:*:*:*:*:*", "matchCriteriaId": "ADF93A34-0535-4289-B12C-A1E1E22C13D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_06:*:*:*:*:*:*:*", "matchCriteriaId": "E2FD0B72-683D-4FF6-BCF5-5DE85BF3064B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_6:*:*:*:*:*:*:*", "matchCriteriaId": "EC85B851-FEC7-4299-9EC5-D8A69E16B89C", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_07:*:*:*:*:*:*:*", "matchCriteriaId": "F78CD4B5-4B1D-4128-8AEA-2F967C38C6C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_7:*:*:*:*:*:*:*", "matchCriteriaId": "1B4E5018-6A0B-4F26-96AA-AD8F6EA7FB3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_8:*:*:*:*:*:*:*", "matchCriteriaId": "2978CF34-D48B-4ED2-A0C1-3CFAA5867223", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_08:*:*:*:*:*:*:*", "matchCriteriaId": "62CAA3E7-9D65-48F3-ACF7-9D705D94DE54", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_9:*:*:*:*:*:*:*", "matchCriteriaId": "2C0E6EA5-0D9F-4B15-860A-5DA3FD1765B8", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_09:*:*:*:*:*:*:*", "matchCriteriaId": "477C310B-50AD-4D40-8EDB-4A80F0BF321D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_10:*:*:*:*:*:*:*", "matchCriteriaId": "60A1F526-6B28-47A3-8D2C-06CA067E9164", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_11:*:*:*:*:*:*:*", "matchCriteriaId": "17F09D9E-B04B-477E-86E6-E1B1F9650973", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_12:*:*:*:*:*:*:*", "matchCriteriaId": "6F929C59-9602-4962-95B4-4165D66E5935", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_13:*:*:*:*:*:*:*", "matchCriteriaId": "E8B76949-9282-44D0-8075-74E482CE9A82", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_14:*:*:*:*:*:*:*", "matchCriteriaId": "B9B072DD-FC4F-4E07-9837-0E16017CA4AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_15:*:*:*:*:*:*:*", "matchCriteriaId": "969BE4EC-4D13-4B74-8137-FA0F83F0FDC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_16:*:*:*:*:*:*:*", "matchCriteriaId": "86408019-1B53-4AA8-9F05-47EBD0466EE2", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_17:*:*:*:*:*:*:*", "matchCriteriaId": "81F47561-F59C-4904-8E05-D8A9629405A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_18:*:*:*:*:*:*:*", "matchCriteriaId": "FB067445-8EA5-460F-B625-C21251E5A8D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_19:*:*:*:*:*:*:*", "matchCriteriaId": "B4C075BC-607E-47A1-A32D-B912D2FA03BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_20:*:*:*:*:*:*:*", "matchCriteriaId": "007175B8-48DB-46BE-B971-FB57B6A33723", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_21:*:*:*:*:*:*:*", "matchCriteriaId": "D5E6F92A-FC59-4CE7-B7F8-94CBF3DC8F21", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_22:*:*:*:*:*:*:*", "matchCriteriaId": "496901D5-014D-4920-A343-91A56F6FEFA0", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_23:*:*:*:*:*:*:*", "matchCriteriaId": "B2D18FBC-4C9B-4722-90AB-028D281654F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_24:*:*:*:*:*:*:*", "matchCriteriaId": "853BC114-592C-43FE-B227-EF41C494DC98", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_25:*:*:*:*:*:*:*", "matchCriteriaId": "B1F4E031-CE92-48C4-BECC-7C1190DB477A", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_01:*:*:*:*:*:*:*", "matchCriteriaId": "34710306-D6CF-4D07-84BF-71A8839BE416", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_01a:*:*:*:*:*:*:*", "matchCriteriaId": "44B93DC8-6375-4B41-B9BC-F22F592C56B9", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_2:*:*:*:*:*:*:*", "matchCriteriaId": "16AD9E9E-D6BD-4FCD-B857-F5013033200F", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_02:*:*:*:*:*:*:*", "matchCriteriaId": "87BF46A9-8E4A-4583-B35F-052FD481DF66", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_03:*:*:*:*:*:*:*", "matchCriteriaId": "32B351BB-6CA6-4CEF-9F5D-ED47774FC676", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_3:*:*:*:*:*:*:*", "matchCriteriaId": "21300F7C-6904-456C-949D-C0AFA630F4A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_4:*:*:*:*:*:*:*", "matchCriteriaId": "776FA44E-6277-4236-A872-103E7DDE5040", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_04:*:*:*:*:*:*:*", "matchCriteriaId": "CDA40FCD-1D34-4C47-908F-697433236153", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_5:*:*:*:*:*:*:*", "matchCriteriaId": "63267A02-DCE2-4B86-B370-B90F03C7E341", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_05:*:*:*:*:*:*:*", "matchCriteriaId": "00639A84-BD03-4BD9-A655-F806693DBC8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_6:*:*:*:*:*:*:*", "matchCriteriaId": "2E2AE42E-0E25-468F-A8CB-03991F356338", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_06:*:*:*:*:*:*:*", "matchCriteriaId": "14824B23-FF9F-4D6D-9D02-12B79BE346A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_7:*:*:*:*:*:*:*", "matchCriteriaId": "5E015A65-708E-45B9-B66A-2D0F09638FF5", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_07:*:*:*:*:*:*:*", "matchCriteriaId": "6493744C-A69D-4377-937E-85E7F5535EA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_8:*:*:*:*:*:*:*", "matchCriteriaId": "F86BA5FB-A611-458E-8E37-4D4927D04D89", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_08:*:*:*:*:*:*:*", "matchCriteriaId": "C09019B1-B873-41CE-951E-4777F324729C", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_9:*:*:*:*:*:*:*", "matchCriteriaId": "03949794-A1DD-420F-A468-8F00AEA7B69E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_09:*:*:*:*:*:*:*", "matchCriteriaId": "EC4209A0-E73F-4B5A-9925-B5D20F879455", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_10:*:*:*:*:*:*:*", "matchCriteriaId": "297DF5AD-FC22-432B-AE6A-2B1E6CFE1BE4", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_11:*:*:*:*:*:*:*", "matchCriteriaId": "BFB8516D-03C4-478D-AFE2-824867FDC739", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_12:*:*:*:*:*:*:*", "matchCriteriaId": "F82AED17-FEC3-47D0-A395-26ACD07FBE52", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_13:*:*:*:*:*:*:*", "matchCriteriaId": "9630BC7B-9039-4FA6-86F8-5274783F3EB1", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_14:*:*:*:*:*:*:*", "matchCriteriaId": "F1A6A15C-216A-42B1-84EF-B3D9A313D4A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_15:*:*:*:*:*:*:*", "matchCriteriaId": "EC39C819-9439-4029-8377-F6D58B3DFDFB", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_16:*:*:*:*:*:*:*", "matchCriteriaId": "A053DEF6-1317-4DA8-91D7-E1970DA62351", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_17:*:*:*:*:*:*:*", "matchCriteriaId": "F0DBFDD8-40AE-44F2-8F02-FB7A4FAE5235", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_18:*:*:*:*:*:*:*", "matchCriteriaId": "EB0605FF-3DDC-4F3A-8171-F3A447E9C292", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_19:*:*:*:*:*:*:*", "matchCriteriaId": "801FF3B4-0729-4710-BFC2-4B078029944F", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_20:*:*:*:*:*:*:*", "matchCriteriaId": "8EB8591E-3D6E-489B-B0D6-CEBB9D09EA68", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_21:*:*:*:*:*:*:*", "matchCriteriaId": "8A411676-6666-4B54-A008-443B9B42F670", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_22:*:*:*:*:*:*:*", "matchCriteriaId": "0AEDC9B2-8AA6-4DA2-A187-49A1DD106725", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_23:*:*:*:*:*:*:*", "matchCriteriaId": "8F69BEE4-CB4B-436A-9838-13239B368CF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_24:*:*:*:*:*:*:*", "matchCriteriaId": "11AC1050-38AF-49F4-A40C-AAF9710204AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_25:*:*:*:*:*:*:*", "matchCriteriaId": "8FA939E8-8747-4532-B6B4-6E83824C7067", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sun:java_se:*:*:business:*:*:*:*:*", "matchCriteriaId": "CB9A3291-3F2C-40E9-81D3-D148002E1782", "vulnerable": false } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_1:*:*:*:*:*:*", "matchCriteriaId": "8198F493-0447-4A87-9F16-5B6CB3572E38", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_10:*:*:*:*:*:*", "matchCriteriaId": "645BBE6D-BA5E-4D93-9152-759A2355013E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_11:*:*:*:*:*:*", "matchCriteriaId": "0EE694C9-940A-4899-844C-AC63412FA295", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_12:*:*:*:*:*:*", "matchCriteriaId": "BC9476DD-9B56-4811-A248-711C25181F29", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_13:*:*:*:*:*:*", "matchCriteriaId": "68D34082-2948-4D95-B43F-FBD59E2F3D28", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_14:*:*:*:*:*:*", "matchCriteriaId": "F2E01C07-4921-47CC-9AFC-D3B461D0B78D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_15:*:*:*:*:*:*", "matchCriteriaId": "7532E7D4-2F62-4DA0-B905-F95A0A735CE5", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_16:*:*:*:*:*:*", "matchCriteriaId": "0AF93193-889E-4F44-ADEB-E89E56DE6C7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_17:*:*:*:*:*:*", "matchCriteriaId": "68C19440-4172-4539-8E38-09DBCB1752E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_18:*:*:*:*:*:*", "matchCriteriaId": "3CC000EC-9717-47DA-B182-6C8CD3970F27", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_19:*:*:*:*:*:*", "matchCriteriaId": "115083C5-811F-47BA-8549-3BDFF9CA0740", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_2:*:*:*:*:*:*", "matchCriteriaId": "51337B8C-78F2-4207-998E-A3FC591F538B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_20:*:*:*:*:*:*", "matchCriteriaId": "48193108-CD9F-476E-A7D2-E0796F659BA5", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_21:*:*:*:*:*:*", "matchCriteriaId": "A0A80299-783A-4FBA-9EBF-5913942949A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_3:*:*:*:*:*:*", "matchCriteriaId": "76A4F852-0240-44D6-9BD5-FE79DEF16438", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_4:*:*:*:*:*:*", "matchCriteriaId": "F57E5943-5CC3-4736-85E8-FE7CC4F38735", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_5:*:*:*:*:*:*", "matchCriteriaId": "3C228E00-0F5C-41D2-8BD0-46AF682AE842", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_6:*:*:*:*:*:*", "matchCriteriaId": "0329E813-B2C8-4C84-BCAF-2D54C4AE0472", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_7:*:*:*:*:*:*", "matchCriteriaId": "7E3C40E1-7005-4F83-B347-177BEC9EE339", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_8:*:*:*:*:*:*", "matchCriteriaId": "6855E3F5-6F8E-44FA-A913-0D0F6A803DFF", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_9:*:*:*:*:*:*", "matchCriteriaId": "C79BDB6E-442B-41F1-A025-C17648A81FD9", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_1:*:*:*:*:*:*", "matchCriteriaId": "EBB09CE1-F4AC-472C-8D5D-594AEB322CFD", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_10:*:*:*:*:*:*", "matchCriteriaId": "722A93D8-B5BC-42F3-92A2-E424F61269A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_11:*:*:*:*:*:*", "matchCriteriaId": "775F2611-F11C-4B84-8F40-0D034B81BF18", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_12:*:*:*:*:*:*", "matchCriteriaId": "F20FDD9F-FF45-48BC-9207-54FB02E76071", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_13:*:*:*:*:*:*", "matchCriteriaId": "9FA326F5-894A-4B01-BCA3-B126DA81CA59", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_14:*:*:*:*:*:*", "matchCriteriaId": "228AB7B4-4BA4-43D4-B562-D438884DB152", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_15:*:*:*:*:*:*", "matchCriteriaId": "AFD5C688-2103-4D60-979E-D9BE69A989C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_16:*:*:*:*:*:*", "matchCriteriaId": "21421215-F722-4207-A2E5-E2DF4B29859B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_3:*:*:*:*:*:*", "matchCriteriaId": "D98175BF-B084-4FA5-899D-9E80DC3923EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_4:*:*:*:*:*:*", "matchCriteriaId": "820632CE-F8DF-47EE-B716-7530E60008B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_5:*:*:*:*:*:*", "matchCriteriaId": "FA2BD0A3-7B2D-447B-ABAC-7B867B03B632", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_6:*:*:*:*:*:*", "matchCriteriaId": "D54AB785-E9B7-47BD-B756-0C3A629D67DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_7:*:*:*:*:*:*", "matchCriteriaId": "E9412098-0353-4F7B-9245-010557E6C651", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_8:*:*:*:*:*:*", "matchCriteriaId": "FB0E9224-3D12-47E2-8E69-7B682284CDDD", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_9:*:*:*:*:*:*", "matchCriteriaId": "77BCD102-59A4-45A6-ADEF-CAB7F70E2377", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update2:*:*:*:*:*:*", "matchCriteriaId": "B8F93BBE-1E8C-4EB3-BCC7-20AB2D813F98", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_01:*:*:*:*:*:*:*", "matchCriteriaId": "27A472AF-049D-4D63-841C-1EF737E8D64D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_1:*:*:*:*:*:*:*", "matchCriteriaId": "1EEAB662-644A-4D7B-8237-64142CF48724", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_2:*:*:*:*:*:*:*", "matchCriteriaId": "D9598A49-95F2-42DB-B92C-CD026F739B83", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_02:*:*:*:*:*:*:*", "matchCriteriaId": "DB48B161-C239-4BB5-8667-7ACA5A5437F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_03:*:*:*:*:*:*:*", "matchCriteriaId": "83629616-1814-4858-B09F-79BEA82D6F55", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_3:*:*:*:*:*:*:*", "matchCriteriaId": "BED1009E-AE60-43A0-A0F5-38526EFCF423", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_4:*:*:*:*:*:*:*", "matchCriteriaId": "D011585C-0E62-4233-85FA-F29A07D68DA7", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_04:*:*:*:*:*:*:*", "matchCriteriaId": "03E8F351-F900-436E-A726-55AE31FBF832", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_05:*:*:*:*:*:*:*", "matchCriteriaId": "F76B79C6-ADD0-4992-A4BD-423A0AD38714", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_5:*:*:*:*:*:*:*", "matchCriteriaId": "F226D898-F0E8-41D8-BF40-54DE9FB5426D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_06:*:*:*:*:*:*:*", "matchCriteriaId": "FBFD41B5-6E33-4B00-81E8-9D91B0A03BD8", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_6:*:*:*:*:*:*:*", "matchCriteriaId": "4CB9CCD1-A67D-4800-9EC5-6E1A0B0B76E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_7:*:*:*:*:*:*:*", "matchCriteriaId": "CE28C283-447A-4F83-B96B-69F96E663C1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_07:*:*:*:*:*:*:*", "matchCriteriaId": "685D3F7F-30B9-4EB8-90FC-66A2A067A510", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_8:*:*:*:*:*:*:*", "matchCriteriaId": "D102063B-2434-4141-98E7-2DE501AE1728", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_08:*:*:*:*:*:*:*", "matchCriteriaId": "722B704B-A422-4163-AD48-F30CA4A07002", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_09:*:*:*:*:*:*:*", "matchCriteriaId": "C05784DC-626B-4D8D-A4DF-A42AC87131DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_9:*:*:*:*:*:*:*", "matchCriteriaId": "03B8CD03-CD31-4F4D-BA90-59435578A4F9", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_10:*:*:*:*:*:*:*", "matchCriteriaId": "41A994BF-1F64-480A-8AA5-748DDD0AB68C", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_11:*:*:*:*:*:*:*", "matchCriteriaId": "88519F2D-AD06-4F05-BEDA-A09216F1B481", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_12:*:*:*:*:*:*:*", "matchCriteriaId": "AC728978-368D-4B36-B149-70473E92BD1B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_13:*:*:*:*:*:*:*", "matchCriteriaId": "FD5187B1-CB86-48E8-A595-9FCFD9822C0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_14:*:*:*:*:*:*:*", "matchCriteriaId": "6C660DE4-543A-4E9B-825D-CD099D08CBD8", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_15:*:*:*:*:*:*:*", "matchCriteriaId": "98C1942E-16C0-4EB2-AB57-43EC6EC9C3A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_16:*:*:*:*:*:*:*", "matchCriteriaId": "318719C9-7B01-4021-B2EF-8341254DFE6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_17:*:*:*:*:*:*:*", "matchCriteriaId": "DB8FA9BA-51CA-4473-9FE1-9A32FB8C8041", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_18:*:*:*:*:*:*:*", "matchCriteriaId": "CC5E64B6-77DA-44BC-B646-AE01041B1830", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_19:*:*:*:*:*:*:*", "matchCriteriaId": "2DA35E80-9E0E-4A26-B631-A61542BE4739", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_20:*:*:*:*:*:*:*", "matchCriteriaId": "7EEB5367-1BB8-4ED3-8C04-ABA6BAA5AD10", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_21:*:*:*:*:*:*:*", "matchCriteriaId": "BED9E7C8-0418-4733-A496-61CCFD638859", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_22:*:*:*:*:*:*:*", "matchCriteriaId": "6566CE32-E042-424A-893B-C8A9E26E2869", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_1:*:*:*:*:*:*", "matchCriteriaId": "14E6127E-A40D-437D-B57B-0D7F57D08559", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_11:*:*:*:*:*:*", "matchCriteriaId": "28AE4411-45D1-4978-BA61-334AD04FF8FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_12:*:*:*:*:*:*", "matchCriteriaId": "479EB097-495A-4730-AF51-F2C0064EBA6E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_13:*:*:*:*:*:*", "matchCriteriaId": "9B3E7C12-8D97-42CC-9B2B-A0AE3267DE69", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_14:*:*:*:*:*:*", "matchCriteriaId": "5024BE9F-CE32-4099-A646-F3EC5DB6F63C", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_15:*:*:*:*:*:*", "matchCriteriaId": "DA9FB72A-C55F-4878-89D5-375FDA08163B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_16:*:*:*:*:*:*", "matchCriteriaId": "1CBC2A9C-9F21-4509-BA72-28B5DB16E55D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_17:*:*:*:*:*:*", "matchCriteriaId": "485F5ED3-062D-4A8E-AA34-9DC95D0D9646", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_18:*:*:*:*:*:*", "matchCriteriaId": "124364C5-0616-4C7A-A78F-08FABAA785CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_19:*:*:*:*:*:*", "matchCriteriaId": "A6BFFF1E-20D6-4508-9842-E7AB35F12B1D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_2:*:*:*:*:*:*", "matchCriteriaId": "DB7307A5-6F20-44FD-9D09-8FB76E444500", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_20:*:*:*:*:*:*", "matchCriteriaId": "2E7F3992-0C15-4371-BE14-0D2046B3976E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_21:*:*:*:*:*:*", "matchCriteriaId": "C5759CBC-D910-407D-83DF-A77FBDC8555D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_3:*:*:*:*:*:*", "matchCriteriaId": "0E45DE8A-477B-4BF7-893B-D11DDEE82E82", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_4:*:*:*:*:*:*", "matchCriteriaId": "D107CE0B-2EF2-4CF0-869E-3E27CBCA4997", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_5:*:*:*:*:*:*", "matchCriteriaId": "81DABB45-F39C-4BF4-8F2B-0CEE60A44C00", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_6:*:*:*:*:*:*", "matchCriteriaId": "CDDBD68A-771C-44FD-96A3-3AE189DE2591", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_7:*:*:*:*:*:*", "matchCriteriaId": "8FBD21F3-AC92-4154-948E-509FB8E097F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_8:*:*:*:*:*:*", "matchCriteriaId": "D91F9E0C-0A76-4DBC-A4E5-74E6682A5765", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_9:*:*:*:*:*:*", "matchCriteriaId": "86F7EF21-5395-4F1F-A15D-A1C7EDBFAB2A", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:*", "matchCriteriaId": "09027C19-D442-446F-B7A8-21DB6787CF43", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_10:*:*:*:*:*:*", "matchCriteriaId": "0A0FEC28-0707-4F42-9740-78F3D2D551EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_11:*:*:*:*:*:*", "matchCriteriaId": "C3C5879A-A608-4230-9DC1-C27F0F48A13B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_12:*:*:*:*:*:*", "matchCriteriaId": "0C71089A-BDDE-41FC-9DF9-9AEF4C2374DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_13:*:*:*:*:*:*", "matchCriteriaId": "2DBB6B73-8D6B-41FF-BEE0-E0C7F5F1EB41", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_14:*:*:*:*:*:*", "matchCriteriaId": "12A3B254-8580-45DB-BDE4-5B5A29CBFFB3", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_15:*:*:*:*:*:*", "matchCriteriaId": "1DB1DE6A-66AE-499B-AD92-9E6ACE474C6D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_16:*:*:*:*:*:*", "matchCriteriaId": "AADBB4F9-E43E-428B-9979-F47A15696C85", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_2:*:*:*:*:*:*", "matchCriteriaId": "7158D2C0-E9AC-4CD6-B777-EA7B7A181997", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_3:*:*:*:*:*:*", "matchCriteriaId": "90EC6C13-4B37-48E5-8199-A702A944D5A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_4:*:*:*:*:*:*", "matchCriteriaId": "2528152C-E20A-4D97-931C-A5EC3CEAA06D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_5:*:*:*:*:*:*", "matchCriteriaId": "A99DAB4C-272B-4C91-BC70-7729E1152590", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_6:*:*:*:*:*:*", "matchCriteriaId": "30DFC10A-A4D9-4F89-B17C-AB9260087D29", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_7:*:*:*:*:*:*", "matchCriteriaId": "272A5C44-18EC-41A9-8233-E9D4D0734EA6", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_8:*:*:*:*:*:*", "matchCriteriaId": "3DA21490-E253-4BDC-9BA8-5D068BE35189", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_9:*:*:*:*:*:*", "matchCriteriaId": "81C2C04D-D4BA-4C87-9609-C53AA63BFF19", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_1:*:*:*:*:*:*:*", "matchCriteriaId": "6F6453C9-7EE0-4FFB-861D-C2D9416DCABA", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_2:*:*:*:*:*:*:*", "matchCriteriaId": "89BF16DE-EEAB-4DA5-BFF1-7A0A58DE141F", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_02:*:*:*:*:*:*:*", "matchCriteriaId": "AF4E34FD-D927-42BB-8A16-031D77CB4B9E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_03:*:*:*:*:*:*:*", "matchCriteriaId": "37A3D49A-BE20-47BF-A85F-122357BAB098", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_3:*:*:*:*:*:*:*", "matchCriteriaId": "6DDE253E-C8B6-4C1D-AECE-ABEA1A67306B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_04:*:*:*:*:*:*:*", "matchCriteriaId": "F45DB5D3-7F35-4531-9A82-24EB50034787", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_4:*:*:*:*:*:*:*", "matchCriteriaId": "A56D9A60-F272-4D4C-A9DD-C93DAF783585", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_5:*:*:*:*:*:*:*", "matchCriteriaId": "EF109CAA-E8D2-4BD7-BE7C-AF8B2A78672E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_05:*:*:*:*:*:*:*", "matchCriteriaId": "4695F707-12E8-4BA4-BBE1-C21CB7213A2A", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_6:*:*:*:*:*:*:*", "matchCriteriaId": "976F4ACB-3725-45B7-B2EF-DEE4B88254E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_06:*:*:*:*:*:*:*", "matchCriteriaId": "C918FB49-DA13-4326-BE86-6F6BEA4CE4E1", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_07:*:*:*:*:*:*:*", "matchCriteriaId": "5573CAD1-39D1-4ADB-BB95-EBB554B43B4E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_7:*:*:*:*:*:*:*", "matchCriteriaId": "52BDD6A8-1611-4C3C-865D-6EDB5B9F8D88", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_8:*:*:*:*:*:*:*", "matchCriteriaId": "6A1F28FF-652A-4C89-9AC6-5E212F890811", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_08:*:*:*:*:*:*:*", "matchCriteriaId": "DD02EBDF-6E51-4538-9EDD-B1DE914D09C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_09:*:*:*:*:*:*:*", "matchCriteriaId": "53C3C0E3-5F40-412B-A4AD-A7A291DE2A08", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_9:*:*:*:*:*:*:*", "matchCriteriaId": "96A8C351-E9CD-431B-8B9D-712CA54C7213", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_10:*:*:*:*:*:*:*", "matchCriteriaId": "36888382-79C8-4C97-A654-C668CD68556F", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_11:*:*:*:*:*:*:*", "matchCriteriaId": "F34C99E6-F9F0-4EF3-8601-B47EAE3D7273", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_12:*:*:*:*:*:*:*", "matchCriteriaId": "A74DD08D-CEDB-460E-BED5-78F6CAF18BF5", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_13:*:*:*:*:*:*:*", "matchCriteriaId": "E60560EC-6DBD-4A17-BFFA-FAD9193A0BC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_14:*:*:*:*:*:*:*", "matchCriteriaId": "E4F64FBC-DC97-4FE3-A235-18B87945AF7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_15:*:*:*:*:*:*:*", "matchCriteriaId": "85048406-9051-4E69-94A8-5C449F3B89E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_16:*:*:*:*:*:*:*", "matchCriteriaId": "B1C88DD7-0B46-4405-BD35-60D27E2DBA14", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_17:*:*:*:*:*:*:*", "matchCriteriaId": "08D23B7C-7B8C-41B8-8D94-BB0F27C7F0A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_18:*:*:*:*:*:*:*", "matchCriteriaId": "1C49B997-95D3-4DA4-A353-DB41AD461C5E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_19:*:*:*:*:*:*:*", "matchCriteriaId": "6F70EF76-ED5F-4835-8252-FE613604FA3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_20:*:*:*:*:*:*:*", "matchCriteriaId": "6BDBCAD8-CDF7-4550-8EA2-1409B02FFAD6", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_21:*:*:*:*:*:*:*", "matchCriteriaId": "7E691333-0434-4808-9ED4-E82C6EC2FD37", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_22:*:*:*:*:*:*:*", "matchCriteriaId": "BBE7A538-FF2E-4622-8479-781AB73CBA45", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Heap-based buffer overflow in the setBytePixels function in the Abstract Window Toolkit (AWT) in Java Runtime Environment (JRE) in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to execute arbitrary code via crafted arguments, aka Bug Id 6872358." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer basado en memoria din\u00e1mica en la funci\u00f3n setBytePixels en Abstract Window Toolkit (AWT) en Java Runtime Environment (JRE) en Sun Java SE en JDK y JRE v5.0 anteriores a Update 22, JDK y JRE 6 anteriores a Update 17, SDK y JRE v1.3.x anteriores a v1.3.1_27, y SDK y JRE v1.4.x anteriores a v1.4.2_24 permite a los atacantes remotos ejecutar arbitrariamente c\u00f3digo a trav\u00e9s de argumentos manipulados, tambi\u00e9n conocido como Id 6872358." } ], "id": "CVE-2009-3871", "lastModified": "2024-11-21T01:08:23.170", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2009-11-05T16:30:00.407", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://java.sun.com/javase/6/webnotes/6u17.html" }, { "source": "cve@mitre.org", "url": "http://lists.apple.com/archives/security-announce/2009/Dec/msg00000.html" }, { "source": "cve@mitre.org", "url": "http://lists.apple.com/archives/security-announce/2009/Dec/msg00001.html" }, { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00010.html" }, { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=126566824131534\u0026w=2" }, { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=126566824131534\u0026w=2" }, { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=131593453929393\u0026w=2" }, { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=131593453929393\u0026w=2" }, { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=134254866602253\u0026w=2" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/37231" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/37239" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/37386" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/37581" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/37841" }, { "source": "cve@mitre.org", "url": "http://security.gentoo.org/glsa/glsa-200911-02.xml" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1023132" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-270474-1" }, { "source": "cve@mitre.org", "url": "http://support.apple.com/kb/HT3969" }, { "source": "cve@mitre.org", "url": "http://support.apple.com/kb/HT3970" }, { "source": "cve@mitre.org", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:084" }, { "source": "cve@mitre.org", "url": "http://www.oracle.com/technetwork/topics/security/cpujan2010-084891.html" }, { "source": "cve@mitre.org", "url": "http://www.redhat.com/support/errata/RHSA-2009-1694.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/36881" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2009/3131" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://zerodayinitiative.com/advisories/ZDI-09-079/" }, { "source": "cve@mitre.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12134" }, { "source": "cve@mitre.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6698" }, { "source": "cve@mitre.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8275" }, { "source": "cve@mitre.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9360" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://java.sun.com/javase/6/webnotes/6u17.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.apple.com/archives/security-announce/2009/Dec/msg00000.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.apple.com/archives/security-announce/2009/Dec/msg00001.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00010.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=126566824131534\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=126566824131534\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=131593453929393\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=131593453929393\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=134254866602253\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/37231" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/37239" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/37386" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/37581" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/37841" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-200911-02.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1023132" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-270474-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://support.apple.com/kb/HT3969" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://support.apple.com/kb/HT3970" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:084" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.oracle.com/technetwork/topics/security/cpujan2010-084891.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2009-1694.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/36881" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2009/3131" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://zerodayinitiative.com/advisories/ZDI-09-079/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12134" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6698" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8275" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9360" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2009-08-10 20:30
Modified
2024-11-21 01:05
Severity ?
Summary
Unspecified vulnerability in the javax.swing.plaf.synth.SynthContext.isSubregion method in the Swing implementation in Sun Java SE 6 before Update 15 allows context-dependent attackers to cause a denial of service (NullPointerException in the Jemmy library) via unknown vectors.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sun:java_se:*:14:*:*:*:*:*:*", "matchCriteriaId": "EB9DE8D5-D4F6-45DE-9DB4-9E5BB7E518F9", "versionEndIncluding": "6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in the javax.swing.plaf.synth.SynthContext.isSubregion method in the Swing implementation in Sun Java SE 6 before Update 15 allows context-dependent attackers to cause a denial of service (NullPointerException in the Jemmy library) via unknown vectors." }, { "lang": "es", "value": "Vulnerabilidad no especificada en el m\u00e9todo javax.swing.plaf.synth.SynthContext.isSubregion en la implementaci\u00f3n de Swing en Sun Java SE v6 anteriores a Update 15 permite a los atacantes dependientes del contexto provocar una denegaci\u00f3n de servicio (excepci\u00f3n de puntero nulo en la biblioteca Jemmy) mediante vectores desconocidos." } ], "id": "CVE-2009-2720", "lastModified": "2024-11-21T01:05:35.723", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2009-08-10T20:30:00.593", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://java.sun.com/javase/6/webnotes/6u15.html" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/37386" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/37460" }, { "source": "cve@mitre.org", "url": "http://security.gentoo.org/glsa/glsa-200911-02.xml" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2009/3316" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://java.sun.com/javase/6/webnotes/6u15.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/37386" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/37460" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-200911-02.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2009/3316" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2009-11-05 16:30
Modified
2024-11-21 01:08
Severity ?
Summary
Integer overflow in the JPEGImageReader implementation in the ImageI/O component in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to execute arbitrary code via large subsample dimensions in a JPEG file that triggers a heap-based buffer overflow, aka Bug Id 6874643.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.4.2_1 | |
sun | jre | 1.4.2_2 | |
sun | jre | 1.4.2_02 | |
sun | jre | 1.4.2_03 | |
sun | jre | 1.4.2_3 | |
sun | jre | 1.4.2_4 | |
sun | jre | 1.4.2_04 | |
sun | jre | 1.4.2_05 | |
sun | jre | 1.4.2_5 | |
sun | jre | 1.4.2_06 | |
sun | jre | 1.4.2_6 | |
sun | jre | 1.4.2_7 | |
sun | jre | 1.4.2_07 | |
sun | jre | 1.4.2_8 | |
sun | jre | 1.4.2_08 | |
sun | jre | 1.4.2_09 | |
sun | jre | 1.4.2_9 | |
sun | jre | 1.4.2_10 | |
sun | jre | 1.4.2_11 | |
sun | jre | 1.4.2_12 | |
sun | jre | 1.4.2_13 | |
sun | jre | 1.4.2_14 | |
sun | jre | 1.4.2_15 | |
sun | jre | 1.4.2_16 | |
sun | jre | 1.4.2_17 | |
sun | jre | 1.4.2_18 | |
sun | jre | 1.4.2_19 | |
sun | jre | 1.4.2_20 | |
sun | jre | 1.4.2_21 | |
sun | jre | 1.4.2_22 | |
sun | sdk | 1.4.2_01 | |
sun | sdk | 1.4.2_1 | |
sun | sdk | 1.4.2_2 | |
sun | sdk | 1.4.2_02 | |
sun | sdk | 1.4.2_03 | |
sun | sdk | 1.4.2_3 | |
sun | sdk | 1.4.2_04 | |
sun | sdk | 1.4.2_4 | |
sun | sdk | 1.4.2_5 | |
sun | sdk | 1.4.2_05 | |
sun | sdk | 1.4.2_6 | |
sun | sdk | 1.4.2_06 | |
sun | sdk | 1.4.2_07 | |
sun | sdk | 1.4.2_7 | |
sun | sdk | 1.4.2_8 | |
sun | sdk | 1.4.2_08 | |
sun | sdk | 1.4.2_09 | |
sun | sdk | 1.4.2_9 | |
sun | sdk | 1.4.2_10 | |
sun | sdk | 1.4.2_11 | |
sun | sdk | 1.4.2_12 | |
sun | sdk | 1.4.2_13 | |
sun | sdk | 1.4.2_14 | |
sun | sdk | 1.4.2_15 | |
sun | sdk | 1.4.2_16 | |
sun | sdk | 1.4.2_17 | |
sun | sdk | 1.4.2_18 | |
sun | sdk | 1.4.2_19 | |
sun | sdk | 1.4.2_20 | |
sun | sdk | 1.4.2_21 | |
sun | sdk | 1.4.2_22 | |
sun | solaris | * | |
sun | jre | 1.3.1_1 | |
sun | jre | 1.3.1_01 | |
sun | jre | 1.3.1_01a | |
sun | jre | 1.3.1_02 | |
sun | jre | 1.3.1_2 | |
sun | jre | 1.3.1_03 | |
sun | jre | 1.3.1_3 | |
sun | jre | 1.3.1_4 | |
sun | jre | 1.3.1_04 | |
sun | jre | 1.3.1_05 | |
sun | jre | 1.3.1_5 | |
sun | jre | 1.3.1_06 | |
sun | jre | 1.3.1_6 | |
sun | jre | 1.3.1_07 | |
sun | jre | 1.3.1_7 | |
sun | jre | 1.3.1_8 | |
sun | jre | 1.3.1_08 | |
sun | jre | 1.3.1_9 | |
sun | jre | 1.3.1_09 | |
sun | jre | 1.3.1_10 | |
sun | jre | 1.3.1_11 | |
sun | jre | 1.3.1_12 | |
sun | jre | 1.3.1_13 | |
sun | jre | 1.3.1_14 | |
sun | jre | 1.3.1_15 | |
sun | jre | 1.3.1_16 | |
sun | jre | 1.3.1_17 | |
sun | jre | 1.3.1_18 | |
sun | jre | 1.3.1_19 | |
sun | jre | 1.3.1_20 | |
sun | jre | 1.3.1_21 | |
sun | jre | 1.3.1_22 | |
sun | jre | 1.3.1_23 | |
sun | jre | 1.3.1_24 | |
sun | jre | 1.3.1_25 | |
sun | sdk | 1.3.1_01 | |
sun | sdk | 1.3.1_01a | |
sun | sdk | 1.3.1_2 | |
sun | sdk | 1.3.1_02 | |
sun | sdk | 1.3.1_03 | |
sun | sdk | 1.3.1_3 | |
sun | sdk | 1.3.1_4 | |
sun | sdk | 1.3.1_04 | |
sun | sdk | 1.3.1_5 | |
sun | sdk | 1.3.1_05 | |
sun | sdk | 1.3.1_6 | |
sun | sdk | 1.3.1_06 | |
sun | sdk | 1.3.1_7 | |
sun | sdk | 1.3.1_07 | |
sun | sdk | 1.3.1_8 | |
sun | sdk | 1.3.1_08 | |
sun | sdk | 1.3.1_9 | |
sun | sdk | 1.3.1_09 | |
sun | sdk | 1.3.1_10 | |
sun | sdk | 1.3.1_11 | |
sun | sdk | 1.3.1_12 | |
sun | sdk | 1.3.1_13 | |
sun | sdk | 1.3.1_14 | |
sun | sdk | 1.3.1_15 | |
sun | sdk | 1.3.1_16 | |
sun | sdk | 1.3.1_17 | |
sun | sdk | 1.3.1_18 | |
sun | sdk | 1.3.1_19 | |
sun | sdk | 1.3.1_20 | |
sun | sdk | 1.3.1_21 | |
sun | sdk | 1.3.1_22 | |
sun | sdk | 1.3.1_23 | |
sun | sdk | 1.3.1_24 | |
sun | sdk | 1.3.1_25 | |
microsoft | windows | * | |
sun | java_se | * | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jre | 1.4.2_01 | |
sun | jre | 1.4.2_1 | |
sun | jre | 1.4.2_2 | |
sun | jre | 1.4.2_02 | |
sun | jre | 1.4.2_03 | |
sun | jre | 1.4.2_3 | |
sun | jre | 1.4.2_4 | |
sun | jre | 1.4.2_04 | |
sun | jre | 1.4.2_05 | |
sun | jre | 1.4.2_5 | |
sun | jre | 1.4.2_06 | |
sun | jre | 1.4.2_6 | |
sun | jre | 1.4.2_7 | |
sun | jre | 1.4.2_07 | |
sun | jre | 1.4.2_8 | |
sun | jre | 1.4.2_08 | |
sun | jre | 1.4.2_09 | |
sun | jre | 1.4.2_9 | |
sun | jre | 1.4.2_10 | |
sun | jre | 1.4.2_11 | |
sun | jre | 1.4.2_12 | |
sun | jre | 1.4.2_13 | |
sun | jre | 1.4.2_14 | |
sun | jre | 1.4.2_15 | |
sun | jre | 1.4.2_16 | |
sun | jre | 1.4.2_17 | |
sun | jre | 1.4.2_18 | |
sun | jre | 1.4.2_19 | |
sun | jre | 1.4.2_20 | |
sun | jre | 1.4.2_21 | |
sun | jre | 1.4.2_22 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | sdk | 1.4.2_1 | |
sun | sdk | 1.4.2_2 | |
sun | sdk | 1.4.2_02 | |
sun | sdk | 1.4.2_03 | |
sun | sdk | 1.4.2_3 | |
sun | sdk | 1.4.2_04 | |
sun | sdk | 1.4.2_4 | |
sun | sdk | 1.4.2_5 | |
sun | sdk | 1.4.2_05 | |
sun | sdk | 1.4.2_6 | |
sun | sdk | 1.4.2_06 | |
sun | sdk | 1.4.2_07 | |
sun | sdk | 1.4.2_7 | |
sun | sdk | 1.4.2_8 | |
sun | sdk | 1.4.2_08 | |
sun | sdk | 1.4.2_09 | |
sun | sdk | 1.4.2_9 | |
sun | sdk | 1.4.2_10 | |
sun | sdk | 1.4.2_11 | |
sun | sdk | 1.4.2_12 | |
sun | sdk | 1.4.2_13 | |
sun | sdk | 1.4.2_14 | |
sun | sdk | 1.4.2_15 | |
sun | sdk | 1.4.2_16 | |
sun | sdk | 1.4.2_17 | |
sun | sdk | 1.4.2_18 | |
sun | sdk | 1.4.2_19 | |
sun | sdk | 1.4.2_20 | |
sun | sdk | 1.4.2_21 | |
sun | sdk | 1.4.2_22 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_1:*:*:*:*:*:*", "matchCriteriaId": "8198F493-0447-4A87-9F16-5B6CB3572E38", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_10:*:*:*:*:*:*", "matchCriteriaId": "645BBE6D-BA5E-4D93-9152-759A2355013E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_11:*:*:*:*:*:*", "matchCriteriaId": "0EE694C9-940A-4899-844C-AC63412FA295", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_12:*:*:*:*:*:*", "matchCriteriaId": "BC9476DD-9B56-4811-A248-711C25181F29", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_13:*:*:*:*:*:*", "matchCriteriaId": "68D34082-2948-4D95-B43F-FBD59E2F3D28", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_14:*:*:*:*:*:*", "matchCriteriaId": "F2E01C07-4921-47CC-9AFC-D3B461D0B78D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_15:*:*:*:*:*:*", "matchCriteriaId": "7532E7D4-2F62-4DA0-B905-F95A0A735CE5", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_16:*:*:*:*:*:*", "matchCriteriaId": "0AF93193-889E-4F44-ADEB-E89E56DE6C7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_17:*:*:*:*:*:*", "matchCriteriaId": "68C19440-4172-4539-8E38-09DBCB1752E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_18:*:*:*:*:*:*", "matchCriteriaId": "3CC000EC-9717-47DA-B182-6C8CD3970F27", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_19:*:*:*:*:*:*", "matchCriteriaId": "115083C5-811F-47BA-8549-3BDFF9CA0740", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_2:*:*:*:*:*:*", "matchCriteriaId": "51337B8C-78F2-4207-998E-A3FC591F538B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_20:*:*:*:*:*:*", "matchCriteriaId": "48193108-CD9F-476E-A7D2-E0796F659BA5", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_21:*:*:*:*:*:*", "matchCriteriaId": "A0A80299-783A-4FBA-9EBF-5913942949A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_3:*:*:*:*:*:*", "matchCriteriaId": "76A4F852-0240-44D6-9BD5-FE79DEF16438", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_4:*:*:*:*:*:*", "matchCriteriaId": "F57E5943-5CC3-4736-85E8-FE7CC4F38735", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_5:*:*:*:*:*:*", "matchCriteriaId": "3C228E00-0F5C-41D2-8BD0-46AF682AE842", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_6:*:*:*:*:*:*", "matchCriteriaId": "0329E813-B2C8-4C84-BCAF-2D54C4AE0472", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_7:*:*:*:*:*:*", "matchCriteriaId": "7E3C40E1-7005-4F83-B347-177BEC9EE339", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_8:*:*:*:*:*:*", "matchCriteriaId": "6855E3F5-6F8E-44FA-A913-0D0F6A803DFF", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_9:*:*:*:*:*:*", "matchCriteriaId": "C79BDB6E-442B-41F1-A025-C17648A81FD9", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_1:*:*:*:*:*:*", "matchCriteriaId": "EBB09CE1-F4AC-472C-8D5D-594AEB322CFD", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_10:*:*:*:*:*:*", "matchCriteriaId": "722A93D8-B5BC-42F3-92A2-E424F61269A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_11:*:*:*:*:*:*", "matchCriteriaId": "775F2611-F11C-4B84-8F40-0D034B81BF18", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_12:*:*:*:*:*:*", "matchCriteriaId": "F20FDD9F-FF45-48BC-9207-54FB02E76071", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_13:*:*:*:*:*:*", "matchCriteriaId": "9FA326F5-894A-4B01-BCA3-B126DA81CA59", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_14:*:*:*:*:*:*", "matchCriteriaId": "228AB7B4-4BA4-43D4-B562-D438884DB152", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_15:*:*:*:*:*:*", "matchCriteriaId": "AFD5C688-2103-4D60-979E-D9BE69A989C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_16:*:*:*:*:*:*", "matchCriteriaId": "21421215-F722-4207-A2E5-E2DF4B29859B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_3:*:*:*:*:*:*", "matchCriteriaId": "D98175BF-B084-4FA5-899D-9E80DC3923EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_4:*:*:*:*:*:*", "matchCriteriaId": "820632CE-F8DF-47EE-B716-7530E60008B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_5:*:*:*:*:*:*", "matchCriteriaId": "FA2BD0A3-7B2D-447B-ABAC-7B867B03B632", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_6:*:*:*:*:*:*", "matchCriteriaId": "D54AB785-E9B7-47BD-B756-0C3A629D67DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_7:*:*:*:*:*:*", "matchCriteriaId": "E9412098-0353-4F7B-9245-010557E6C651", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_8:*:*:*:*:*:*", "matchCriteriaId": "FB0E9224-3D12-47E2-8E69-7B682284CDDD", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_9:*:*:*:*:*:*", "matchCriteriaId": "77BCD102-59A4-45A6-ADEF-CAB7F70E2377", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_1:*:*:*:*:*:*", "matchCriteriaId": "14E6127E-A40D-437D-B57B-0D7F57D08559", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_11:*:*:*:*:*:*", "matchCriteriaId": "28AE4411-45D1-4978-BA61-334AD04FF8FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_12:*:*:*:*:*:*", "matchCriteriaId": "479EB097-495A-4730-AF51-F2C0064EBA6E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_13:*:*:*:*:*:*", "matchCriteriaId": "9B3E7C12-8D97-42CC-9B2B-A0AE3267DE69", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_14:*:*:*:*:*:*", "matchCriteriaId": "5024BE9F-CE32-4099-A646-F3EC5DB6F63C", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_15:*:*:*:*:*:*", "matchCriteriaId": "DA9FB72A-C55F-4878-89D5-375FDA08163B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_16:*:*:*:*:*:*", "matchCriteriaId": "1CBC2A9C-9F21-4509-BA72-28B5DB16E55D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_17:*:*:*:*:*:*", "matchCriteriaId": "485F5ED3-062D-4A8E-AA34-9DC95D0D9646", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_18:*:*:*:*:*:*", "matchCriteriaId": "124364C5-0616-4C7A-A78F-08FABAA785CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_19:*:*:*:*:*:*", "matchCriteriaId": "A6BFFF1E-20D6-4508-9842-E7AB35F12B1D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_2:*:*:*:*:*:*", "matchCriteriaId": "DB7307A5-6F20-44FD-9D09-8FB76E444500", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_20:*:*:*:*:*:*", "matchCriteriaId": "2E7F3992-0C15-4371-BE14-0D2046B3976E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_21:*:*:*:*:*:*", "matchCriteriaId": "C5759CBC-D910-407D-83DF-A77FBDC8555D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_3:*:*:*:*:*:*", "matchCriteriaId": "0E45DE8A-477B-4BF7-893B-D11DDEE82E82", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_4:*:*:*:*:*:*", "matchCriteriaId": "D107CE0B-2EF2-4CF0-869E-3E27CBCA4997", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_5:*:*:*:*:*:*", "matchCriteriaId": "81DABB45-F39C-4BF4-8F2B-0CEE60A44C00", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_6:*:*:*:*:*:*", "matchCriteriaId": "CDDBD68A-771C-44FD-96A3-3AE189DE2591", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_7:*:*:*:*:*:*", "matchCriteriaId": "8FBD21F3-AC92-4154-948E-509FB8E097F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_8:*:*:*:*:*:*", "matchCriteriaId": "D91F9E0C-0A76-4DBC-A4E5-74E6682A5765", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_9:*:*:*:*:*:*", "matchCriteriaId": "86F7EF21-5395-4F1F-A15D-A1C7EDBFAB2A", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:*", "matchCriteriaId": "09027C19-D442-446F-B7A8-21DB6787CF43", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_10:*:*:*:*:*:*", "matchCriteriaId": "0A0FEC28-0707-4F42-9740-78F3D2D551EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_11:*:*:*:*:*:*", "matchCriteriaId": "C3C5879A-A608-4230-9DC1-C27F0F48A13B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_12:*:*:*:*:*:*", "matchCriteriaId": "0C71089A-BDDE-41FC-9DF9-9AEF4C2374DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_13:*:*:*:*:*:*", "matchCriteriaId": "2DBB6B73-8D6B-41FF-BEE0-E0C7F5F1EB41", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_14:*:*:*:*:*:*", "matchCriteriaId": "12A3B254-8580-45DB-BDE4-5B5A29CBFFB3", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_15:*:*:*:*:*:*", "matchCriteriaId": "1DB1DE6A-66AE-499B-AD92-9E6ACE474C6D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_16:*:*:*:*:*:*", "matchCriteriaId": "AADBB4F9-E43E-428B-9979-F47A15696C85", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_2:*:*:*:*:*:*", "matchCriteriaId": "7158D2C0-E9AC-4CD6-B777-EA7B7A181997", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_3:*:*:*:*:*:*", "matchCriteriaId": "90EC6C13-4B37-48E5-8199-A702A944D5A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_4:*:*:*:*:*:*", "matchCriteriaId": "2528152C-E20A-4D97-931C-A5EC3CEAA06D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_5:*:*:*:*:*:*", "matchCriteriaId": "A99DAB4C-272B-4C91-BC70-7729E1152590", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_6:*:*:*:*:*:*", "matchCriteriaId": "30DFC10A-A4D9-4F89-B17C-AB9260087D29", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_7:*:*:*:*:*:*", "matchCriteriaId": "272A5C44-18EC-41A9-8233-E9D4D0734EA6", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_8:*:*:*:*:*:*", "matchCriteriaId": "3DA21490-E253-4BDC-9BA8-5D068BE35189", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_9:*:*:*:*:*:*", "matchCriteriaId": "81C2C04D-D4BA-4C87-9609-C53AA63BFF19", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sun:jre:1.4.2_1:*:*:*:*:*:*:*", "matchCriteriaId": "1EEAB662-644A-4D7B-8237-64142CF48724", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_2:*:*:*:*:*:*:*", "matchCriteriaId": "D9598A49-95F2-42DB-B92C-CD026F739B83", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_02:*:*:*:*:*:*:*", "matchCriteriaId": "DB48B161-C239-4BB5-8667-7ACA5A5437F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_03:*:*:*:*:*:*:*", "matchCriteriaId": "83629616-1814-4858-B09F-79BEA82D6F55", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_3:*:*:*:*:*:*:*", "matchCriteriaId": "BED1009E-AE60-43A0-A0F5-38526EFCF423", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_4:*:*:*:*:*:*:*", "matchCriteriaId": "D011585C-0E62-4233-85FA-F29A07D68DA7", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_04:*:*:*:*:*:*:*", "matchCriteriaId": "03E8F351-F900-436E-A726-55AE31FBF832", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_05:*:*:*:*:*:*:*", "matchCriteriaId": "F76B79C6-ADD0-4992-A4BD-423A0AD38714", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_5:*:*:*:*:*:*:*", "matchCriteriaId": "F226D898-F0E8-41D8-BF40-54DE9FB5426D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_06:*:*:*:*:*:*:*", "matchCriteriaId": "FBFD41B5-6E33-4B00-81E8-9D91B0A03BD8", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_6:*:*:*:*:*:*:*", "matchCriteriaId": "4CB9CCD1-A67D-4800-9EC5-6E1A0B0B76E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_7:*:*:*:*:*:*:*", "matchCriteriaId": "CE28C283-447A-4F83-B96B-69F96E663C1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_07:*:*:*:*:*:*:*", "matchCriteriaId": "685D3F7F-30B9-4EB8-90FC-66A2A067A510", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_8:*:*:*:*:*:*:*", "matchCriteriaId": "D102063B-2434-4141-98E7-2DE501AE1728", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_08:*:*:*:*:*:*:*", "matchCriteriaId": "722B704B-A422-4163-AD48-F30CA4A07002", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_09:*:*:*:*:*:*:*", "matchCriteriaId": "C05784DC-626B-4D8D-A4DF-A42AC87131DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_9:*:*:*:*:*:*:*", "matchCriteriaId": "03B8CD03-CD31-4F4D-BA90-59435578A4F9", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_10:*:*:*:*:*:*:*", "matchCriteriaId": "41A994BF-1F64-480A-8AA5-748DDD0AB68C", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_11:*:*:*:*:*:*:*", "matchCriteriaId": "88519F2D-AD06-4F05-BEDA-A09216F1B481", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_12:*:*:*:*:*:*:*", "matchCriteriaId": "AC728978-368D-4B36-B149-70473E92BD1B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_13:*:*:*:*:*:*:*", "matchCriteriaId": "FD5187B1-CB86-48E8-A595-9FCFD9822C0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_14:*:*:*:*:*:*:*", "matchCriteriaId": "6C660DE4-543A-4E9B-825D-CD099D08CBD8", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_15:*:*:*:*:*:*:*", "matchCriteriaId": "98C1942E-16C0-4EB2-AB57-43EC6EC9C3A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_16:*:*:*:*:*:*:*", "matchCriteriaId": "318719C9-7B01-4021-B2EF-8341254DFE6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_17:*:*:*:*:*:*:*", "matchCriteriaId": "DB8FA9BA-51CA-4473-9FE1-9A32FB8C8041", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_18:*:*:*:*:*:*:*", "matchCriteriaId": "CC5E64B6-77DA-44BC-B646-AE01041B1830", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_19:*:*:*:*:*:*:*", "matchCriteriaId": "2DA35E80-9E0E-4A26-B631-A61542BE4739", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_20:*:*:*:*:*:*:*", "matchCriteriaId": "7EEB5367-1BB8-4ED3-8C04-ABA6BAA5AD10", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_21:*:*:*:*:*:*:*", "matchCriteriaId": "BED9E7C8-0418-4733-A496-61CCFD638859", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_22:*:*:*:*:*:*:*", "matchCriteriaId": "6566CE32-E042-424A-893B-C8A9E26E2869", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_01:*:*:*:*:*:*:*", "matchCriteriaId": "E6C4CA79-9D0A-4E47-A1A4-9CBEDDCFE05E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_1:*:*:*:*:*:*:*", "matchCriteriaId": "6F6453C9-7EE0-4FFB-861D-C2D9416DCABA", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_2:*:*:*:*:*:*:*", "matchCriteriaId": "89BF16DE-EEAB-4DA5-BFF1-7A0A58DE141F", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_02:*:*:*:*:*:*:*", "matchCriteriaId": "AF4E34FD-D927-42BB-8A16-031D77CB4B9E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_03:*:*:*:*:*:*:*", "matchCriteriaId": "37A3D49A-BE20-47BF-A85F-122357BAB098", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_3:*:*:*:*:*:*:*", "matchCriteriaId": "6DDE253E-C8B6-4C1D-AECE-ABEA1A67306B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_04:*:*:*:*:*:*:*", "matchCriteriaId": "F45DB5D3-7F35-4531-9A82-24EB50034787", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_4:*:*:*:*:*:*:*", "matchCriteriaId": "A56D9A60-F272-4D4C-A9DD-C93DAF783585", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_5:*:*:*:*:*:*:*", "matchCriteriaId": "EF109CAA-E8D2-4BD7-BE7C-AF8B2A78672E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_05:*:*:*:*:*:*:*", "matchCriteriaId": "4695F707-12E8-4BA4-BBE1-C21CB7213A2A", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_6:*:*:*:*:*:*:*", "matchCriteriaId": "976F4ACB-3725-45B7-B2EF-DEE4B88254E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_06:*:*:*:*:*:*:*", "matchCriteriaId": "C918FB49-DA13-4326-BE86-6F6BEA4CE4E1", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_07:*:*:*:*:*:*:*", "matchCriteriaId": "5573CAD1-39D1-4ADB-BB95-EBB554B43B4E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_7:*:*:*:*:*:*:*", "matchCriteriaId": "52BDD6A8-1611-4C3C-865D-6EDB5B9F8D88", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_8:*:*:*:*:*:*:*", "matchCriteriaId": "6A1F28FF-652A-4C89-9AC6-5E212F890811", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_08:*:*:*:*:*:*:*", "matchCriteriaId": "DD02EBDF-6E51-4538-9EDD-B1DE914D09C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_09:*:*:*:*:*:*:*", "matchCriteriaId": "53C3C0E3-5F40-412B-A4AD-A7A291DE2A08", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_9:*:*:*:*:*:*:*", "matchCriteriaId": "96A8C351-E9CD-431B-8B9D-712CA54C7213", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_10:*:*:*:*:*:*:*", "matchCriteriaId": "36888382-79C8-4C97-A654-C668CD68556F", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_11:*:*:*:*:*:*:*", "matchCriteriaId": "F34C99E6-F9F0-4EF3-8601-B47EAE3D7273", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_12:*:*:*:*:*:*:*", "matchCriteriaId": "A74DD08D-CEDB-460E-BED5-78F6CAF18BF5", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_13:*:*:*:*:*:*:*", "matchCriteriaId": "E60560EC-6DBD-4A17-BFFA-FAD9193A0BC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_14:*:*:*:*:*:*:*", "matchCriteriaId": "E4F64FBC-DC97-4FE3-A235-18B87945AF7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_15:*:*:*:*:*:*:*", "matchCriteriaId": "85048406-9051-4E69-94A8-5C449F3B89E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_16:*:*:*:*:*:*:*", "matchCriteriaId": "B1C88DD7-0B46-4405-BD35-60D27E2DBA14", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_17:*:*:*:*:*:*:*", "matchCriteriaId": "08D23B7C-7B8C-41B8-8D94-BB0F27C7F0A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_18:*:*:*:*:*:*:*", "matchCriteriaId": "1C49B997-95D3-4DA4-A353-DB41AD461C5E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_19:*:*:*:*:*:*:*", "matchCriteriaId": "6F70EF76-ED5F-4835-8252-FE613604FA3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_20:*:*:*:*:*:*:*", "matchCriteriaId": "6BDBCAD8-CDF7-4550-8EA2-1409B02FFAD6", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_21:*:*:*:*:*:*:*", "matchCriteriaId": "7E691333-0434-4808-9ED4-E82C6EC2FD37", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_22:*:*:*:*:*:*:*", "matchCriteriaId": "BBE7A538-FF2E-4622-8479-781AB73CBA45", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:sun:solaris:*:*:*:*:*:*:*:*", "matchCriteriaId": "469B74F2-4B89-42B8-8638-731E92D463B9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sun:jre:1.3.1_1:*:*:*:*:*:*:*", "matchCriteriaId": "EA460D9A-662F-4861-9835-3D3116FB9488", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_01:*:*:*:*:*:*:*", "matchCriteriaId": "7E49A68E-0886-4AED-8FF4-9455914BFE16", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_01a:*:*:*:*:*:*:*", "matchCriteriaId": "E94B0A27-60D3-42F5-9DF6-75F481C2460D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_02:*:*:*:*:*:*:*", "matchCriteriaId": "89E95205-DB64-44AD-81A4-B77BD7595AAF", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_2:*:*:*:*:*:*:*", "matchCriteriaId": "0875E34D-8544-49B9-BAD9-8191CC103A07", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_03:*:*:*:*:*:*:*", "matchCriteriaId": "62E772B9-8E41-476F-81F5-87B41F1827A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_3:*:*:*:*:*:*:*", "matchCriteriaId": "B9643B49-FC4B-4AD4-90AC-939DDAA96518", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_4:*:*:*:*:*:*:*", "matchCriteriaId": "F76773E5-0A91-49B8-8C9C-DD64AB9F74BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_04:*:*:*:*:*:*:*", "matchCriteriaId": "7CE78463-2CE8-43C6-BB06-AA40C72B1A4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_05:*:*:*:*:*:*:*", "matchCriteriaId": "31A04480-92DF-49AD-9B36-7F1FCB29DE90", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_5:*:*:*:*:*:*:*", "matchCriteriaId": "ADF93A34-0535-4289-B12C-A1E1E22C13D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_06:*:*:*:*:*:*:*", "matchCriteriaId": "E2FD0B72-683D-4FF6-BCF5-5DE85BF3064B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_6:*:*:*:*:*:*:*", "matchCriteriaId": "EC85B851-FEC7-4299-9EC5-D8A69E16B89C", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_07:*:*:*:*:*:*:*", "matchCriteriaId": "F78CD4B5-4B1D-4128-8AEA-2F967C38C6C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_7:*:*:*:*:*:*:*", "matchCriteriaId": "1B4E5018-6A0B-4F26-96AA-AD8F6EA7FB3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_8:*:*:*:*:*:*:*", "matchCriteriaId": "2978CF34-D48B-4ED2-A0C1-3CFAA5867223", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_08:*:*:*:*:*:*:*", "matchCriteriaId": "62CAA3E7-9D65-48F3-ACF7-9D705D94DE54", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_9:*:*:*:*:*:*:*", "matchCriteriaId": "2C0E6EA5-0D9F-4B15-860A-5DA3FD1765B8", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_09:*:*:*:*:*:*:*", "matchCriteriaId": "477C310B-50AD-4D40-8EDB-4A80F0BF321D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_10:*:*:*:*:*:*:*", "matchCriteriaId": "60A1F526-6B28-47A3-8D2C-06CA067E9164", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_11:*:*:*:*:*:*:*", "matchCriteriaId": "17F09D9E-B04B-477E-86E6-E1B1F9650973", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_12:*:*:*:*:*:*:*", "matchCriteriaId": "6F929C59-9602-4962-95B4-4165D66E5935", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_13:*:*:*:*:*:*:*", "matchCriteriaId": "E8B76949-9282-44D0-8075-74E482CE9A82", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_14:*:*:*:*:*:*:*", "matchCriteriaId": "B9B072DD-FC4F-4E07-9837-0E16017CA4AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_15:*:*:*:*:*:*:*", "matchCriteriaId": "969BE4EC-4D13-4B74-8137-FA0F83F0FDC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_16:*:*:*:*:*:*:*", "matchCriteriaId": "86408019-1B53-4AA8-9F05-47EBD0466EE2", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_17:*:*:*:*:*:*:*", "matchCriteriaId": "81F47561-F59C-4904-8E05-D8A9629405A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_18:*:*:*:*:*:*:*", "matchCriteriaId": "FB067445-8EA5-460F-B625-C21251E5A8D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_19:*:*:*:*:*:*:*", "matchCriteriaId": "B4C075BC-607E-47A1-A32D-B912D2FA03BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_20:*:*:*:*:*:*:*", "matchCriteriaId": "007175B8-48DB-46BE-B971-FB57B6A33723", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_21:*:*:*:*:*:*:*", "matchCriteriaId": "D5E6F92A-FC59-4CE7-B7F8-94CBF3DC8F21", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_22:*:*:*:*:*:*:*", "matchCriteriaId": "496901D5-014D-4920-A343-91A56F6FEFA0", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_23:*:*:*:*:*:*:*", "matchCriteriaId": "B2D18FBC-4C9B-4722-90AB-028D281654F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_24:*:*:*:*:*:*:*", "matchCriteriaId": "853BC114-592C-43FE-B227-EF41C494DC98", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_25:*:*:*:*:*:*:*", "matchCriteriaId": "B1F4E031-CE92-48C4-BECC-7C1190DB477A", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_01:*:*:*:*:*:*:*", "matchCriteriaId": "34710306-D6CF-4D07-84BF-71A8839BE416", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_01a:*:*:*:*:*:*:*", "matchCriteriaId": "44B93DC8-6375-4B41-B9BC-F22F592C56B9", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_2:*:*:*:*:*:*:*", "matchCriteriaId": "16AD9E9E-D6BD-4FCD-B857-F5013033200F", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_02:*:*:*:*:*:*:*", "matchCriteriaId": "87BF46A9-8E4A-4583-B35F-052FD481DF66", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_03:*:*:*:*:*:*:*", "matchCriteriaId": "32B351BB-6CA6-4CEF-9F5D-ED47774FC676", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_3:*:*:*:*:*:*:*", "matchCriteriaId": "21300F7C-6904-456C-949D-C0AFA630F4A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_4:*:*:*:*:*:*:*", "matchCriteriaId": "776FA44E-6277-4236-A872-103E7DDE5040", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_04:*:*:*:*:*:*:*", "matchCriteriaId": "CDA40FCD-1D34-4C47-908F-697433236153", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_5:*:*:*:*:*:*:*", "matchCriteriaId": "63267A02-DCE2-4B86-B370-B90F03C7E341", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_05:*:*:*:*:*:*:*", "matchCriteriaId": "00639A84-BD03-4BD9-A655-F806693DBC8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_6:*:*:*:*:*:*:*", "matchCriteriaId": "2E2AE42E-0E25-468F-A8CB-03991F356338", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_06:*:*:*:*:*:*:*", "matchCriteriaId": "14824B23-FF9F-4D6D-9D02-12B79BE346A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_7:*:*:*:*:*:*:*", "matchCriteriaId": "5E015A65-708E-45B9-B66A-2D0F09638FF5", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_07:*:*:*:*:*:*:*", "matchCriteriaId": "6493744C-A69D-4377-937E-85E7F5535EA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_8:*:*:*:*:*:*:*", "matchCriteriaId": "F86BA5FB-A611-458E-8E37-4D4927D04D89", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_08:*:*:*:*:*:*:*", "matchCriteriaId": "C09019B1-B873-41CE-951E-4777F324729C", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_9:*:*:*:*:*:*:*", "matchCriteriaId": "03949794-A1DD-420F-A468-8F00AEA7B69E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_09:*:*:*:*:*:*:*", "matchCriteriaId": "EC4209A0-E73F-4B5A-9925-B5D20F879455", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_10:*:*:*:*:*:*:*", "matchCriteriaId": "297DF5AD-FC22-432B-AE6A-2B1E6CFE1BE4", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_11:*:*:*:*:*:*:*", "matchCriteriaId": "BFB8516D-03C4-478D-AFE2-824867FDC739", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_12:*:*:*:*:*:*:*", "matchCriteriaId": "F82AED17-FEC3-47D0-A395-26ACD07FBE52", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_13:*:*:*:*:*:*:*", "matchCriteriaId": "9630BC7B-9039-4FA6-86F8-5274783F3EB1", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_14:*:*:*:*:*:*:*", "matchCriteriaId": "F1A6A15C-216A-42B1-84EF-B3D9A313D4A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_15:*:*:*:*:*:*:*", "matchCriteriaId": "EC39C819-9439-4029-8377-F6D58B3DFDFB", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_16:*:*:*:*:*:*:*", "matchCriteriaId": "A053DEF6-1317-4DA8-91D7-E1970DA62351", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_17:*:*:*:*:*:*:*", "matchCriteriaId": "F0DBFDD8-40AE-44F2-8F02-FB7A4FAE5235", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_18:*:*:*:*:*:*:*", "matchCriteriaId": "EB0605FF-3DDC-4F3A-8171-F3A447E9C292", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_19:*:*:*:*:*:*:*", "matchCriteriaId": "801FF3B4-0729-4710-BFC2-4B078029944F", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_20:*:*:*:*:*:*:*", "matchCriteriaId": "8EB8591E-3D6E-489B-B0D6-CEBB9D09EA68", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_21:*:*:*:*:*:*:*", "matchCriteriaId": "8A411676-6666-4B54-A008-443B9B42F670", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_22:*:*:*:*:*:*:*", "matchCriteriaId": "0AEDC9B2-8AA6-4DA2-A187-49A1DD106725", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_23:*:*:*:*:*:*:*", "matchCriteriaId": "8F69BEE4-CB4B-436A-9838-13239B368CF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_24:*:*:*:*:*:*:*", "matchCriteriaId": "11AC1050-38AF-49F4-A40C-AAF9710204AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_25:*:*:*:*:*:*:*", "matchCriteriaId": "8FA939E8-8747-4532-B6B4-6E83824C7067", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sun:java_se:*:*:business:*:*:*:*:*", "matchCriteriaId": "CB9A3291-3F2C-40E9-81D3-D148002E1782", "vulnerable": false } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_1:*:*:*:*:*:*", "matchCriteriaId": "8198F493-0447-4A87-9F16-5B6CB3572E38", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_10:*:*:*:*:*:*", "matchCriteriaId": "645BBE6D-BA5E-4D93-9152-759A2355013E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_11:*:*:*:*:*:*", "matchCriteriaId": "0EE694C9-940A-4899-844C-AC63412FA295", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_12:*:*:*:*:*:*", "matchCriteriaId": "BC9476DD-9B56-4811-A248-711C25181F29", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_13:*:*:*:*:*:*", "matchCriteriaId": "68D34082-2948-4D95-B43F-FBD59E2F3D28", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_14:*:*:*:*:*:*", "matchCriteriaId": "F2E01C07-4921-47CC-9AFC-D3B461D0B78D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_15:*:*:*:*:*:*", "matchCriteriaId": "7532E7D4-2F62-4DA0-B905-F95A0A735CE5", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_16:*:*:*:*:*:*", "matchCriteriaId": "0AF93193-889E-4F44-ADEB-E89E56DE6C7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_17:*:*:*:*:*:*", "matchCriteriaId": "68C19440-4172-4539-8E38-09DBCB1752E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_18:*:*:*:*:*:*", "matchCriteriaId": "3CC000EC-9717-47DA-B182-6C8CD3970F27", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_19:*:*:*:*:*:*", "matchCriteriaId": "115083C5-811F-47BA-8549-3BDFF9CA0740", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_2:*:*:*:*:*:*", "matchCriteriaId": "51337B8C-78F2-4207-998E-A3FC591F538B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_20:*:*:*:*:*:*", "matchCriteriaId": "48193108-CD9F-476E-A7D2-E0796F659BA5", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_21:*:*:*:*:*:*", "matchCriteriaId": "A0A80299-783A-4FBA-9EBF-5913942949A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_3:*:*:*:*:*:*", "matchCriteriaId": "76A4F852-0240-44D6-9BD5-FE79DEF16438", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_4:*:*:*:*:*:*", "matchCriteriaId": "F57E5943-5CC3-4736-85E8-FE7CC4F38735", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_5:*:*:*:*:*:*", "matchCriteriaId": "3C228E00-0F5C-41D2-8BD0-46AF682AE842", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_6:*:*:*:*:*:*", "matchCriteriaId": "0329E813-B2C8-4C84-BCAF-2D54C4AE0472", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_7:*:*:*:*:*:*", "matchCriteriaId": "7E3C40E1-7005-4F83-B347-177BEC9EE339", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_8:*:*:*:*:*:*", "matchCriteriaId": "6855E3F5-6F8E-44FA-A913-0D0F6A803DFF", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_9:*:*:*:*:*:*", "matchCriteriaId": "C79BDB6E-442B-41F1-A025-C17648A81FD9", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_1:*:*:*:*:*:*", "matchCriteriaId": "EBB09CE1-F4AC-472C-8D5D-594AEB322CFD", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_10:*:*:*:*:*:*", "matchCriteriaId": "722A93D8-B5BC-42F3-92A2-E424F61269A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_11:*:*:*:*:*:*", "matchCriteriaId": "775F2611-F11C-4B84-8F40-0D034B81BF18", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_12:*:*:*:*:*:*", "matchCriteriaId": "F20FDD9F-FF45-48BC-9207-54FB02E76071", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_13:*:*:*:*:*:*", "matchCriteriaId": "9FA326F5-894A-4B01-BCA3-B126DA81CA59", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_14:*:*:*:*:*:*", "matchCriteriaId": "228AB7B4-4BA4-43D4-B562-D438884DB152", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_15:*:*:*:*:*:*", "matchCriteriaId": "AFD5C688-2103-4D60-979E-D9BE69A989C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_16:*:*:*:*:*:*", "matchCriteriaId": "21421215-F722-4207-A2E5-E2DF4B29859B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_3:*:*:*:*:*:*", "matchCriteriaId": "D98175BF-B084-4FA5-899D-9E80DC3923EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_4:*:*:*:*:*:*", "matchCriteriaId": "820632CE-F8DF-47EE-B716-7530E60008B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_5:*:*:*:*:*:*", "matchCriteriaId": "FA2BD0A3-7B2D-447B-ABAC-7B867B03B632", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_6:*:*:*:*:*:*", "matchCriteriaId": "D54AB785-E9B7-47BD-B756-0C3A629D67DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_7:*:*:*:*:*:*", "matchCriteriaId": "E9412098-0353-4F7B-9245-010557E6C651", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_8:*:*:*:*:*:*", "matchCriteriaId": "FB0E9224-3D12-47E2-8E69-7B682284CDDD", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_9:*:*:*:*:*:*", "matchCriteriaId": "77BCD102-59A4-45A6-ADEF-CAB7F70E2377", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update2:*:*:*:*:*:*", "matchCriteriaId": "B8F93BBE-1E8C-4EB3-BCC7-20AB2D813F98", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_01:*:*:*:*:*:*:*", "matchCriteriaId": "27A472AF-049D-4D63-841C-1EF737E8D64D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_1:*:*:*:*:*:*:*", "matchCriteriaId": "1EEAB662-644A-4D7B-8237-64142CF48724", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_2:*:*:*:*:*:*:*", "matchCriteriaId": "D9598A49-95F2-42DB-B92C-CD026F739B83", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_02:*:*:*:*:*:*:*", "matchCriteriaId": "DB48B161-C239-4BB5-8667-7ACA5A5437F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_03:*:*:*:*:*:*:*", "matchCriteriaId": "83629616-1814-4858-B09F-79BEA82D6F55", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_3:*:*:*:*:*:*:*", "matchCriteriaId": "BED1009E-AE60-43A0-A0F5-38526EFCF423", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_4:*:*:*:*:*:*:*", "matchCriteriaId": "D011585C-0E62-4233-85FA-F29A07D68DA7", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_04:*:*:*:*:*:*:*", "matchCriteriaId": "03E8F351-F900-436E-A726-55AE31FBF832", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_05:*:*:*:*:*:*:*", "matchCriteriaId": "F76B79C6-ADD0-4992-A4BD-423A0AD38714", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_5:*:*:*:*:*:*:*", "matchCriteriaId": "F226D898-F0E8-41D8-BF40-54DE9FB5426D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_06:*:*:*:*:*:*:*", "matchCriteriaId": "FBFD41B5-6E33-4B00-81E8-9D91B0A03BD8", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_6:*:*:*:*:*:*:*", "matchCriteriaId": "4CB9CCD1-A67D-4800-9EC5-6E1A0B0B76E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_7:*:*:*:*:*:*:*", "matchCriteriaId": "CE28C283-447A-4F83-B96B-69F96E663C1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_07:*:*:*:*:*:*:*", "matchCriteriaId": "685D3F7F-30B9-4EB8-90FC-66A2A067A510", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_8:*:*:*:*:*:*:*", "matchCriteriaId": "D102063B-2434-4141-98E7-2DE501AE1728", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_08:*:*:*:*:*:*:*", "matchCriteriaId": "722B704B-A422-4163-AD48-F30CA4A07002", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_09:*:*:*:*:*:*:*", "matchCriteriaId": "C05784DC-626B-4D8D-A4DF-A42AC87131DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_9:*:*:*:*:*:*:*", "matchCriteriaId": "03B8CD03-CD31-4F4D-BA90-59435578A4F9", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_10:*:*:*:*:*:*:*", "matchCriteriaId": "41A994BF-1F64-480A-8AA5-748DDD0AB68C", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_11:*:*:*:*:*:*:*", "matchCriteriaId": "88519F2D-AD06-4F05-BEDA-A09216F1B481", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_12:*:*:*:*:*:*:*", "matchCriteriaId": "AC728978-368D-4B36-B149-70473E92BD1B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_13:*:*:*:*:*:*:*", "matchCriteriaId": "FD5187B1-CB86-48E8-A595-9FCFD9822C0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_14:*:*:*:*:*:*:*", "matchCriteriaId": "6C660DE4-543A-4E9B-825D-CD099D08CBD8", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_15:*:*:*:*:*:*:*", "matchCriteriaId": "98C1942E-16C0-4EB2-AB57-43EC6EC9C3A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_16:*:*:*:*:*:*:*", "matchCriteriaId": "318719C9-7B01-4021-B2EF-8341254DFE6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_17:*:*:*:*:*:*:*", "matchCriteriaId": "DB8FA9BA-51CA-4473-9FE1-9A32FB8C8041", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_18:*:*:*:*:*:*:*", "matchCriteriaId": "CC5E64B6-77DA-44BC-B646-AE01041B1830", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_19:*:*:*:*:*:*:*", "matchCriteriaId": "2DA35E80-9E0E-4A26-B631-A61542BE4739", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_20:*:*:*:*:*:*:*", "matchCriteriaId": "7EEB5367-1BB8-4ED3-8C04-ABA6BAA5AD10", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_21:*:*:*:*:*:*:*", "matchCriteriaId": "BED9E7C8-0418-4733-A496-61CCFD638859", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_22:*:*:*:*:*:*:*", "matchCriteriaId": "6566CE32-E042-424A-893B-C8A9E26E2869", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_1:*:*:*:*:*:*", "matchCriteriaId": "14E6127E-A40D-437D-B57B-0D7F57D08559", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_11:*:*:*:*:*:*", "matchCriteriaId": "28AE4411-45D1-4978-BA61-334AD04FF8FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_12:*:*:*:*:*:*", "matchCriteriaId": "479EB097-495A-4730-AF51-F2C0064EBA6E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_13:*:*:*:*:*:*", "matchCriteriaId": "9B3E7C12-8D97-42CC-9B2B-A0AE3267DE69", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_14:*:*:*:*:*:*", "matchCriteriaId": "5024BE9F-CE32-4099-A646-F3EC5DB6F63C", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_15:*:*:*:*:*:*", "matchCriteriaId": "DA9FB72A-C55F-4878-89D5-375FDA08163B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_16:*:*:*:*:*:*", "matchCriteriaId": "1CBC2A9C-9F21-4509-BA72-28B5DB16E55D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_17:*:*:*:*:*:*", "matchCriteriaId": "485F5ED3-062D-4A8E-AA34-9DC95D0D9646", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_18:*:*:*:*:*:*", "matchCriteriaId": "124364C5-0616-4C7A-A78F-08FABAA785CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_19:*:*:*:*:*:*", "matchCriteriaId": "A6BFFF1E-20D6-4508-9842-E7AB35F12B1D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_2:*:*:*:*:*:*", "matchCriteriaId": "DB7307A5-6F20-44FD-9D09-8FB76E444500", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_20:*:*:*:*:*:*", "matchCriteriaId": "2E7F3992-0C15-4371-BE14-0D2046B3976E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_21:*:*:*:*:*:*", "matchCriteriaId": "C5759CBC-D910-407D-83DF-A77FBDC8555D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_3:*:*:*:*:*:*", "matchCriteriaId": "0E45DE8A-477B-4BF7-893B-D11DDEE82E82", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_4:*:*:*:*:*:*", "matchCriteriaId": "D107CE0B-2EF2-4CF0-869E-3E27CBCA4997", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_5:*:*:*:*:*:*", "matchCriteriaId": "81DABB45-F39C-4BF4-8F2B-0CEE60A44C00", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_6:*:*:*:*:*:*", "matchCriteriaId": "CDDBD68A-771C-44FD-96A3-3AE189DE2591", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_7:*:*:*:*:*:*", "matchCriteriaId": "8FBD21F3-AC92-4154-948E-509FB8E097F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_8:*:*:*:*:*:*", "matchCriteriaId": "D91F9E0C-0A76-4DBC-A4E5-74E6682A5765", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_9:*:*:*:*:*:*", "matchCriteriaId": "86F7EF21-5395-4F1F-A15D-A1C7EDBFAB2A", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:*", "matchCriteriaId": "09027C19-D442-446F-B7A8-21DB6787CF43", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_10:*:*:*:*:*:*", "matchCriteriaId": "0A0FEC28-0707-4F42-9740-78F3D2D551EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_11:*:*:*:*:*:*", "matchCriteriaId": "C3C5879A-A608-4230-9DC1-C27F0F48A13B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_12:*:*:*:*:*:*", "matchCriteriaId": "0C71089A-BDDE-41FC-9DF9-9AEF4C2374DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_13:*:*:*:*:*:*", "matchCriteriaId": "2DBB6B73-8D6B-41FF-BEE0-E0C7F5F1EB41", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_14:*:*:*:*:*:*", "matchCriteriaId": "12A3B254-8580-45DB-BDE4-5B5A29CBFFB3", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_15:*:*:*:*:*:*", "matchCriteriaId": "1DB1DE6A-66AE-499B-AD92-9E6ACE474C6D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_16:*:*:*:*:*:*", "matchCriteriaId": "AADBB4F9-E43E-428B-9979-F47A15696C85", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_2:*:*:*:*:*:*", "matchCriteriaId": "7158D2C0-E9AC-4CD6-B777-EA7B7A181997", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_3:*:*:*:*:*:*", "matchCriteriaId": "90EC6C13-4B37-48E5-8199-A702A944D5A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_4:*:*:*:*:*:*", "matchCriteriaId": "2528152C-E20A-4D97-931C-A5EC3CEAA06D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_5:*:*:*:*:*:*", "matchCriteriaId": "A99DAB4C-272B-4C91-BC70-7729E1152590", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_6:*:*:*:*:*:*", "matchCriteriaId": "30DFC10A-A4D9-4F89-B17C-AB9260087D29", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_7:*:*:*:*:*:*", "matchCriteriaId": "272A5C44-18EC-41A9-8233-E9D4D0734EA6", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_8:*:*:*:*:*:*", "matchCriteriaId": "3DA21490-E253-4BDC-9BA8-5D068BE35189", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_9:*:*:*:*:*:*", "matchCriteriaId": "81C2C04D-D4BA-4C87-9609-C53AA63BFF19", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_1:*:*:*:*:*:*:*", "matchCriteriaId": "6F6453C9-7EE0-4FFB-861D-C2D9416DCABA", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_2:*:*:*:*:*:*:*", "matchCriteriaId": "89BF16DE-EEAB-4DA5-BFF1-7A0A58DE141F", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_02:*:*:*:*:*:*:*", "matchCriteriaId": "AF4E34FD-D927-42BB-8A16-031D77CB4B9E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_03:*:*:*:*:*:*:*", "matchCriteriaId": "37A3D49A-BE20-47BF-A85F-122357BAB098", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_3:*:*:*:*:*:*:*", "matchCriteriaId": "6DDE253E-C8B6-4C1D-AECE-ABEA1A67306B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_04:*:*:*:*:*:*:*", "matchCriteriaId": "F45DB5D3-7F35-4531-9A82-24EB50034787", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_4:*:*:*:*:*:*:*", "matchCriteriaId": "A56D9A60-F272-4D4C-A9DD-C93DAF783585", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_5:*:*:*:*:*:*:*", "matchCriteriaId": "EF109CAA-E8D2-4BD7-BE7C-AF8B2A78672E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_05:*:*:*:*:*:*:*", "matchCriteriaId": "4695F707-12E8-4BA4-BBE1-C21CB7213A2A", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_6:*:*:*:*:*:*:*", "matchCriteriaId": "976F4ACB-3725-45B7-B2EF-DEE4B88254E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_06:*:*:*:*:*:*:*", "matchCriteriaId": "C918FB49-DA13-4326-BE86-6F6BEA4CE4E1", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_07:*:*:*:*:*:*:*", "matchCriteriaId": "5573CAD1-39D1-4ADB-BB95-EBB554B43B4E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_7:*:*:*:*:*:*:*", "matchCriteriaId": "52BDD6A8-1611-4C3C-865D-6EDB5B9F8D88", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_8:*:*:*:*:*:*:*", "matchCriteriaId": "6A1F28FF-652A-4C89-9AC6-5E212F890811", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_08:*:*:*:*:*:*:*", "matchCriteriaId": "DD02EBDF-6E51-4538-9EDD-B1DE914D09C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_09:*:*:*:*:*:*:*", "matchCriteriaId": "53C3C0E3-5F40-412B-A4AD-A7A291DE2A08", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_9:*:*:*:*:*:*:*", "matchCriteriaId": "96A8C351-E9CD-431B-8B9D-712CA54C7213", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_10:*:*:*:*:*:*:*", "matchCriteriaId": "36888382-79C8-4C97-A654-C668CD68556F", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_11:*:*:*:*:*:*:*", "matchCriteriaId": "F34C99E6-F9F0-4EF3-8601-B47EAE3D7273", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_12:*:*:*:*:*:*:*", "matchCriteriaId": "A74DD08D-CEDB-460E-BED5-78F6CAF18BF5", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_13:*:*:*:*:*:*:*", "matchCriteriaId": "E60560EC-6DBD-4A17-BFFA-FAD9193A0BC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_14:*:*:*:*:*:*:*", "matchCriteriaId": "E4F64FBC-DC97-4FE3-A235-18B87945AF7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_15:*:*:*:*:*:*:*", "matchCriteriaId": "85048406-9051-4E69-94A8-5C449F3B89E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_16:*:*:*:*:*:*:*", "matchCriteriaId": "B1C88DD7-0B46-4405-BD35-60D27E2DBA14", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_17:*:*:*:*:*:*:*", "matchCriteriaId": "08D23B7C-7B8C-41B8-8D94-BB0F27C7F0A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_18:*:*:*:*:*:*:*", "matchCriteriaId": "1C49B997-95D3-4DA4-A353-DB41AD461C5E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_19:*:*:*:*:*:*:*", "matchCriteriaId": "6F70EF76-ED5F-4835-8252-FE613604FA3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_20:*:*:*:*:*:*:*", "matchCriteriaId": "6BDBCAD8-CDF7-4550-8EA2-1409B02FFAD6", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_21:*:*:*:*:*:*:*", "matchCriteriaId": "7E691333-0434-4808-9ED4-E82C6EC2FD37", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_22:*:*:*:*:*:*:*", "matchCriteriaId": "BBE7A538-FF2E-4622-8479-781AB73CBA45", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Integer overflow in the JPEGImageReader implementation in the ImageI/O component in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to execute arbitrary code via large subsample dimensions in a JPEG file that triggers a heap-based buffer overflow, aka Bug Id 6874643." }, { "lang": "es", "value": "Desbordamiento de entero en la implementacion JPEGImageReader en el componente ImageI/O en Sun Java SE en JDK y JRE v5.0 anteriores a Update 22, JDK y JRE 6 anteriores a Update 17, y SDK y JRE v1.4.x anteriores a v1.4.2_24 permite a los atacantes remotos ejecutar arbitrariamente c\u00f3digo a trav\u00e9s de submuestra de dimensi\u00f3n larga en un archivo JPEG que lanza un desbordamiento de b\u00fafer basado en memoria din\u00e1mica, tambi\u00e9n conocido como Id 6874643." } ], "evaluatorSolution": "Per: http://sunsolve.sun.com/search/document.do?assetkey=1-66-270474-1\r\n\r\nResolution\r\n\r\nCR 6854303, 6862970, 6872357, 6872358, and 6862969 are addressed in the following releases:\r\n\r\nJava SE for Windows, Solaris, and Linux:\r\n\r\n * JDK and JRE 6 Update 17 or later\r\n * JDK and JRE 5.0 Update 22 or later\r\n\r\nJava SE for Solaris:\r\n\r\n * SDK and JRE 1.4.2_24 or later\r\n\r\nJava SE for Windows:\r\n\r\n * SDK and JRE 1.3.1_27 or later\r\n\r\nJava SE for Business for Windows, Solaris and Linux:\r\n\r\n * JDK and JRE 6 Update 17 or later\r\n * JDK and JRE 5.0 Update 22 or later\r\n * SDK and JRE 1.4.2_24 or later\r\n\r\nThe issues described in CR 6874643 and 6862968 are addressed in the following releases:\r\n\r\nJava SE for Windows, Solaris, and Linux:\r\n\r\n * JDK and JRE 6 Update 17 or later\r\n * JDK and JRE 5.0 Update 22 or later\r\n\r\nJava SE for Solaris:\r\n\r\n * SDK and JRE 1.4.2_24 or later\r\n\r\nJava SE for Business for Windows, Solaris and Linux:\r\n\r\n * JDK and JRE 6 Update 17 or later\r\n * JDK and JRE 5.0 Update 22 or later\r\n * SDK and JRE 1.4.2_24 or later\r\n\r\nJava SE releases are available at:\r\n\r\nJDK and JRE 6 Update 17:\r\n\r\n * http://java.sun.com/javase/downloads/index.jsp\r\n\r\nJRE 6 Update 17:\r\n\r\n * http://java.com/\r\n * Through the Java Update tool for Microsoft Windows users\r\n\r\nJDK 6 Update 17 for Solaris is available in the following patches:\r\n\r\n * Java SE 6: update 17 (as delivered in patch 125136-18)\r\n * Java SE 6: update 17 (as delivered in patch 125137-18 (64bit))\r\n * Java SE 6_x86: update 17 (as delivered in patch 125138-18)\r\n * Java SE 6_x86: update 17 (as delivered in patch 125139-18 (64bit))\r\n\r\nJDK and JRE 5.0 Update 22:\r\n\r\n * http://java.sun.com/javase/downloads/index_jdk5.jsp\r\n\r\nJDK 5.0 Update 22 for Solaris is available in the following patches:\r\n\r\n * J2SE 5.0: update 22 (as delivered in patch 118666-24)\r\n * J2SE 5.0: update 22 (as delivered in patch 118667-24 (64bit))\r\n * J2SE 5.0_x86: update 22 (as delivered in patch 118668-24)\r\n * J2SE 5.0_x86: update 22 (as delivered in patch 118669-24 (64bit))\r\n\r\nJava SE for Business releases are available at:\r\n\r\n * http://www.sun.com/software/javaseforbusiness/getit_download.jsp\r\n", "id": "CVE-2009-3874", "lastModified": "2024-11-21T01:08:23.860", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2009-11-05T16:30:00.483", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://java.sun.com/javase/6/webnotes/6u17.html" }, { "source": "cve@mitre.org", "url": "http://lists.apple.com/archives/security-announce/2009/Dec/msg00000.html" }, { "source": "cve@mitre.org", "url": "http://lists.apple.com/archives/security-announce/2009/Dec/msg00001.html" }, { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00010.html" }, { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=126566824131534\u0026w=2" }, { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=126566824131534\u0026w=2" }, { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=131593453929393\u0026w=2" }, { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=131593453929393\u0026w=2" }, { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=134254866602253\u0026w=2" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/37231" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/37239" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/37386" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/37581" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/37841" }, { "source": "cve@mitre.org", "url": "http://security.gentoo.org/glsa/glsa-200911-02.xml" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1023132" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-270474-1" }, { "source": "cve@mitre.org", "url": "http://support.apple.com/kb/HT3969" }, { "source": "cve@mitre.org", "url": "http://support.apple.com/kb/HT3970" }, { "source": "cve@mitre.org", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:084" }, { "source": "cve@mitre.org", "url": "http://www.oracle.com/technetwork/topics/security/cpujan2010-084891.html" }, { "source": "cve@mitre.org", "url": "http://www.redhat.com/support/errata/RHSA-2009-1694.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/36881" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2009/3131" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://zerodayinitiative.com/advisories/ZDI-09-080/" }, { "source": "cve@mitre.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11566" }, { "source": "cve@mitre.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12057" }, { "source": "cve@mitre.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7442" }, { "source": "cve@mitre.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8603" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://java.sun.com/javase/6/webnotes/6u17.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.apple.com/archives/security-announce/2009/Dec/msg00000.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.apple.com/archives/security-announce/2009/Dec/msg00001.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00010.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=126566824131534\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=126566824131534\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=131593453929393\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=131593453929393\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=134254866602253\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/37231" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/37239" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/37386" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/37581" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/37841" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-200911-02.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1023132" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-270474-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://support.apple.com/kb/HT3969" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://support.apple.com/kb/HT3970" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:084" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.oracle.com/technetwork/topics/security/cpujan2010-084891.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2009-1694.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/36881" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2009/3131" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://zerodayinitiative.com/advisories/ZDI-09-080/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11566" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12057" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7442" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8603" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-189" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2009-08-10 18:30
Modified
2024-11-21 01:04
Severity ?
Summary
Sun Java SE 5.0 before Update 20 and 6 before Update 15, and OpenJDK, might allow context-dependent attackers to obtain sensitive information via vectors involving static variables that are declared without the final keyword, related to (1) LayoutQueue, (2) Cursor.predefined, (3) AccessibleResourceBundle.getContents, (4) ImageReaderSpi.STANDARD_INPUT_TYPE, (5) ImageWriterSpi.STANDARD_OUTPUT_TYPE, (6) the imageio plugins, (7) DnsContext.debug, (8) RmfFileReader/StandardMidiFileWriter.types, (9) AbstractSaslImpl.logger, (10) Synth.Region.uiToRegionMap/lowerCaseNameMap, (11) the Introspector class and a cache of BeanInfo, and (12) JAX-WS, a different vulnerability than CVE-2009-2673.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sun:java_se:*:20:*:*:*:*:*:*", "matchCriteriaId": "625B941A-B638-46C2-A840-83724D5F826B", "versionEndIncluding": "5.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_se:*:14:*:*:*:*:*:*", "matchCriteriaId": "EB9DE8D5-D4F6-45DE-9DB4-9E5BB7E518F9", "versionEndIncluding": "6", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:openjdk:*:*:*:*:*:*:*:*", "matchCriteriaId": "0E78309B-E13F-4B65-9F59-39A993B900AF", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Sun Java SE 5.0 before Update 20 and 6 before Update 15, and OpenJDK, might allow context-dependent attackers to obtain sensitive information via vectors involving static variables that are declared without the final keyword, related to (1) LayoutQueue, (2) Cursor.predefined, (3) AccessibleResourceBundle.getContents, (4) ImageReaderSpi.STANDARD_INPUT_TYPE, (5) ImageWriterSpi.STANDARD_OUTPUT_TYPE, (6) the imageio plugins, (7) DnsContext.debug, (8) RmfFileReader/StandardMidiFileWriter.types, (9) AbstractSaslImpl.logger, (10) Synth.Region.uiToRegionMap/lowerCaseNameMap, (11) the Introspector class and a cache of BeanInfo, and (12) JAX-WS, a different vulnerability than CVE-2009-2673." }, { "lang": "es", "value": "Sun Java SE v5.0 anterior a la actualizaci\u00f3n 20 y v6 anterior a la actualizaci\u00f3n 15, y OpenJDK, pueden permitir a atacantes dependientes del contexto obtener informaci\u00f3n confidencial a trav\u00e9s de vectores de ataque relacionados con variables est\u00e1ticas que son declaradas sin la palabra clave \"final\" relacionadas con (1) LayoutQueue, (2) Cursor.predefined, (3) AccessibleResourceBundle.getContents, (4) ImageReaderSpi.STANDARD_INPUT_TYPE, (5) ImageWriterSpi.STANDARD_OUTPUT_TYPE, (6) los complementos (\"plugins\") imageio, (7) DnsContext.debug, (8) RmfFileReader/StandardMidiFileWriter.types, (9) AbstractSaslImpl.logger, (10) Synth.Region.uiToRegionMap/lowerCaseNameMap, (11) la clase \"Introspector\" y una cach\u00e9 de BeanInfo, y (12) JAX-WS, una vulnerabilidad diferente de CVE-2009-2673." } ], "id": "CVE-2009-2475", "lastModified": "2024-11-21T01:04:57.820", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 7.8, "confidentialityImpact": "COMPLETE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2009-08-10T18:30:00.360", "references": [ { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://java.sun.com/j2se/1.5.0/ReleaseNotes.html" }, { "source": "secalert@redhat.com", "url": "http://java.sun.com/javase/6/webnotes/6u15.html" }, { "source": "secalert@redhat.com", "url": "http://lists.apple.com/archives/security-announce/2009/Sep/msg00000.html" }, { "source": "secalert@redhat.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00001.html" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/36162" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/36176" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/36180" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/36199" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/37386" }, { "source": "secalert@redhat.com", "url": "http://security.gentoo.org/glsa/glsa-200911-02.xml" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-118667-22-1" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-125139-16-1" }, { "source": "secalert@redhat.com", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:209" }, { "source": "secalert@redhat.com", "url": "http://www.vupen.com/english/advisories/2009/2543" }, { "source": "secalert@redhat.com", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=513215" }, { "source": "secalert@redhat.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10221" }, { "source": "secalert@redhat.com", "url": "https://rhn.redhat.com/errata/RHSA-2009-1199.html" }, { "source": "secalert@redhat.com", "url": "https://rhn.redhat.com/errata/RHSA-2009-1200.html" }, { "source": "secalert@redhat.com", "url": "https://rhn.redhat.com/errata/RHSA-2009-1201.html" }, { "source": "secalert@redhat.com", "url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00310.html" }, { "source": "secalert@redhat.com", "url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00325.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://java.sun.com/j2se/1.5.0/ReleaseNotes.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://java.sun.com/javase/6/webnotes/6u15.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.apple.com/archives/security-announce/2009/Sep/msg00000.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00001.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/36162" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/36176" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/36180" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/36199" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/37386" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-200911-02.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-118667-22-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-125139-16-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:209" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2009/2543" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=513215" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10221" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://rhn.redhat.com/errata/RHSA-2009-1199.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://rhn.redhat.com/errata/RHSA-2009-1200.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://rhn.redhat.com/errata/RHSA-2009-1201.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00310.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00325.html" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2009-08-10 20:30
Modified
2024-11-21 01:05
Severity ?
Summary
The plugin functionality in Sun Java SE 6 before Update 15 does not properly implement version selection, which allows context-dependent attackers to leverage vulnerabilities in "old zip and certificate handling" and have unspecified other impact via unknown vectors.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sun:java_se:*:14:*:*:*:*:*:*", "matchCriteriaId": "EB9DE8D5-D4F6-45DE-9DB4-9E5BB7E518F9", "versionEndIncluding": "6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The plugin functionality in Sun Java SE 6 before Update 15 does not properly implement version selection, which allows context-dependent attackers to leverage vulnerabilities in \"old zip and certificate handling\" and have unspecified other impact via unknown vectors." }, { "lang": "es", "value": "La funcionalidad de plugin en Sun Java SE v6 versiones anteriores a Update 15 no implementa adecuadamente la selecci\u00f3n de versi\u00f3n, permitiendo a atacantes dependientes del contexto aprovechar vulnerabilidades en \"gesti\u00f3n antigua de ficheros zip y certificados\" y tener otro impacto no especificado mediante vectores desconocidos." } ], "id": "CVE-2009-2716", "lastModified": "2024-11-21T01:05:35.050", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2009-08-10T20:30:00.517", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://java.sun.com/javase/6/webnotes/6u15.html" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/37386" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/37460" }, { "source": "cve@mitre.org", "url": "http://security.gentoo.org/glsa/glsa-200911-02.xml" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2009/3316" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://java.sun.com/javase/6/webnotes/6u15.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/37386" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/37460" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-200911-02.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2009/3316" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2009-08-10 20:30
Modified
2024-11-21 01:05
Severity ?
Summary
Multiple unspecified vulnerabilities in the Provider class in Sun Java SE 5.0 before Update 20 have unknown impact and attack vectors, aka BugId 6429594. NOTE: this issue exists because of an incorrect fix for BugId 6406003.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sun:java_se:*:19:*:*:*:*:*:*", "matchCriteriaId": "DC8CDBBF-43EC-4FC0-BD17-C54BEB14F547", "versionEndIncluding": "5.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple unspecified vulnerabilities in the Provider class in Sun Java SE 5.0 before Update 20 have unknown impact and attack vectors, aka BugId 6429594. NOTE: this issue exists because of an incorrect fix for BugId 6406003." }, { "lang": "es", "value": "M\u00faltiples vulnerabilidades sin especificar en la clase Provider en Sun Java SE v5.0 anterior a la actualizaci\u00f3n 20, tiene un impacto y vectores de ataque desconocidos, tambi\u00e9n conocido como BugId 6429594. NOTA: esta vulnerabilidad existe por una incorrecta correcci\u00f3n del BugId 6406003." } ], "id": "CVE-2009-2722", "lastModified": "2024-11-21T01:05:36.080", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2009-08-10T20:30:00.657", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://java.sun.com/j2se/1.5.0/ReleaseNotes.html" }, { "source": "cve@mitre.org", "url": "http://lists.apple.com/archives/security-announce/2009/Sep/msg00000.html" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/37386" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/37460" }, { "source": "cve@mitre.org", "url": "http://security.gentoo.org/glsa/glsa-200911-02.xml" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-118667-22-1" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2009/2543" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2009/3316" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://java.sun.com/j2se/1.5.0/ReleaseNotes.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.apple.com/archives/security-announce/2009/Sep/msg00000.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/37386" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/37460" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-200911-02.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-118667-22-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2009/2543" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2009/3316" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2009-11-05 16:30
Modified
2024-11-21 01:08
Severity ?
Summary
Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 does not properly parse color profiles, which allows remote attackers to gain privileges via a crafted image file, aka Bug Id 6862970.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.4.2_1 | |
sun | jre | 1.4.2_2 | |
sun | jre | 1.4.2_02 | |
sun | jre | 1.4.2_03 | |
sun | jre | 1.4.2_3 | |
sun | jre | 1.4.2_4 | |
sun | jre | 1.4.2_04 | |
sun | jre | 1.4.2_05 | |
sun | jre | 1.4.2_5 | |
sun | jre | 1.4.2_06 | |
sun | jre | 1.4.2_6 | |
sun | jre | 1.4.2_7 | |
sun | jre | 1.4.2_07 | |
sun | jre | 1.4.2_8 | |
sun | jre | 1.4.2_08 | |
sun | jre | 1.4.2_09 | |
sun | jre | 1.4.2_9 | |
sun | jre | 1.4.2_10 | |
sun | jre | 1.4.2_11 | |
sun | jre | 1.4.2_12 | |
sun | jre | 1.4.2_13 | |
sun | jre | 1.4.2_14 | |
sun | jre | 1.4.2_15 | |
sun | jre | 1.4.2_16 | |
sun | jre | 1.4.2_17 | |
sun | jre | 1.4.2_18 | |
sun | jre | 1.4.2_19 | |
sun | jre | 1.4.2_20 | |
sun | jre | 1.4.2_21 | |
sun | jre | 1.4.2_22 | |
sun | sdk | 1.4.2_01 | |
sun | sdk | 1.4.2_1 | |
sun | sdk | 1.4.2_2 | |
sun | sdk | 1.4.2_02 | |
sun | sdk | 1.4.2_03 | |
sun | sdk | 1.4.2_3 | |
sun | sdk | 1.4.2_04 | |
sun | sdk | 1.4.2_4 | |
sun | sdk | 1.4.2_5 | |
sun | sdk | 1.4.2_05 | |
sun | sdk | 1.4.2_6 | |
sun | sdk | 1.4.2_06 | |
sun | sdk | 1.4.2_07 | |
sun | sdk | 1.4.2_7 | |
sun | sdk | 1.4.2_8 | |
sun | sdk | 1.4.2_08 | |
sun | sdk | 1.4.2_09 | |
sun | sdk | 1.4.2_9 | |
sun | sdk | 1.4.2_10 | |
sun | sdk | 1.4.2_11 | |
sun | sdk | 1.4.2_12 | |
sun | sdk | 1.4.2_13 | |
sun | sdk | 1.4.2_14 | |
sun | sdk | 1.4.2_15 | |
sun | sdk | 1.4.2_16 | |
sun | sdk | 1.4.2_17 | |
sun | sdk | 1.4.2_18 | |
sun | sdk | 1.4.2_19 | |
sun | sdk | 1.4.2_20 | |
sun | sdk | 1.4.2_21 | |
sun | sdk | 1.4.2_22 | |
sun | solaris | * | |
sun | jre | 1.3.1_1 | |
sun | jre | 1.3.1_01 | |
sun | jre | 1.3.1_01a | |
sun | jre | 1.3.1_02 | |
sun | jre | 1.3.1_2 | |
sun | jre | 1.3.1_03 | |
sun | jre | 1.3.1_3 | |
sun | jre | 1.3.1_4 | |
sun | jre | 1.3.1_04 | |
sun | jre | 1.3.1_05 | |
sun | jre | 1.3.1_5 | |
sun | jre | 1.3.1_06 | |
sun | jre | 1.3.1_6 | |
sun | jre | 1.3.1_07 | |
sun | jre | 1.3.1_7 | |
sun | jre | 1.3.1_8 | |
sun | jre | 1.3.1_08 | |
sun | jre | 1.3.1_9 | |
sun | jre | 1.3.1_09 | |
sun | jre | 1.3.1_10 | |
sun | jre | 1.3.1_11 | |
sun | jre | 1.3.1_12 | |
sun | jre | 1.3.1_13 | |
sun | jre | 1.3.1_14 | |
sun | jre | 1.3.1_15 | |
sun | jre | 1.3.1_16 | |
sun | jre | 1.3.1_17 | |
sun | jre | 1.3.1_18 | |
sun | jre | 1.3.1_19 | |
sun | jre | 1.3.1_20 | |
sun | jre | 1.3.1_21 | |
sun | jre | 1.3.1_22 | |
sun | jre | 1.3.1_23 | |
sun | jre | 1.3.1_24 | |
sun | jre | 1.3.1_25 | |
sun | sdk | 1.3.1_01 | |
sun | sdk | 1.3.1_01a | |
sun | sdk | 1.3.1_2 | |
sun | sdk | 1.3.1_02 | |
sun | sdk | 1.3.1_03 | |
sun | sdk | 1.3.1_3 | |
sun | sdk | 1.3.1_4 | |
sun | sdk | 1.3.1_04 | |
sun | sdk | 1.3.1_5 | |
sun | sdk | 1.3.1_05 | |
sun | sdk | 1.3.1_6 | |
sun | sdk | 1.3.1_06 | |
sun | sdk | 1.3.1_7 | |
sun | sdk | 1.3.1_07 | |
sun | sdk | 1.3.1_8 | |
sun | sdk | 1.3.1_08 | |
sun | sdk | 1.3.1_9 | |
sun | sdk | 1.3.1_09 | |
sun | sdk | 1.3.1_10 | |
sun | sdk | 1.3.1_11 | |
sun | sdk | 1.3.1_12 | |
sun | sdk | 1.3.1_13 | |
sun | sdk | 1.3.1_14 | |
sun | sdk | 1.3.1_15 | |
sun | sdk | 1.3.1_16 | |
sun | sdk | 1.3.1_17 | |
sun | sdk | 1.3.1_18 | |
sun | sdk | 1.3.1_19 | |
sun | sdk | 1.3.1_20 | |
sun | sdk | 1.3.1_21 | |
sun | sdk | 1.3.1_22 | |
sun | sdk | 1.3.1_23 | |
sun | sdk | 1.3.1_24 | |
sun | sdk | 1.3.1_25 | |
microsoft | windows | * | |
sun | java_se | * | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jre | 1.4.2_01 | |
sun | jre | 1.4.2_1 | |
sun | jre | 1.4.2_2 | |
sun | jre | 1.4.2_02 | |
sun | jre | 1.4.2_03 | |
sun | jre | 1.4.2_3 | |
sun | jre | 1.4.2_4 | |
sun | jre | 1.4.2_04 | |
sun | jre | 1.4.2_05 | |
sun | jre | 1.4.2_5 | |
sun | jre | 1.4.2_06 | |
sun | jre | 1.4.2_6 | |
sun | jre | 1.4.2_7 | |
sun | jre | 1.4.2_07 | |
sun | jre | 1.4.2_8 | |
sun | jre | 1.4.2_08 | |
sun | jre | 1.4.2_09 | |
sun | jre | 1.4.2_9 | |
sun | jre | 1.4.2_10 | |
sun | jre | 1.4.2_11 | |
sun | jre | 1.4.2_12 | |
sun | jre | 1.4.2_13 | |
sun | jre | 1.4.2_14 | |
sun | jre | 1.4.2_15 | |
sun | jre | 1.4.2_16 | |
sun | jre | 1.4.2_17 | |
sun | jre | 1.4.2_18 | |
sun | jre | 1.4.2_19 | |
sun | jre | 1.4.2_20 | |
sun | jre | 1.4.2_21 | |
sun | jre | 1.4.2_22 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | sdk | 1.4.2_1 | |
sun | sdk | 1.4.2_2 | |
sun | sdk | 1.4.2_02 | |
sun | sdk | 1.4.2_03 | |
sun | sdk | 1.4.2_3 | |
sun | sdk | 1.4.2_04 | |
sun | sdk | 1.4.2_4 | |
sun | sdk | 1.4.2_5 | |
sun | sdk | 1.4.2_05 | |
sun | sdk | 1.4.2_6 | |
sun | sdk | 1.4.2_06 | |
sun | sdk | 1.4.2_07 | |
sun | sdk | 1.4.2_7 | |
sun | sdk | 1.4.2_8 | |
sun | sdk | 1.4.2_08 | |
sun | sdk | 1.4.2_09 | |
sun | sdk | 1.4.2_9 | |
sun | sdk | 1.4.2_10 | |
sun | sdk | 1.4.2_11 | |
sun | sdk | 1.4.2_12 | |
sun | sdk | 1.4.2_13 | |
sun | sdk | 1.4.2_14 | |
sun | sdk | 1.4.2_15 | |
sun | sdk | 1.4.2_16 | |
sun | sdk | 1.4.2_17 | |
sun | sdk | 1.4.2_18 | |
sun | sdk | 1.4.2_19 | |
sun | sdk | 1.4.2_20 | |
sun | sdk | 1.4.2_21 | |
sun | sdk | 1.4.2_22 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_1:*:*:*:*:*:*", "matchCriteriaId": "8198F493-0447-4A87-9F16-5B6CB3572E38", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_10:*:*:*:*:*:*", "matchCriteriaId": "645BBE6D-BA5E-4D93-9152-759A2355013E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_11:*:*:*:*:*:*", "matchCriteriaId": "0EE694C9-940A-4899-844C-AC63412FA295", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_12:*:*:*:*:*:*", "matchCriteriaId": "BC9476DD-9B56-4811-A248-711C25181F29", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_13:*:*:*:*:*:*", "matchCriteriaId": "68D34082-2948-4D95-B43F-FBD59E2F3D28", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_14:*:*:*:*:*:*", "matchCriteriaId": "F2E01C07-4921-47CC-9AFC-D3B461D0B78D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_15:*:*:*:*:*:*", "matchCriteriaId": "7532E7D4-2F62-4DA0-B905-F95A0A735CE5", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_16:*:*:*:*:*:*", "matchCriteriaId": "0AF93193-889E-4F44-ADEB-E89E56DE6C7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_17:*:*:*:*:*:*", "matchCriteriaId": "68C19440-4172-4539-8E38-09DBCB1752E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_18:*:*:*:*:*:*", "matchCriteriaId": "3CC000EC-9717-47DA-B182-6C8CD3970F27", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_19:*:*:*:*:*:*", "matchCriteriaId": "115083C5-811F-47BA-8549-3BDFF9CA0740", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_2:*:*:*:*:*:*", "matchCriteriaId": "51337B8C-78F2-4207-998E-A3FC591F538B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_20:*:*:*:*:*:*", "matchCriteriaId": "48193108-CD9F-476E-A7D2-E0796F659BA5", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_21:*:*:*:*:*:*", "matchCriteriaId": "A0A80299-783A-4FBA-9EBF-5913942949A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_3:*:*:*:*:*:*", "matchCriteriaId": "76A4F852-0240-44D6-9BD5-FE79DEF16438", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_4:*:*:*:*:*:*", "matchCriteriaId": "F57E5943-5CC3-4736-85E8-FE7CC4F38735", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_5:*:*:*:*:*:*", "matchCriteriaId": "3C228E00-0F5C-41D2-8BD0-46AF682AE842", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_6:*:*:*:*:*:*", "matchCriteriaId": "0329E813-B2C8-4C84-BCAF-2D54C4AE0472", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_7:*:*:*:*:*:*", "matchCriteriaId": "7E3C40E1-7005-4F83-B347-177BEC9EE339", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_8:*:*:*:*:*:*", "matchCriteriaId": "6855E3F5-6F8E-44FA-A913-0D0F6A803DFF", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_9:*:*:*:*:*:*", "matchCriteriaId": "C79BDB6E-442B-41F1-A025-C17648A81FD9", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_1:*:*:*:*:*:*", "matchCriteriaId": "EBB09CE1-F4AC-472C-8D5D-594AEB322CFD", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_10:*:*:*:*:*:*", "matchCriteriaId": "722A93D8-B5BC-42F3-92A2-E424F61269A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_11:*:*:*:*:*:*", "matchCriteriaId": "775F2611-F11C-4B84-8F40-0D034B81BF18", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_12:*:*:*:*:*:*", "matchCriteriaId": "F20FDD9F-FF45-48BC-9207-54FB02E76071", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_13:*:*:*:*:*:*", "matchCriteriaId": "9FA326F5-894A-4B01-BCA3-B126DA81CA59", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_14:*:*:*:*:*:*", "matchCriteriaId": "228AB7B4-4BA4-43D4-B562-D438884DB152", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_15:*:*:*:*:*:*", "matchCriteriaId": "AFD5C688-2103-4D60-979E-D9BE69A989C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_16:*:*:*:*:*:*", "matchCriteriaId": "21421215-F722-4207-A2E5-E2DF4B29859B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_3:*:*:*:*:*:*", "matchCriteriaId": "D98175BF-B084-4FA5-899D-9E80DC3923EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_4:*:*:*:*:*:*", "matchCriteriaId": "820632CE-F8DF-47EE-B716-7530E60008B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_5:*:*:*:*:*:*", "matchCriteriaId": "FA2BD0A3-7B2D-447B-ABAC-7B867B03B632", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_6:*:*:*:*:*:*", "matchCriteriaId": "D54AB785-E9B7-47BD-B756-0C3A629D67DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_7:*:*:*:*:*:*", "matchCriteriaId": "E9412098-0353-4F7B-9245-010557E6C651", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_8:*:*:*:*:*:*", "matchCriteriaId": "FB0E9224-3D12-47E2-8E69-7B682284CDDD", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_9:*:*:*:*:*:*", "matchCriteriaId": "77BCD102-59A4-45A6-ADEF-CAB7F70E2377", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_1:*:*:*:*:*:*", "matchCriteriaId": "14E6127E-A40D-437D-B57B-0D7F57D08559", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_11:*:*:*:*:*:*", "matchCriteriaId": "28AE4411-45D1-4978-BA61-334AD04FF8FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_12:*:*:*:*:*:*", "matchCriteriaId": "479EB097-495A-4730-AF51-F2C0064EBA6E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_13:*:*:*:*:*:*", "matchCriteriaId": "9B3E7C12-8D97-42CC-9B2B-A0AE3267DE69", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_14:*:*:*:*:*:*", "matchCriteriaId": "5024BE9F-CE32-4099-A646-F3EC5DB6F63C", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_15:*:*:*:*:*:*", "matchCriteriaId": "DA9FB72A-C55F-4878-89D5-375FDA08163B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_16:*:*:*:*:*:*", "matchCriteriaId": "1CBC2A9C-9F21-4509-BA72-28B5DB16E55D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_17:*:*:*:*:*:*", "matchCriteriaId": "485F5ED3-062D-4A8E-AA34-9DC95D0D9646", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_18:*:*:*:*:*:*", "matchCriteriaId": "124364C5-0616-4C7A-A78F-08FABAA785CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_19:*:*:*:*:*:*", "matchCriteriaId": "A6BFFF1E-20D6-4508-9842-E7AB35F12B1D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_2:*:*:*:*:*:*", "matchCriteriaId": "DB7307A5-6F20-44FD-9D09-8FB76E444500", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_20:*:*:*:*:*:*", "matchCriteriaId": "2E7F3992-0C15-4371-BE14-0D2046B3976E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_21:*:*:*:*:*:*", "matchCriteriaId": "C5759CBC-D910-407D-83DF-A77FBDC8555D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_3:*:*:*:*:*:*", "matchCriteriaId": "0E45DE8A-477B-4BF7-893B-D11DDEE82E82", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_4:*:*:*:*:*:*", "matchCriteriaId": "D107CE0B-2EF2-4CF0-869E-3E27CBCA4997", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_5:*:*:*:*:*:*", "matchCriteriaId": "81DABB45-F39C-4BF4-8F2B-0CEE60A44C00", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_6:*:*:*:*:*:*", "matchCriteriaId": "CDDBD68A-771C-44FD-96A3-3AE189DE2591", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_7:*:*:*:*:*:*", "matchCriteriaId": "8FBD21F3-AC92-4154-948E-509FB8E097F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_8:*:*:*:*:*:*", "matchCriteriaId": "D91F9E0C-0A76-4DBC-A4E5-74E6682A5765", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_9:*:*:*:*:*:*", "matchCriteriaId": "86F7EF21-5395-4F1F-A15D-A1C7EDBFAB2A", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:*", "matchCriteriaId": "09027C19-D442-446F-B7A8-21DB6787CF43", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_10:*:*:*:*:*:*", "matchCriteriaId": "0A0FEC28-0707-4F42-9740-78F3D2D551EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_11:*:*:*:*:*:*", "matchCriteriaId": "C3C5879A-A608-4230-9DC1-C27F0F48A13B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_12:*:*:*:*:*:*", "matchCriteriaId": "0C71089A-BDDE-41FC-9DF9-9AEF4C2374DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_13:*:*:*:*:*:*", "matchCriteriaId": "2DBB6B73-8D6B-41FF-BEE0-E0C7F5F1EB41", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_14:*:*:*:*:*:*", "matchCriteriaId": "12A3B254-8580-45DB-BDE4-5B5A29CBFFB3", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_15:*:*:*:*:*:*", "matchCriteriaId": "1DB1DE6A-66AE-499B-AD92-9E6ACE474C6D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_16:*:*:*:*:*:*", "matchCriteriaId": "AADBB4F9-E43E-428B-9979-F47A15696C85", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_2:*:*:*:*:*:*", "matchCriteriaId": "7158D2C0-E9AC-4CD6-B777-EA7B7A181997", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_3:*:*:*:*:*:*", "matchCriteriaId": "90EC6C13-4B37-48E5-8199-A702A944D5A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_4:*:*:*:*:*:*", "matchCriteriaId": "2528152C-E20A-4D97-931C-A5EC3CEAA06D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_5:*:*:*:*:*:*", "matchCriteriaId": "A99DAB4C-272B-4C91-BC70-7729E1152590", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_6:*:*:*:*:*:*", "matchCriteriaId": "30DFC10A-A4D9-4F89-B17C-AB9260087D29", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_7:*:*:*:*:*:*", "matchCriteriaId": "272A5C44-18EC-41A9-8233-E9D4D0734EA6", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_8:*:*:*:*:*:*", "matchCriteriaId": "3DA21490-E253-4BDC-9BA8-5D068BE35189", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_9:*:*:*:*:*:*", "matchCriteriaId": "81C2C04D-D4BA-4C87-9609-C53AA63BFF19", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sun:jre:1.4.2_1:*:*:*:*:*:*:*", "matchCriteriaId": "1EEAB662-644A-4D7B-8237-64142CF48724", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_2:*:*:*:*:*:*:*", "matchCriteriaId": "D9598A49-95F2-42DB-B92C-CD026F739B83", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_02:*:*:*:*:*:*:*", "matchCriteriaId": "DB48B161-C239-4BB5-8667-7ACA5A5437F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_03:*:*:*:*:*:*:*", "matchCriteriaId": "83629616-1814-4858-B09F-79BEA82D6F55", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_3:*:*:*:*:*:*:*", "matchCriteriaId": "BED1009E-AE60-43A0-A0F5-38526EFCF423", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_4:*:*:*:*:*:*:*", "matchCriteriaId": "D011585C-0E62-4233-85FA-F29A07D68DA7", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_04:*:*:*:*:*:*:*", "matchCriteriaId": "03E8F351-F900-436E-A726-55AE31FBF832", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_05:*:*:*:*:*:*:*", "matchCriteriaId": "F76B79C6-ADD0-4992-A4BD-423A0AD38714", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_5:*:*:*:*:*:*:*", "matchCriteriaId": "F226D898-F0E8-41D8-BF40-54DE9FB5426D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_06:*:*:*:*:*:*:*", "matchCriteriaId": "FBFD41B5-6E33-4B00-81E8-9D91B0A03BD8", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_6:*:*:*:*:*:*:*", "matchCriteriaId": "4CB9CCD1-A67D-4800-9EC5-6E1A0B0B76E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_7:*:*:*:*:*:*:*", "matchCriteriaId": "CE28C283-447A-4F83-B96B-69F96E663C1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_07:*:*:*:*:*:*:*", "matchCriteriaId": "685D3F7F-30B9-4EB8-90FC-66A2A067A510", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_8:*:*:*:*:*:*:*", "matchCriteriaId": "D102063B-2434-4141-98E7-2DE501AE1728", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_08:*:*:*:*:*:*:*", "matchCriteriaId": "722B704B-A422-4163-AD48-F30CA4A07002", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_09:*:*:*:*:*:*:*", "matchCriteriaId": "C05784DC-626B-4D8D-A4DF-A42AC87131DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_9:*:*:*:*:*:*:*", "matchCriteriaId": "03B8CD03-CD31-4F4D-BA90-59435578A4F9", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_10:*:*:*:*:*:*:*", "matchCriteriaId": "41A994BF-1F64-480A-8AA5-748DDD0AB68C", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_11:*:*:*:*:*:*:*", "matchCriteriaId": "88519F2D-AD06-4F05-BEDA-A09216F1B481", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_12:*:*:*:*:*:*:*", "matchCriteriaId": "AC728978-368D-4B36-B149-70473E92BD1B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_13:*:*:*:*:*:*:*", "matchCriteriaId": "FD5187B1-CB86-48E8-A595-9FCFD9822C0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_14:*:*:*:*:*:*:*", "matchCriteriaId": "6C660DE4-543A-4E9B-825D-CD099D08CBD8", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_15:*:*:*:*:*:*:*", "matchCriteriaId": "98C1942E-16C0-4EB2-AB57-43EC6EC9C3A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_16:*:*:*:*:*:*:*", "matchCriteriaId": "318719C9-7B01-4021-B2EF-8341254DFE6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_17:*:*:*:*:*:*:*", "matchCriteriaId": "DB8FA9BA-51CA-4473-9FE1-9A32FB8C8041", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_18:*:*:*:*:*:*:*", "matchCriteriaId": "CC5E64B6-77DA-44BC-B646-AE01041B1830", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_19:*:*:*:*:*:*:*", "matchCriteriaId": "2DA35E80-9E0E-4A26-B631-A61542BE4739", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_20:*:*:*:*:*:*:*", "matchCriteriaId": "7EEB5367-1BB8-4ED3-8C04-ABA6BAA5AD10", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_21:*:*:*:*:*:*:*", "matchCriteriaId": "BED9E7C8-0418-4733-A496-61CCFD638859", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_22:*:*:*:*:*:*:*", "matchCriteriaId": "6566CE32-E042-424A-893B-C8A9E26E2869", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_01:*:*:*:*:*:*:*", "matchCriteriaId": "E6C4CA79-9D0A-4E47-A1A4-9CBEDDCFE05E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_1:*:*:*:*:*:*:*", "matchCriteriaId": "6F6453C9-7EE0-4FFB-861D-C2D9416DCABA", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_2:*:*:*:*:*:*:*", "matchCriteriaId": "89BF16DE-EEAB-4DA5-BFF1-7A0A58DE141F", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_02:*:*:*:*:*:*:*", "matchCriteriaId": "AF4E34FD-D927-42BB-8A16-031D77CB4B9E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_03:*:*:*:*:*:*:*", "matchCriteriaId": "37A3D49A-BE20-47BF-A85F-122357BAB098", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_3:*:*:*:*:*:*:*", "matchCriteriaId": "6DDE253E-C8B6-4C1D-AECE-ABEA1A67306B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_04:*:*:*:*:*:*:*", "matchCriteriaId": "F45DB5D3-7F35-4531-9A82-24EB50034787", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_4:*:*:*:*:*:*:*", "matchCriteriaId": "A56D9A60-F272-4D4C-A9DD-C93DAF783585", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_5:*:*:*:*:*:*:*", "matchCriteriaId": "EF109CAA-E8D2-4BD7-BE7C-AF8B2A78672E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_05:*:*:*:*:*:*:*", "matchCriteriaId": "4695F707-12E8-4BA4-BBE1-C21CB7213A2A", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_6:*:*:*:*:*:*:*", "matchCriteriaId": "976F4ACB-3725-45B7-B2EF-DEE4B88254E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_06:*:*:*:*:*:*:*", "matchCriteriaId": "C918FB49-DA13-4326-BE86-6F6BEA4CE4E1", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_07:*:*:*:*:*:*:*", "matchCriteriaId": "5573CAD1-39D1-4ADB-BB95-EBB554B43B4E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_7:*:*:*:*:*:*:*", "matchCriteriaId": "52BDD6A8-1611-4C3C-865D-6EDB5B9F8D88", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_8:*:*:*:*:*:*:*", "matchCriteriaId": "6A1F28FF-652A-4C89-9AC6-5E212F890811", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_08:*:*:*:*:*:*:*", "matchCriteriaId": "DD02EBDF-6E51-4538-9EDD-B1DE914D09C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_09:*:*:*:*:*:*:*", "matchCriteriaId": "53C3C0E3-5F40-412B-A4AD-A7A291DE2A08", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_9:*:*:*:*:*:*:*", "matchCriteriaId": "96A8C351-E9CD-431B-8B9D-712CA54C7213", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_10:*:*:*:*:*:*:*", "matchCriteriaId": "36888382-79C8-4C97-A654-C668CD68556F", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_11:*:*:*:*:*:*:*", "matchCriteriaId": "F34C99E6-F9F0-4EF3-8601-B47EAE3D7273", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_12:*:*:*:*:*:*:*", "matchCriteriaId": "A74DD08D-CEDB-460E-BED5-78F6CAF18BF5", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_13:*:*:*:*:*:*:*", "matchCriteriaId": "E60560EC-6DBD-4A17-BFFA-FAD9193A0BC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_14:*:*:*:*:*:*:*", "matchCriteriaId": "E4F64FBC-DC97-4FE3-A235-18B87945AF7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_15:*:*:*:*:*:*:*", "matchCriteriaId": "85048406-9051-4E69-94A8-5C449F3B89E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_16:*:*:*:*:*:*:*", "matchCriteriaId": "B1C88DD7-0B46-4405-BD35-60D27E2DBA14", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_17:*:*:*:*:*:*:*", "matchCriteriaId": "08D23B7C-7B8C-41B8-8D94-BB0F27C7F0A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_18:*:*:*:*:*:*:*", "matchCriteriaId": "1C49B997-95D3-4DA4-A353-DB41AD461C5E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_19:*:*:*:*:*:*:*", "matchCriteriaId": "6F70EF76-ED5F-4835-8252-FE613604FA3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_20:*:*:*:*:*:*:*", "matchCriteriaId": "6BDBCAD8-CDF7-4550-8EA2-1409B02FFAD6", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_21:*:*:*:*:*:*:*", "matchCriteriaId": "7E691333-0434-4808-9ED4-E82C6EC2FD37", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_22:*:*:*:*:*:*:*", "matchCriteriaId": "BBE7A538-FF2E-4622-8479-781AB73CBA45", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:sun:solaris:*:*:*:*:*:*:*:*", "matchCriteriaId": "469B74F2-4B89-42B8-8638-731E92D463B9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sun:jre:1.3.1_1:*:*:*:*:*:*:*", "matchCriteriaId": "EA460D9A-662F-4861-9835-3D3116FB9488", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_01:*:*:*:*:*:*:*", "matchCriteriaId": "7E49A68E-0886-4AED-8FF4-9455914BFE16", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_01a:*:*:*:*:*:*:*", "matchCriteriaId": "E94B0A27-60D3-42F5-9DF6-75F481C2460D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_02:*:*:*:*:*:*:*", "matchCriteriaId": "89E95205-DB64-44AD-81A4-B77BD7595AAF", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_2:*:*:*:*:*:*:*", "matchCriteriaId": "0875E34D-8544-49B9-BAD9-8191CC103A07", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_03:*:*:*:*:*:*:*", "matchCriteriaId": "62E772B9-8E41-476F-81F5-87B41F1827A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_3:*:*:*:*:*:*:*", "matchCriteriaId": "B9643B49-FC4B-4AD4-90AC-939DDAA96518", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_4:*:*:*:*:*:*:*", "matchCriteriaId": "F76773E5-0A91-49B8-8C9C-DD64AB9F74BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_04:*:*:*:*:*:*:*", "matchCriteriaId": "7CE78463-2CE8-43C6-BB06-AA40C72B1A4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_05:*:*:*:*:*:*:*", "matchCriteriaId": "31A04480-92DF-49AD-9B36-7F1FCB29DE90", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_5:*:*:*:*:*:*:*", "matchCriteriaId": "ADF93A34-0535-4289-B12C-A1E1E22C13D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_06:*:*:*:*:*:*:*", "matchCriteriaId": "E2FD0B72-683D-4FF6-BCF5-5DE85BF3064B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_6:*:*:*:*:*:*:*", "matchCriteriaId": "EC85B851-FEC7-4299-9EC5-D8A69E16B89C", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_07:*:*:*:*:*:*:*", "matchCriteriaId": "F78CD4B5-4B1D-4128-8AEA-2F967C38C6C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_7:*:*:*:*:*:*:*", "matchCriteriaId": "1B4E5018-6A0B-4F26-96AA-AD8F6EA7FB3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_8:*:*:*:*:*:*:*", "matchCriteriaId": "2978CF34-D48B-4ED2-A0C1-3CFAA5867223", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_08:*:*:*:*:*:*:*", "matchCriteriaId": "62CAA3E7-9D65-48F3-ACF7-9D705D94DE54", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_9:*:*:*:*:*:*:*", "matchCriteriaId": "2C0E6EA5-0D9F-4B15-860A-5DA3FD1765B8", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_09:*:*:*:*:*:*:*", "matchCriteriaId": "477C310B-50AD-4D40-8EDB-4A80F0BF321D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_10:*:*:*:*:*:*:*", "matchCriteriaId": "60A1F526-6B28-47A3-8D2C-06CA067E9164", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_11:*:*:*:*:*:*:*", "matchCriteriaId": "17F09D9E-B04B-477E-86E6-E1B1F9650973", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_12:*:*:*:*:*:*:*", "matchCriteriaId": "6F929C59-9602-4962-95B4-4165D66E5935", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_13:*:*:*:*:*:*:*", "matchCriteriaId": "E8B76949-9282-44D0-8075-74E482CE9A82", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_14:*:*:*:*:*:*:*", "matchCriteriaId": "B9B072DD-FC4F-4E07-9837-0E16017CA4AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_15:*:*:*:*:*:*:*", "matchCriteriaId": "969BE4EC-4D13-4B74-8137-FA0F83F0FDC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_16:*:*:*:*:*:*:*", "matchCriteriaId": "86408019-1B53-4AA8-9F05-47EBD0466EE2", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_17:*:*:*:*:*:*:*", "matchCriteriaId": "81F47561-F59C-4904-8E05-D8A9629405A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_18:*:*:*:*:*:*:*", "matchCriteriaId": "FB067445-8EA5-460F-B625-C21251E5A8D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_19:*:*:*:*:*:*:*", "matchCriteriaId": "B4C075BC-607E-47A1-A32D-B912D2FA03BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_20:*:*:*:*:*:*:*", "matchCriteriaId": "007175B8-48DB-46BE-B971-FB57B6A33723", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_21:*:*:*:*:*:*:*", "matchCriteriaId": "D5E6F92A-FC59-4CE7-B7F8-94CBF3DC8F21", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_22:*:*:*:*:*:*:*", "matchCriteriaId": "496901D5-014D-4920-A343-91A56F6FEFA0", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_23:*:*:*:*:*:*:*", "matchCriteriaId": "B2D18FBC-4C9B-4722-90AB-028D281654F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_24:*:*:*:*:*:*:*", "matchCriteriaId": "853BC114-592C-43FE-B227-EF41C494DC98", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_25:*:*:*:*:*:*:*", "matchCriteriaId": "B1F4E031-CE92-48C4-BECC-7C1190DB477A", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_01:*:*:*:*:*:*:*", "matchCriteriaId": "34710306-D6CF-4D07-84BF-71A8839BE416", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_01a:*:*:*:*:*:*:*", "matchCriteriaId": "44B93DC8-6375-4B41-B9BC-F22F592C56B9", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_2:*:*:*:*:*:*:*", "matchCriteriaId": "16AD9E9E-D6BD-4FCD-B857-F5013033200F", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_02:*:*:*:*:*:*:*", "matchCriteriaId": "87BF46A9-8E4A-4583-B35F-052FD481DF66", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_03:*:*:*:*:*:*:*", "matchCriteriaId": "32B351BB-6CA6-4CEF-9F5D-ED47774FC676", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_3:*:*:*:*:*:*:*", "matchCriteriaId": "21300F7C-6904-456C-949D-C0AFA630F4A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_4:*:*:*:*:*:*:*", "matchCriteriaId": "776FA44E-6277-4236-A872-103E7DDE5040", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_04:*:*:*:*:*:*:*", "matchCriteriaId": "CDA40FCD-1D34-4C47-908F-697433236153", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_5:*:*:*:*:*:*:*", "matchCriteriaId": "63267A02-DCE2-4B86-B370-B90F03C7E341", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_05:*:*:*:*:*:*:*", "matchCriteriaId": "00639A84-BD03-4BD9-A655-F806693DBC8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_6:*:*:*:*:*:*:*", "matchCriteriaId": "2E2AE42E-0E25-468F-A8CB-03991F356338", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_06:*:*:*:*:*:*:*", "matchCriteriaId": "14824B23-FF9F-4D6D-9D02-12B79BE346A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_7:*:*:*:*:*:*:*", "matchCriteriaId": "5E015A65-708E-45B9-B66A-2D0F09638FF5", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_07:*:*:*:*:*:*:*", "matchCriteriaId": "6493744C-A69D-4377-937E-85E7F5535EA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_8:*:*:*:*:*:*:*", "matchCriteriaId": "F86BA5FB-A611-458E-8E37-4D4927D04D89", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_08:*:*:*:*:*:*:*", "matchCriteriaId": "C09019B1-B873-41CE-951E-4777F324729C", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_9:*:*:*:*:*:*:*", "matchCriteriaId": "03949794-A1DD-420F-A468-8F00AEA7B69E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_09:*:*:*:*:*:*:*", "matchCriteriaId": "EC4209A0-E73F-4B5A-9925-B5D20F879455", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_10:*:*:*:*:*:*:*", "matchCriteriaId": "297DF5AD-FC22-432B-AE6A-2B1E6CFE1BE4", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_11:*:*:*:*:*:*:*", "matchCriteriaId": "BFB8516D-03C4-478D-AFE2-824867FDC739", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_12:*:*:*:*:*:*:*", "matchCriteriaId": "F82AED17-FEC3-47D0-A395-26ACD07FBE52", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_13:*:*:*:*:*:*:*", "matchCriteriaId": "9630BC7B-9039-4FA6-86F8-5274783F3EB1", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_14:*:*:*:*:*:*:*", "matchCriteriaId": "F1A6A15C-216A-42B1-84EF-B3D9A313D4A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_15:*:*:*:*:*:*:*", "matchCriteriaId": "EC39C819-9439-4029-8377-F6D58B3DFDFB", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_16:*:*:*:*:*:*:*", "matchCriteriaId": "A053DEF6-1317-4DA8-91D7-E1970DA62351", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_17:*:*:*:*:*:*:*", "matchCriteriaId": "F0DBFDD8-40AE-44F2-8F02-FB7A4FAE5235", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_18:*:*:*:*:*:*:*", "matchCriteriaId": "EB0605FF-3DDC-4F3A-8171-F3A447E9C292", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_19:*:*:*:*:*:*:*", "matchCriteriaId": "801FF3B4-0729-4710-BFC2-4B078029944F", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_20:*:*:*:*:*:*:*", "matchCriteriaId": "8EB8591E-3D6E-489B-B0D6-CEBB9D09EA68", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_21:*:*:*:*:*:*:*", "matchCriteriaId": "8A411676-6666-4B54-A008-443B9B42F670", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_22:*:*:*:*:*:*:*", "matchCriteriaId": "0AEDC9B2-8AA6-4DA2-A187-49A1DD106725", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_23:*:*:*:*:*:*:*", "matchCriteriaId": "8F69BEE4-CB4B-436A-9838-13239B368CF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_24:*:*:*:*:*:*:*", "matchCriteriaId": "11AC1050-38AF-49F4-A40C-AAF9710204AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_25:*:*:*:*:*:*:*", "matchCriteriaId": "8FA939E8-8747-4532-B6B4-6E83824C7067", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sun:java_se:*:*:business:*:*:*:*:*", "matchCriteriaId": "CB9A3291-3F2C-40E9-81D3-D148002E1782", "vulnerable": false } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_1:*:*:*:*:*:*", "matchCriteriaId": "8198F493-0447-4A87-9F16-5B6CB3572E38", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_10:*:*:*:*:*:*", "matchCriteriaId": "645BBE6D-BA5E-4D93-9152-759A2355013E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_11:*:*:*:*:*:*", "matchCriteriaId": "0EE694C9-940A-4899-844C-AC63412FA295", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_12:*:*:*:*:*:*", "matchCriteriaId": "BC9476DD-9B56-4811-A248-711C25181F29", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_13:*:*:*:*:*:*", "matchCriteriaId": "68D34082-2948-4D95-B43F-FBD59E2F3D28", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_14:*:*:*:*:*:*", "matchCriteriaId": "F2E01C07-4921-47CC-9AFC-D3B461D0B78D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_15:*:*:*:*:*:*", "matchCriteriaId": "7532E7D4-2F62-4DA0-B905-F95A0A735CE5", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_16:*:*:*:*:*:*", "matchCriteriaId": "0AF93193-889E-4F44-ADEB-E89E56DE6C7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_17:*:*:*:*:*:*", "matchCriteriaId": "68C19440-4172-4539-8E38-09DBCB1752E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_18:*:*:*:*:*:*", "matchCriteriaId": "3CC000EC-9717-47DA-B182-6C8CD3970F27", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_19:*:*:*:*:*:*", "matchCriteriaId": "115083C5-811F-47BA-8549-3BDFF9CA0740", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_2:*:*:*:*:*:*", "matchCriteriaId": "51337B8C-78F2-4207-998E-A3FC591F538B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_20:*:*:*:*:*:*", "matchCriteriaId": "48193108-CD9F-476E-A7D2-E0796F659BA5", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_21:*:*:*:*:*:*", "matchCriteriaId": "A0A80299-783A-4FBA-9EBF-5913942949A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_3:*:*:*:*:*:*", "matchCriteriaId": "76A4F852-0240-44D6-9BD5-FE79DEF16438", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_4:*:*:*:*:*:*", "matchCriteriaId": "F57E5943-5CC3-4736-85E8-FE7CC4F38735", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_5:*:*:*:*:*:*", "matchCriteriaId": "3C228E00-0F5C-41D2-8BD0-46AF682AE842", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_6:*:*:*:*:*:*", "matchCriteriaId": "0329E813-B2C8-4C84-BCAF-2D54C4AE0472", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_7:*:*:*:*:*:*", "matchCriteriaId": "7E3C40E1-7005-4F83-B347-177BEC9EE339", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_8:*:*:*:*:*:*", "matchCriteriaId": "6855E3F5-6F8E-44FA-A913-0D0F6A803DFF", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_9:*:*:*:*:*:*", "matchCriteriaId": "C79BDB6E-442B-41F1-A025-C17648A81FD9", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_1:*:*:*:*:*:*", "matchCriteriaId": "EBB09CE1-F4AC-472C-8D5D-594AEB322CFD", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_10:*:*:*:*:*:*", "matchCriteriaId": "722A93D8-B5BC-42F3-92A2-E424F61269A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_11:*:*:*:*:*:*", "matchCriteriaId": "775F2611-F11C-4B84-8F40-0D034B81BF18", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_12:*:*:*:*:*:*", "matchCriteriaId": "F20FDD9F-FF45-48BC-9207-54FB02E76071", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_13:*:*:*:*:*:*", "matchCriteriaId": "9FA326F5-894A-4B01-BCA3-B126DA81CA59", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_14:*:*:*:*:*:*", "matchCriteriaId": "228AB7B4-4BA4-43D4-B562-D438884DB152", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_15:*:*:*:*:*:*", "matchCriteriaId": "AFD5C688-2103-4D60-979E-D9BE69A989C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_16:*:*:*:*:*:*", "matchCriteriaId": "21421215-F722-4207-A2E5-E2DF4B29859B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_3:*:*:*:*:*:*", "matchCriteriaId": "D98175BF-B084-4FA5-899D-9E80DC3923EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_4:*:*:*:*:*:*", "matchCriteriaId": "820632CE-F8DF-47EE-B716-7530E60008B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_5:*:*:*:*:*:*", "matchCriteriaId": "FA2BD0A3-7B2D-447B-ABAC-7B867B03B632", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_6:*:*:*:*:*:*", "matchCriteriaId": "D54AB785-E9B7-47BD-B756-0C3A629D67DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_7:*:*:*:*:*:*", "matchCriteriaId": "E9412098-0353-4F7B-9245-010557E6C651", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_8:*:*:*:*:*:*", "matchCriteriaId": "FB0E9224-3D12-47E2-8E69-7B682284CDDD", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_9:*:*:*:*:*:*", "matchCriteriaId": "77BCD102-59A4-45A6-ADEF-CAB7F70E2377", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update2:*:*:*:*:*:*", "matchCriteriaId": "B8F93BBE-1E8C-4EB3-BCC7-20AB2D813F98", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_01:*:*:*:*:*:*:*", "matchCriteriaId": "27A472AF-049D-4D63-841C-1EF737E8D64D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_1:*:*:*:*:*:*:*", "matchCriteriaId": "1EEAB662-644A-4D7B-8237-64142CF48724", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_2:*:*:*:*:*:*:*", "matchCriteriaId": "D9598A49-95F2-42DB-B92C-CD026F739B83", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_02:*:*:*:*:*:*:*", "matchCriteriaId": "DB48B161-C239-4BB5-8667-7ACA5A5437F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_03:*:*:*:*:*:*:*", "matchCriteriaId": "83629616-1814-4858-B09F-79BEA82D6F55", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_3:*:*:*:*:*:*:*", "matchCriteriaId": "BED1009E-AE60-43A0-A0F5-38526EFCF423", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_4:*:*:*:*:*:*:*", "matchCriteriaId": "D011585C-0E62-4233-85FA-F29A07D68DA7", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_04:*:*:*:*:*:*:*", "matchCriteriaId": "03E8F351-F900-436E-A726-55AE31FBF832", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_05:*:*:*:*:*:*:*", "matchCriteriaId": "F76B79C6-ADD0-4992-A4BD-423A0AD38714", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_5:*:*:*:*:*:*:*", "matchCriteriaId": "F226D898-F0E8-41D8-BF40-54DE9FB5426D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_06:*:*:*:*:*:*:*", "matchCriteriaId": "FBFD41B5-6E33-4B00-81E8-9D91B0A03BD8", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_6:*:*:*:*:*:*:*", "matchCriteriaId": "4CB9CCD1-A67D-4800-9EC5-6E1A0B0B76E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_7:*:*:*:*:*:*:*", "matchCriteriaId": "CE28C283-447A-4F83-B96B-69F96E663C1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_07:*:*:*:*:*:*:*", "matchCriteriaId": "685D3F7F-30B9-4EB8-90FC-66A2A067A510", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_8:*:*:*:*:*:*:*", "matchCriteriaId": "D102063B-2434-4141-98E7-2DE501AE1728", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_08:*:*:*:*:*:*:*", "matchCriteriaId": "722B704B-A422-4163-AD48-F30CA4A07002", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_09:*:*:*:*:*:*:*", "matchCriteriaId": "C05784DC-626B-4D8D-A4DF-A42AC87131DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_9:*:*:*:*:*:*:*", "matchCriteriaId": "03B8CD03-CD31-4F4D-BA90-59435578A4F9", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_10:*:*:*:*:*:*:*", "matchCriteriaId": "41A994BF-1F64-480A-8AA5-748DDD0AB68C", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_11:*:*:*:*:*:*:*", "matchCriteriaId": "88519F2D-AD06-4F05-BEDA-A09216F1B481", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_12:*:*:*:*:*:*:*", "matchCriteriaId": "AC728978-368D-4B36-B149-70473E92BD1B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_13:*:*:*:*:*:*:*", "matchCriteriaId": "FD5187B1-CB86-48E8-A595-9FCFD9822C0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_14:*:*:*:*:*:*:*", "matchCriteriaId": "6C660DE4-543A-4E9B-825D-CD099D08CBD8", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_15:*:*:*:*:*:*:*", "matchCriteriaId": "98C1942E-16C0-4EB2-AB57-43EC6EC9C3A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_16:*:*:*:*:*:*:*", "matchCriteriaId": "318719C9-7B01-4021-B2EF-8341254DFE6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_17:*:*:*:*:*:*:*", "matchCriteriaId": "DB8FA9BA-51CA-4473-9FE1-9A32FB8C8041", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_18:*:*:*:*:*:*:*", "matchCriteriaId": "CC5E64B6-77DA-44BC-B646-AE01041B1830", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_19:*:*:*:*:*:*:*", "matchCriteriaId": "2DA35E80-9E0E-4A26-B631-A61542BE4739", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_20:*:*:*:*:*:*:*", "matchCriteriaId": "7EEB5367-1BB8-4ED3-8C04-ABA6BAA5AD10", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_21:*:*:*:*:*:*:*", "matchCriteriaId": "BED9E7C8-0418-4733-A496-61CCFD638859", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_22:*:*:*:*:*:*:*", "matchCriteriaId": "6566CE32-E042-424A-893B-C8A9E26E2869", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_1:*:*:*:*:*:*", "matchCriteriaId": "14E6127E-A40D-437D-B57B-0D7F57D08559", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_11:*:*:*:*:*:*", "matchCriteriaId": "28AE4411-45D1-4978-BA61-334AD04FF8FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_12:*:*:*:*:*:*", "matchCriteriaId": "479EB097-495A-4730-AF51-F2C0064EBA6E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_13:*:*:*:*:*:*", "matchCriteriaId": "9B3E7C12-8D97-42CC-9B2B-A0AE3267DE69", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_14:*:*:*:*:*:*", "matchCriteriaId": "5024BE9F-CE32-4099-A646-F3EC5DB6F63C", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_15:*:*:*:*:*:*", "matchCriteriaId": "DA9FB72A-C55F-4878-89D5-375FDA08163B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_16:*:*:*:*:*:*", "matchCriteriaId": "1CBC2A9C-9F21-4509-BA72-28B5DB16E55D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_17:*:*:*:*:*:*", "matchCriteriaId": "485F5ED3-062D-4A8E-AA34-9DC95D0D9646", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_18:*:*:*:*:*:*", "matchCriteriaId": "124364C5-0616-4C7A-A78F-08FABAA785CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_19:*:*:*:*:*:*", "matchCriteriaId": "A6BFFF1E-20D6-4508-9842-E7AB35F12B1D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_2:*:*:*:*:*:*", "matchCriteriaId": "DB7307A5-6F20-44FD-9D09-8FB76E444500", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_20:*:*:*:*:*:*", "matchCriteriaId": "2E7F3992-0C15-4371-BE14-0D2046B3976E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_21:*:*:*:*:*:*", "matchCriteriaId": "C5759CBC-D910-407D-83DF-A77FBDC8555D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_3:*:*:*:*:*:*", "matchCriteriaId": "0E45DE8A-477B-4BF7-893B-D11DDEE82E82", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_4:*:*:*:*:*:*", "matchCriteriaId": "D107CE0B-2EF2-4CF0-869E-3E27CBCA4997", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_5:*:*:*:*:*:*", "matchCriteriaId": "81DABB45-F39C-4BF4-8F2B-0CEE60A44C00", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_6:*:*:*:*:*:*", "matchCriteriaId": "CDDBD68A-771C-44FD-96A3-3AE189DE2591", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_7:*:*:*:*:*:*", "matchCriteriaId": "8FBD21F3-AC92-4154-948E-509FB8E097F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_8:*:*:*:*:*:*", "matchCriteriaId": "D91F9E0C-0A76-4DBC-A4E5-74E6682A5765", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_9:*:*:*:*:*:*", "matchCriteriaId": "86F7EF21-5395-4F1F-A15D-A1C7EDBFAB2A", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:*", "matchCriteriaId": "09027C19-D442-446F-B7A8-21DB6787CF43", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_10:*:*:*:*:*:*", "matchCriteriaId": "0A0FEC28-0707-4F42-9740-78F3D2D551EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_11:*:*:*:*:*:*", "matchCriteriaId": "C3C5879A-A608-4230-9DC1-C27F0F48A13B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_12:*:*:*:*:*:*", "matchCriteriaId": "0C71089A-BDDE-41FC-9DF9-9AEF4C2374DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_13:*:*:*:*:*:*", "matchCriteriaId": "2DBB6B73-8D6B-41FF-BEE0-E0C7F5F1EB41", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_14:*:*:*:*:*:*", "matchCriteriaId": "12A3B254-8580-45DB-BDE4-5B5A29CBFFB3", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_15:*:*:*:*:*:*", "matchCriteriaId": "1DB1DE6A-66AE-499B-AD92-9E6ACE474C6D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_16:*:*:*:*:*:*", "matchCriteriaId": "AADBB4F9-E43E-428B-9979-F47A15696C85", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_2:*:*:*:*:*:*", "matchCriteriaId": "7158D2C0-E9AC-4CD6-B777-EA7B7A181997", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_3:*:*:*:*:*:*", "matchCriteriaId": "90EC6C13-4B37-48E5-8199-A702A944D5A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_4:*:*:*:*:*:*", "matchCriteriaId": "2528152C-E20A-4D97-931C-A5EC3CEAA06D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_5:*:*:*:*:*:*", "matchCriteriaId": "A99DAB4C-272B-4C91-BC70-7729E1152590", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_6:*:*:*:*:*:*", "matchCriteriaId": "30DFC10A-A4D9-4F89-B17C-AB9260087D29", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_7:*:*:*:*:*:*", "matchCriteriaId": "272A5C44-18EC-41A9-8233-E9D4D0734EA6", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_8:*:*:*:*:*:*", "matchCriteriaId": "3DA21490-E253-4BDC-9BA8-5D068BE35189", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_9:*:*:*:*:*:*", "matchCriteriaId": "81C2C04D-D4BA-4C87-9609-C53AA63BFF19", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_1:*:*:*:*:*:*:*", "matchCriteriaId": "6F6453C9-7EE0-4FFB-861D-C2D9416DCABA", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_2:*:*:*:*:*:*:*", "matchCriteriaId": "89BF16DE-EEAB-4DA5-BFF1-7A0A58DE141F", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_02:*:*:*:*:*:*:*", "matchCriteriaId": "AF4E34FD-D927-42BB-8A16-031D77CB4B9E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_03:*:*:*:*:*:*:*", "matchCriteriaId": "37A3D49A-BE20-47BF-A85F-122357BAB098", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_3:*:*:*:*:*:*:*", "matchCriteriaId": "6DDE253E-C8B6-4C1D-AECE-ABEA1A67306B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_04:*:*:*:*:*:*:*", "matchCriteriaId": "F45DB5D3-7F35-4531-9A82-24EB50034787", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_4:*:*:*:*:*:*:*", "matchCriteriaId": "A56D9A60-F272-4D4C-A9DD-C93DAF783585", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_5:*:*:*:*:*:*:*", "matchCriteriaId": "EF109CAA-E8D2-4BD7-BE7C-AF8B2A78672E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_05:*:*:*:*:*:*:*", "matchCriteriaId": "4695F707-12E8-4BA4-BBE1-C21CB7213A2A", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_6:*:*:*:*:*:*:*", "matchCriteriaId": "976F4ACB-3725-45B7-B2EF-DEE4B88254E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_06:*:*:*:*:*:*:*", "matchCriteriaId": "C918FB49-DA13-4326-BE86-6F6BEA4CE4E1", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_07:*:*:*:*:*:*:*", "matchCriteriaId": "5573CAD1-39D1-4ADB-BB95-EBB554B43B4E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_7:*:*:*:*:*:*:*", "matchCriteriaId": "52BDD6A8-1611-4C3C-865D-6EDB5B9F8D88", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_8:*:*:*:*:*:*:*", "matchCriteriaId": "6A1F28FF-652A-4C89-9AC6-5E212F890811", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_08:*:*:*:*:*:*:*", "matchCriteriaId": "DD02EBDF-6E51-4538-9EDD-B1DE914D09C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_09:*:*:*:*:*:*:*", "matchCriteriaId": "53C3C0E3-5F40-412B-A4AD-A7A291DE2A08", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_9:*:*:*:*:*:*:*", "matchCriteriaId": "96A8C351-E9CD-431B-8B9D-712CA54C7213", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_10:*:*:*:*:*:*:*", "matchCriteriaId": "36888382-79C8-4C97-A654-C668CD68556F", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_11:*:*:*:*:*:*:*", "matchCriteriaId": "F34C99E6-F9F0-4EF3-8601-B47EAE3D7273", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_12:*:*:*:*:*:*:*", "matchCriteriaId": "A74DD08D-CEDB-460E-BED5-78F6CAF18BF5", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_13:*:*:*:*:*:*:*", "matchCriteriaId": "E60560EC-6DBD-4A17-BFFA-FAD9193A0BC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_14:*:*:*:*:*:*:*", "matchCriteriaId": "E4F64FBC-DC97-4FE3-A235-18B87945AF7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_15:*:*:*:*:*:*:*", "matchCriteriaId": "85048406-9051-4E69-94A8-5C449F3B89E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_16:*:*:*:*:*:*:*", "matchCriteriaId": "B1C88DD7-0B46-4405-BD35-60D27E2DBA14", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_17:*:*:*:*:*:*:*", "matchCriteriaId": "08D23B7C-7B8C-41B8-8D94-BB0F27C7F0A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_18:*:*:*:*:*:*:*", "matchCriteriaId": "1C49B997-95D3-4DA4-A353-DB41AD461C5E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_19:*:*:*:*:*:*:*", "matchCriteriaId": "6F70EF76-ED5F-4835-8252-FE613604FA3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_20:*:*:*:*:*:*:*", "matchCriteriaId": "6BDBCAD8-CDF7-4550-8EA2-1409B02FFAD6", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_21:*:*:*:*:*:*:*", "matchCriteriaId": "7E691333-0434-4808-9ED4-E82C6EC2FD37", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_22:*:*:*:*:*:*:*", "matchCriteriaId": "BBE7A538-FF2E-4622-8479-781AB73CBA45", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 does not properly parse color profiles, which allows remote attackers to gain privileges via a crafted image file, aka Bug Id 6862970." }, { "lang": "es", "value": "Sun Java SE en JDK y JRE 5.0 anteriores a Update 22, JDK y JRE 6 anteriores a Update 17, SDK y JRE v1.3.x anteriores a v1.3.1_27, y SDK y JRE v1.4.x anteriores a v1.4.2_24 no analiza adecuadamente el perfil color, lo que permite a los atacantes remotos obtener privilegios a trav\u00e9s de un archivo de imagen manipulado tambi\u00e9n conocido como Bud Id 6862970." } ], "id": "CVE-2009-3868", "lastModified": "2024-11-21T01:08:22.667", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2009-11-05T16:30:00.360", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://java.sun.com/javase/6/webnotes/6u17.html" }, { "source": "cve@mitre.org", "url": "http://lists.apple.com/archives/security-announce/2009/Dec/msg00000.html" }, { "source": "cve@mitre.org", "url": "http://lists.apple.com/archives/security-announce/2009/Dec/msg00001.html" }, { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00010.html" }, { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=126566824131534\u0026w=2" }, { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=126566824131534\u0026w=2" }, { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=131593453929393\u0026w=2" }, { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=131593453929393\u0026w=2" }, { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=134254866602253\u0026w=2" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/37231" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/37239" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/37386" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/37581" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/37841" }, { "source": "cve@mitre.org", "url": "http://security.gentoo.org/glsa/glsa-200911-02.xml" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1023132" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-270474-1" }, { "source": "cve@mitre.org", "url": "http://support.apple.com/kb/HT3969" }, { "source": "cve@mitre.org", "url": "http://support.apple.com/kb/HT3970" }, { "source": "cve@mitre.org", "url": "http://www.oracle.com/technetwork/topics/security/cpujan2010-084891.html" }, { "source": "cve@mitre.org", "url": "http://www.redhat.com/support/errata/RHSA-2009-1694.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/36881" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2009/3131" }, { "source": "cve@mitre.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11834" }, { "source": "cve@mitre.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6786" }, { "source": "cve@mitre.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8622" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://java.sun.com/javase/6/webnotes/6u17.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.apple.com/archives/security-announce/2009/Dec/msg00000.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.apple.com/archives/security-announce/2009/Dec/msg00001.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00010.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=126566824131534\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=126566824131534\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=131593453929393\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=131593453929393\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=134254866602253\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/37231" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/37239" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/37386" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/37581" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/37841" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-200911-02.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1023132" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-270474-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://support.apple.com/kb/HT3969" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://support.apple.com/kb/HT3970" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.oracle.com/technetwork/topics/security/cpujan2010-084891.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2009-1694.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/36881" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2009/3131" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11834" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6786" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8622" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2009-08-05 19:30
Modified
2024-11-21 01:05
Severity ?
Summary
Unspecified vulnerability in JNLPAppletlauncher in Sun Java SE, and SE for Business, in JDK and JRE 6 Update 14 and earlier and JDK and JRE 5.0 Update 19 and earlier; and Java SE for Business in SDK and JRE 1.4.2_21 and earlier; allows remote attackers to create or modify arbitrary files via vectors involving an untrusted Java applet that accesses an old version of JNLPAppletLauncher.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
sun | java_se | * | |
sun | java_se | * | |
sun | jdk | * | |
sun | jdk | * | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jre | * | |
sun | jre | * | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | java_se | * | |
sun | jre | * | |
sun | jre | 1.4.0 | |
sun | jre | 1.4.0_01 | |
sun | jre | 1.4.0_02 | |
sun | jre | 1.4.0_03 | |
sun | jre | 1.4.0_04 | |
sun | jre | 1.4.1 | |
sun | jre | 1.4.1 | |
sun | jre | 1.4.1 | |
sun | jre | 1.4.1 | |
sun | jre | 1.4.1 | |
sun | jre | 1.4.1 | |
sun | jre | 1.4.1 | |
sun | jre | 1.4.1 | |
sun | jre | 1.4.2 | |
sun | jre | 1.4.2 | |
sun | jre | 1.4.2 | |
sun | jre | 1.4.2 | |
sun | jre | 1.4.2 | |
sun | jre | 1.4.2 | |
sun | jre | 1.4.2_1 | |
sun | jre | 1.4.2_2 | |
sun | jre | 1.4.2_3 | |
sun | jre | 1.4.2_4 | |
sun | jre | 1.4.2_5 | |
sun | jre | 1.4.2_6 | |
sun | jre | 1.4.2_7 | |
sun | jre | 1.4.2_8 | |
sun | jre | 1.4.2_9 | |
sun | jre | 1.4.2_10 | |
sun | jre | 1.4.2_11 | |
sun | jre | 1.4.2_12 | |
sun | jre | 1.4.2_13 | |
sun | jre | 1.4.2_14 | |
sun | jre | 1.4.2_15 | |
sun | sdk | * | |
sun | sdk | 1.4.0 | |
sun | sdk | 1.4.0_01 | |
sun | sdk | 1.4.0_02 | |
sun | sdk | 1.4.0_03 | |
sun | sdk | 1.4.0_04 | |
sun | sdk | 1.4.1 | |
sun | sdk | 1.4.1_01 | |
sun | sdk | 1.4.1_02 | |
sun | sdk | 1.4.1_03 | |
sun | sdk | 1.4.1_04 | |
sun | sdk | 1.4.1_05 | |
sun | sdk | 1.4.1_06 | |
sun | sdk | 1.4.1_07 | |
sun | sdk | 1.4.2 | |
sun | sdk | 1.4.2_1 | |
sun | sdk | 1.4.2_2 | |
sun | sdk | 1.4.2_3 | |
sun | sdk | 1.4.2_4 | |
sun | sdk | 1.4.2_5 | |
sun | sdk | 1.4.2_6 | |
sun | sdk | 1.4.2_7 | |
sun | sdk | 1.4.2_8 | |
sun | sdk | 1.4.2_9 | |
sun | sdk | 1.4.2_10 | |
sun | sdk | 1.4.2_11 | |
sun | sdk | 1.4.2_12 | |
sun | sdk | 1.4.2_13 | |
sun | sdk | 1.4.2_14 | |
sun | sdk | 1.4.2_15 | |
sun | sdk | 1.4.2_16 | |
sun | sdk | 1.4.2_17 | |
sun | sdk | 1.4.2_18 | |
sun | sdk | 1.4.2_19 | |
sun | sdk | 1.4.2_20 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sun:java_se:*:*:*:*:*:*:*:*", "matchCriteriaId": "C990DFAD-716E-4404-939B-7F26CC2C945D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_se:*:*:business:*:*:*:*:*", "matchCriteriaId": "CB9A3291-3F2C-40E9-81D3-D148002E1782", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:sun:jdk:*:update19:*:*:*:*:*:*", "matchCriteriaId": "6762C4F4-E46D-4D28-A9F3-D3B2311D55E1", "versionEndIncluding": "1.5.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:*:update_14:*:*:*:*:*:*", "matchCriteriaId": "667643D3-A858-40D7-BDA0-E9347BFB37EF", "versionEndIncluding": "1.6.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "A02CF738-1B4F-44D0-A618-3D3E4EF1C9B8", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update1:*:*:*:*:*:*", "matchCriteriaId": "EE8E883F-E13D-4FB0-8C6F-B7628600E8D4", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update10:*:*:*:*:*:*", "matchCriteriaId": "2AADA633-EB11-49A0-8E40-66589034F03E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update11:*:*:*:*:*:*", "matchCriteriaId": "19DC29C5-1B9F-46DF-ACF6-3FF93E45777D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update11_b03:*:*:*:*:*:*", "matchCriteriaId": "646DDCA6-AAC4-4FA8-B9B5-51F88D4C001D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update12:*:*:*:*:*:*", "matchCriteriaId": "B120F7D9-7C1E-4716-B2FA-2990D449F754", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update13:*:*:*:*:*:*", "matchCriteriaId": "CD61E49F-2A46-4107-BB3F-527079983306", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update14:*:*:*:*:*:*", "matchCriteriaId": "D900AAE0-6032-4096-AFC2-3D43C55C6C83", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update15:*:*:*:*:*:*", "matchCriteriaId": "88B0958C-744C-4946-908C-09D2A5FAB120", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update16:*:*:*:*:*:*", "matchCriteriaId": "C3E7F3CA-FFB3-42B3-A64F-0E38FAF252FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update17:*:*:*:*:*:*", "matchCriteriaId": "9A2D8D09-3F18-4E73-81CF-BB589BB8AEC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update18:*:*:*:*:*:*", "matchCriteriaId": "3FD24779-988F-4EC1-AC19-77186B68229E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update2:*:*:*:*:*:*", "matchCriteriaId": "28BE548B-DD0C-4C58-98CA-5B803F04F9EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update3:*:*:*:*:*:*", "matchCriteriaId": "5F8E9AA0-8907-4B1A-86A1-08568195217D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update4:*:*:*:*:*:*", "matchCriteriaId": "A337AD31-4566-4A4E-AFF3-7EAECD5C90F9", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update5:*:*:*:*:*:*", "matchCriteriaId": "0754AFDC-2F1C-4C06-AB46-457B5E610029", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update6:*:*:*:*:*:*", "matchCriteriaId": "532CF9DD-0EBB-4B3B-BB9C-A8D78947A790", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update7:*:*:*:*:*:*", "matchCriteriaId": "DC0ABF7A-107B-4B97-9BD7-7B0CEDAAF359", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update8:*:*:*:*:*:*", "matchCriteriaId": "A5DA4242-30D9-44C8-9D0D-877348FFA22B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update9:*:*:*:*:*:*", "matchCriteriaId": "C61C6043-99D0-4F36-AF84-1A5F90B895EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_10:*:*:*:*:*:*", "matchCriteriaId": "722A93D8-B5BC-42F3-92A2-E424F61269A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_11:*:*:*:*:*:*", "matchCriteriaId": "775F2611-F11C-4B84-8F40-0D034B81BF18", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_12:*:*:*:*:*:*", "matchCriteriaId": "F20FDD9F-FF45-48BC-9207-54FB02E76071", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_13:*:*:*:*:*:*", "matchCriteriaId": "9FA326F5-894A-4B01-BCA3-B126DA81CA59", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_3:*:*:*:*:*:*", "matchCriteriaId": "D98175BF-B084-4FA5-899D-9E80DC3923EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_4:*:*:*:*:*:*", "matchCriteriaId": "820632CE-F8DF-47EE-B716-7530E60008B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_5:*:*:*:*:*:*", "matchCriteriaId": "FA2BD0A3-7B2D-447B-ABAC-7B867B03B632", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_6:*:*:*:*:*:*", "matchCriteriaId": "D54AB785-E9B7-47BD-B756-0C3A629D67DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_7:*:*:*:*:*:*", "matchCriteriaId": "E9412098-0353-4F7B-9245-010557E6C651", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update1:*:*:*:*:*:*", "matchCriteriaId": "AD30DAEB-4893-41CF-A455-B69C463B9337", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update2:*:*:*:*:*:*", "matchCriteriaId": "B8F93BBE-1E8C-4EB3-BCC7-20AB2D813F98", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:*:update19:*:*:*:*:*:*", "matchCriteriaId": "4291CC33-EC08-4CE0-9BFF-D9B2A3923AB0", "versionEndIncluding": "1.5.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:*:update_14:*:*:*:*:*:*", "matchCriteriaId": "13577021-8884-427B-82D3-8D6D236FD62F", "versionEndIncluding": "1.6.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "133A7B66-E0B3-4867-A5A4-3C54D6C0C8ED", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update1:*:*:*:*:*:*", "matchCriteriaId": "A7FC09E8-7F30-4FE4-912E-588AA250E2A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update10:*:*:*:*:*:*", "matchCriteriaId": "A586DE4E-8A46-41DE-9FDB-5FDB81DCC87B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update11:*:*:*:*:*:*", "matchCriteriaId": "9919D091-73D7-465A-80FF-F37D6CAF9F46", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update12:*:*:*:*:*:*", "matchCriteriaId": "02565D6F-4CB2-4671-A4EF-3169BCFA6154", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update13:*:*:*:*:*:*", "matchCriteriaId": "452A3E51-9EAC-451D-BA04-A1E7B7D917EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update14:*:*:*:*:*:*", "matchCriteriaId": "3E8C6AAC-C90B-4220-A69B-2A886A35CF5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update15:*:*:*:*:*:*", "matchCriteriaId": "55231B6B-9298-4363-9B5A-14C2DA7B1F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update16:*:*:*:*:*:*", "matchCriteriaId": "E42CF0F7-418C-4BB6-9B73-FA3B9171D092", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update17:*:*:*:*:*:*", "matchCriteriaId": "A5467E9D-07D8-4BEB-84D5-A3136C133519", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update18:*:*:*:*:*:*", "matchCriteriaId": "B83B2CE1-45D7-47AD-BC0A-6EC74D5F8F5A", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update2:*:*:*:*:*:*", "matchCriteriaId": "7EA5B9E9-654D-44F7-AE98-3D8B382804AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update3:*:*:*:*:*:*", "matchCriteriaId": "44051CFE-D15D-4416-A123-F3E49C67A9E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update4:*:*:*:*:*:*", "matchCriteriaId": "F296ACF3-1373-429D-B991-8B5BA704A7EF", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update5:*:*:*:*:*:*", "matchCriteriaId": "B863420B-DE16-416A-9640-1A1340A9B855", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update6:*:*:*:*:*:*", "matchCriteriaId": "724C972F-74FE-4044-BBC4-7E0E61FC9002", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update7:*:*:*:*:*:*", "matchCriteriaId": "46F41C15-0EF4-4115-BFAA-EEAD56FAEEDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update8:*:*:*:*:*:*", "matchCriteriaId": "EBE909DE-E55A-4BD3-A5BF-ADE407432193", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update9:*:*:*:*:*:*", "matchCriteriaId": "5DAC04D2-68FD-4793-A8E7-4690A543D7D4", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:*", "matchCriteriaId": "09027C19-D442-446F-B7A8-21DB6787CF43", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_10:*:*:*:*:*:*", "matchCriteriaId": "0A0FEC28-0707-4F42-9740-78F3D2D551EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_11:*:*:*:*:*:*", "matchCriteriaId": "C3C5879A-A608-4230-9DC1-C27F0F48A13B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_12:*:*:*:*:*:*", "matchCriteriaId": "0C71089A-BDDE-41FC-9DF9-9AEF4C2374DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_13:*:*:*:*:*:*", "matchCriteriaId": "2DBB6B73-8D6B-41FF-BEE0-E0C7F5F1EB41", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_2:*:*:*:*:*:*", "matchCriteriaId": "7158D2C0-E9AC-4CD6-B777-EA7B7A181997", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_3:*:*:*:*:*:*", "matchCriteriaId": "90EC6C13-4B37-48E5-8199-A702A944D5A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_4:*:*:*:*:*:*", "matchCriteriaId": "2528152C-E20A-4D97-931C-A5EC3CEAA06D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_5:*:*:*:*:*:*", "matchCriteriaId": "A99DAB4C-272B-4C91-BC70-7729E1152590", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_6:*:*:*:*:*:*", "matchCriteriaId": "30DFC10A-A4D9-4F89-B17C-AB9260087D29", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_7:*:*:*:*:*:*", "matchCriteriaId": "272A5C44-18EC-41A9-8233-E9D4D0734EA6", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sun:java_se:*:*:business:*:*:*:*:*", "matchCriteriaId": "CB9A3291-3F2C-40E9-81D3-D148002E1782", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:sun:jre:*:*:*:*:*:*:*:*", "matchCriteriaId": "0C8B6FC1-2174-4D44-B801-66AA963D4FFC", "versionEndIncluding": "1.4.2_21", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "226D142B-934F-4988-8826-64590C90F296", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.0_01:*:*:*:*:*:*:*", "matchCriteriaId": "3583521D-5F4F-4F99-BDA4-6C6DF80E5A0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.0_02:*:*:*:*:*:*:*", "matchCriteriaId": "ED1B607A-3C63-49B2-905D-4A394540C6E1", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.0_03:*:*:*:*:*:*:*", "matchCriteriaId": "00762633-7A01-4AA1-943F-5277F4CBA4AD", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.0_04:*:*:*:*:*:*:*", "matchCriteriaId": "2A59EFCF-4315-40B9-9C28-5A1A964C16A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "355CB56A-A598-4CD6-9AFB-FE0B09FFC2C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.1:update1:*:*:*:*:*:*", "matchCriteriaId": "0F9A9879-295F-40DA-B827-72C0AE7B43CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.1:update2:*:*:*:*:*:*", "matchCriteriaId": "1E1A84BB-6D97-45FA-839E-67E36AFFAC4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.1:update3:*:*:*:*:*:*", "matchCriteriaId": "58FC43CA-1F08-4A4B-838B-840838BC67FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.1:update4:*:*:*:*:*:*", "matchCriteriaId": "14037C2F-DDB4-4F9B-8A53-045AED23905A", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.1:update5:*:*:*:*:*:*", "matchCriteriaId": "828F9F36-52A8-406E-97FD-50BE92892014", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.1:update6:*:*:*:*:*:*", "matchCriteriaId": "09867873-957A-4E08-879E-B575C4C80232", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.1:update7:*:*:*:*:*:*", "matchCriteriaId": "07C150C2-18D6-45C1-AF21-527923C45CE0", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "63978872-E797-4F13-B0F9-98CB67D0962A", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2:update16:*:*:*:*:*:*", "matchCriteriaId": "9AC35937-880F-4B3B-807C-CFED4C399A04", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2:update17:*:*:*:*:*:*", "matchCriteriaId": "4DD0DFD8-0352-487B-AD0E-5BFD557F964A", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2:update18:*:*:*:*:*:*", "matchCriteriaId": "E4EE1DD5-9DB3-45EC-8821-23C52D55EFA4", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2:update19:*:*:*:*:*:*", "matchCriteriaId": "69F872C7-9B0F-4C7B-928D-C652F56582A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2:update20:*:*:*:*:*:*", "matchCriteriaId": "70B228DF-EE93-45D8-B2B9-71566BE7D1B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_1:*:*:*:*:*:*:*", "matchCriteriaId": "1EEAB662-644A-4D7B-8237-64142CF48724", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_2:*:*:*:*:*:*:*", "matchCriteriaId": "D9598A49-95F2-42DB-B92C-CD026F739B83", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_3:*:*:*:*:*:*:*", "matchCriteriaId": "BED1009E-AE60-43A0-A0F5-38526EFCF423", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_4:*:*:*:*:*:*:*", "matchCriteriaId": "D011585C-0E62-4233-85FA-F29A07D68DA7", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_5:*:*:*:*:*:*:*", "matchCriteriaId": "F226D898-F0E8-41D8-BF40-54DE9FB5426D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_6:*:*:*:*:*:*:*", "matchCriteriaId": "4CB9CCD1-A67D-4800-9EC5-6E1A0B0B76E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_7:*:*:*:*:*:*:*", "matchCriteriaId": "CE28C283-447A-4F83-B96B-69F96E663C1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_8:*:*:*:*:*:*:*", "matchCriteriaId": "D102063B-2434-4141-98E7-2DE501AE1728", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_9:*:*:*:*:*:*:*", "matchCriteriaId": "03B8CD03-CD31-4F4D-BA90-59435578A4F9", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_10:*:*:*:*:*:*:*", "matchCriteriaId": "41A994BF-1F64-480A-8AA5-748DDD0AB68C", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_11:*:*:*:*:*:*:*", "matchCriteriaId": "88519F2D-AD06-4F05-BEDA-A09216F1B481", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_12:*:*:*:*:*:*:*", "matchCriteriaId": "AC728978-368D-4B36-B149-70473E92BD1B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_13:*:*:*:*:*:*:*", "matchCriteriaId": "FD5187B1-CB86-48E8-A595-9FCFD9822C0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_14:*:*:*:*:*:*:*", "matchCriteriaId": "6C660DE4-543A-4E9B-825D-CD099D08CBD8", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_15:*:*:*:*:*:*:*", "matchCriteriaId": "98C1942E-16C0-4EB2-AB57-43EC6EC9C3A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:*:*:*:*:*:*:*:*", "matchCriteriaId": "857940E4-5457-46A8-9D9A-1C9ED025318B", "versionEndIncluding": "1.4.2_21", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "25336CDC-E592-4022-A87A-364B24D13485", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.0_01:*:*:*:*:*:*:*", "matchCriteriaId": "DBDA2169-B799-4F71-AE26-0508B918E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.0_02:*:*:*:*:*:*:*", "matchCriteriaId": "D8F7E8AA-6CDD-4412-8530-AF7CAB8CA863", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.0_03:*:*:*:*:*:*:*", "matchCriteriaId": "57859E96-91C9-483F-8C4B-E7AD574818B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.0_04:*:*:*:*:*:*:*", "matchCriteriaId": "069362D3-2C20-4685-AC2F-AA9E752D0C05", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "1ED545E2-AE1C-45A1-8DF0-9674EF5295BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.1_01:*:*:*:*:*:*:*", "matchCriteriaId": "8F1BCD7F-751C-405D-BD82-7ACE1A9ED5B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.1_02:*:*:*:*:*:*:*", "matchCriteriaId": "9D5861D4-2E57-4FA0-A786-000BD67FA23F", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.1_03:*:*:*:*:*:*:*", "matchCriteriaId": "AE6C0900-9F2F-47DF-9504-0FABBDF2069D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.1_04:*:*:*:*:*:*:*", "matchCriteriaId": "1B234F24-9C83-4E02-9009-8EF3CAEF681D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.1_05:*:*:*:*:*:*:*", "matchCriteriaId": "C6080B96-4A1F-47B2-8DD6-43D890136030", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.1_06:*:*:*:*:*:*:*", "matchCriteriaId": "559E35CF-0A08-40B6-A8BB-E4F970E6C534", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.1_07:*:*:*:*:*:*:*", "matchCriteriaId": "F09AA185-F09D-4D57-9AA7-61C0F0CF9050", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "002CA86D-3090-4C7A-947A-21CB5D1ADD98", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_1:*:*:*:*:*:*:*", "matchCriteriaId": "6F6453C9-7EE0-4FFB-861D-C2D9416DCABA", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_2:*:*:*:*:*:*:*", "matchCriteriaId": "89BF16DE-EEAB-4DA5-BFF1-7A0A58DE141F", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_3:*:*:*:*:*:*:*", "matchCriteriaId": "6DDE253E-C8B6-4C1D-AECE-ABEA1A67306B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_4:*:*:*:*:*:*:*", "matchCriteriaId": "A56D9A60-F272-4D4C-A9DD-C93DAF783585", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_5:*:*:*:*:*:*:*", "matchCriteriaId": "EF109CAA-E8D2-4BD7-BE7C-AF8B2A78672E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_6:*:*:*:*:*:*:*", "matchCriteriaId": "976F4ACB-3725-45B7-B2EF-DEE4B88254E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_7:*:*:*:*:*:*:*", "matchCriteriaId": "52BDD6A8-1611-4C3C-865D-6EDB5B9F8D88", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_8:*:*:*:*:*:*:*", "matchCriteriaId": "6A1F28FF-652A-4C89-9AC6-5E212F890811", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_9:*:*:*:*:*:*:*", "matchCriteriaId": "96A8C351-E9CD-431B-8B9D-712CA54C7213", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_10:*:*:*:*:*:*:*", "matchCriteriaId": "36888382-79C8-4C97-A654-C668CD68556F", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_11:*:*:*:*:*:*:*", "matchCriteriaId": "F34C99E6-F9F0-4EF3-8601-B47EAE3D7273", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_12:*:*:*:*:*:*:*", "matchCriteriaId": "A74DD08D-CEDB-460E-BED5-78F6CAF18BF5", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_13:*:*:*:*:*:*:*", "matchCriteriaId": "E60560EC-6DBD-4A17-BFFA-FAD9193A0BC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_14:*:*:*:*:*:*:*", "matchCriteriaId": "E4F64FBC-DC97-4FE3-A235-18B87945AF7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_15:*:*:*:*:*:*:*", "matchCriteriaId": "85048406-9051-4E69-94A8-5C449F3B89E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_16:*:*:*:*:*:*:*", "matchCriteriaId": "B1C88DD7-0B46-4405-BD35-60D27E2DBA14", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_17:*:*:*:*:*:*:*", "matchCriteriaId": "08D23B7C-7B8C-41B8-8D94-BB0F27C7F0A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_18:*:*:*:*:*:*:*", "matchCriteriaId": "1C49B997-95D3-4DA4-A353-DB41AD461C5E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_19:*:*:*:*:*:*:*", "matchCriteriaId": "6F70EF76-ED5F-4835-8252-FE613604FA3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_20:*:*:*:*:*:*:*", "matchCriteriaId": "6BDBCAD8-CDF7-4550-8EA2-1409B02FFAD6", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in JNLPAppletlauncher in Sun Java SE, and SE for Business, in JDK and JRE 6 Update 14 and earlier and JDK and JRE 5.0 Update 19 and earlier; and Java SE for Business in SDK and JRE 1.4.2_21 and earlier; allows remote attackers to create or modify arbitrary files via vectors involving an untrusted Java applet that accesses an old version of JNLPAppletLauncher." }, { "lang": "es", "value": "Vulnerabilidad no especificada en JNLPAppletlauncher en Sun Java SE, y SE Business, en JDK y JRE 6v Update v14 y anteriores y JDK y JRE v5.0 Update v19 y anteriores; y Java SE para Business de SDK y JRE v1.4.2_21 y anteriores, permiten a atacantes remotos crear o modificar un fichero a su elecci\u00f3n a trav\u00e9s de un vector relacionado con un applet Java no confiable." } ], "id": "CVE-2009-2676", "lastModified": "2024-11-21T01:05:28.600", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2009-08-05T19:30:01.313", "references": [ { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-security-announce/2009-08/msg00003.html" }, { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00002.html" }, { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=125787273209737\u0026w=2" }, { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=125787273209737\u0026w=2" }, { "source": "cve@mitre.org", "url": "http://osvdb.org/56789" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/36176" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/36199" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/36248" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/37300" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/37386" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/37460" }, { "source": "cve@mitre.org", "url": "http://security.gentoo.org/glsa/glsa-200911-02.xml" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-125136-16-1" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-263490-1" }, { "source": "cve@mitre.org", "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2009-096303.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/35946" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1022657" }, { "source": "cve@mitre.org", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA09-294A.html" }, { "source": "cve@mitre.org", "url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2009/3316" }, { "source": "cve@mitre.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8453" }, { "source": "cve@mitre.org", "url": "https://rhn.redhat.com/errata/RHSA-2009-1199.html" }, { "source": "cve@mitre.org", "url": "https://rhn.redhat.com/errata/RHSA-2009-1200.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2009-08/msg00003.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00002.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=125787273209737\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=125787273209737\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/56789" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/36176" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/36199" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/36248" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/37300" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/37386" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/37460" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-200911-02.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-125136-16-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-263490-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2009-096303.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/35946" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1022657" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA09-294A.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2009/3316" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8453" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://rhn.redhat.com/errata/RHSA-2009-1199.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://rhn.redhat.com/errata/RHSA-2009-1200.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2009-11-05 16:30
Modified
2024-11-21 01:08
Severity ?
Summary
The JPEG Image Writer in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to gain privileges via a crafted image file, related to a "quantization problem," aka Bug Id 6862968.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.4.2_1 | |
sun | jre | 1.4.2_2 | |
sun | jre | 1.4.2_02 | |
sun | jre | 1.4.2_03 | |
sun | jre | 1.4.2_3 | |
sun | jre | 1.4.2_4 | |
sun | jre | 1.4.2_04 | |
sun | jre | 1.4.2_05 | |
sun | jre | 1.4.2_5 | |
sun | jre | 1.4.2_06 | |
sun | jre | 1.4.2_6 | |
sun | jre | 1.4.2_7 | |
sun | jre | 1.4.2_07 | |
sun | jre | 1.4.2_8 | |
sun | jre | 1.4.2_08 | |
sun | jre | 1.4.2_09 | |
sun | jre | 1.4.2_9 | |
sun | jre | 1.4.2_10 | |
sun | jre | 1.4.2_11 | |
sun | jre | 1.4.2_12 | |
sun | jre | 1.4.2_13 | |
sun | jre | 1.4.2_14 | |
sun | jre | 1.4.2_15 | |
sun | jre | 1.4.2_16 | |
sun | jre | 1.4.2_17 | |
sun | jre | 1.4.2_18 | |
sun | jre | 1.4.2_19 | |
sun | jre | 1.4.2_20 | |
sun | jre | 1.4.2_21 | |
sun | jre | 1.4.2_22 | |
sun | sdk | 1.4.2_01 | |
sun | sdk | 1.4.2_1 | |
sun | sdk | 1.4.2_2 | |
sun | sdk | 1.4.2_02 | |
sun | sdk | 1.4.2_03 | |
sun | sdk | 1.4.2_3 | |
sun | sdk | 1.4.2_04 | |
sun | sdk | 1.4.2_4 | |
sun | sdk | 1.4.2_5 | |
sun | sdk | 1.4.2_05 | |
sun | sdk | 1.4.2_6 | |
sun | sdk | 1.4.2_06 | |
sun | sdk | 1.4.2_07 | |
sun | sdk | 1.4.2_7 | |
sun | sdk | 1.4.2_8 | |
sun | sdk | 1.4.2_08 | |
sun | sdk | 1.4.2_09 | |
sun | sdk | 1.4.2_9 | |
sun | sdk | 1.4.2_10 | |
sun | sdk | 1.4.2_11 | |
sun | sdk | 1.4.2_12 | |
sun | sdk | 1.4.2_13 | |
sun | sdk | 1.4.2_14 | |
sun | sdk | 1.4.2_15 | |
sun | sdk | 1.4.2_16 | |
sun | sdk | 1.4.2_17 | |
sun | sdk | 1.4.2_18 | |
sun | sdk | 1.4.2_19 | |
sun | sdk | 1.4.2_20 | |
sun | sdk | 1.4.2_21 | |
sun | sdk | 1.4.2_22 | |
sun | solaris | * | |
sun | jre | 1.3.1_1 | |
sun | jre | 1.3.1_01 | |
sun | jre | 1.3.1_01a | |
sun | jre | 1.3.1_02 | |
sun | jre | 1.3.1_2 | |
sun | jre | 1.3.1_03 | |
sun | jre | 1.3.1_3 | |
sun | jre | 1.3.1_4 | |
sun | jre | 1.3.1_04 | |
sun | jre | 1.3.1_05 | |
sun | jre | 1.3.1_5 | |
sun | jre | 1.3.1_06 | |
sun | jre | 1.3.1_6 | |
sun | jre | 1.3.1_07 | |
sun | jre | 1.3.1_7 | |
sun | jre | 1.3.1_8 | |
sun | jre | 1.3.1_08 | |
sun | jre | 1.3.1_9 | |
sun | jre | 1.3.1_09 | |
sun | jre | 1.3.1_10 | |
sun | jre | 1.3.1_11 | |
sun | jre | 1.3.1_12 | |
sun | jre | 1.3.1_13 | |
sun | jre | 1.3.1_14 | |
sun | jre | 1.3.1_15 | |
sun | jre | 1.3.1_16 | |
sun | jre | 1.3.1_17 | |
sun | jre | 1.3.1_18 | |
sun | jre | 1.3.1_19 | |
sun | jre | 1.3.1_20 | |
sun | jre | 1.3.1_21 | |
sun | jre | 1.3.1_22 | |
sun | jre | 1.3.1_23 | |
sun | jre | 1.3.1_24 | |
sun | jre | 1.3.1_25 | |
sun | sdk | 1.3.1_01 | |
sun | sdk | 1.3.1_01a | |
sun | sdk | 1.3.1_2 | |
sun | sdk | 1.3.1_02 | |
sun | sdk | 1.3.1_03 | |
sun | sdk | 1.3.1_3 | |
sun | sdk | 1.3.1_4 | |
sun | sdk | 1.3.1_04 | |
sun | sdk | 1.3.1_5 | |
sun | sdk | 1.3.1_05 | |
sun | sdk | 1.3.1_6 | |
sun | sdk | 1.3.1_06 | |
sun | sdk | 1.3.1_7 | |
sun | sdk | 1.3.1_07 | |
sun | sdk | 1.3.1_8 | |
sun | sdk | 1.3.1_08 | |
sun | sdk | 1.3.1_9 | |
sun | sdk | 1.3.1_09 | |
sun | sdk | 1.3.1_10 | |
sun | sdk | 1.3.1_11 | |
sun | sdk | 1.3.1_12 | |
sun | sdk | 1.3.1_13 | |
sun | sdk | 1.3.1_14 | |
sun | sdk | 1.3.1_15 | |
sun | sdk | 1.3.1_16 | |
sun | sdk | 1.3.1_17 | |
sun | sdk | 1.3.1_18 | |
sun | sdk | 1.3.1_19 | |
sun | sdk | 1.3.1_20 | |
sun | sdk | 1.3.1_21 | |
sun | sdk | 1.3.1_22 | |
sun | sdk | 1.3.1_23 | |
sun | sdk | 1.3.1_24 | |
sun | sdk | 1.3.1_25 | |
microsoft | windows | * | |
sun | java_se | * | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jre | 1.4.2_01 | |
sun | jre | 1.4.2_1 | |
sun | jre | 1.4.2_2 | |
sun | jre | 1.4.2_02 | |
sun | jre | 1.4.2_03 | |
sun | jre | 1.4.2_3 | |
sun | jre | 1.4.2_4 | |
sun | jre | 1.4.2_04 | |
sun | jre | 1.4.2_05 | |
sun | jre | 1.4.2_5 | |
sun | jre | 1.4.2_06 | |
sun | jre | 1.4.2_6 | |
sun | jre | 1.4.2_7 | |
sun | jre | 1.4.2_07 | |
sun | jre | 1.4.2_8 | |
sun | jre | 1.4.2_08 | |
sun | jre | 1.4.2_09 | |
sun | jre | 1.4.2_9 | |
sun | jre | 1.4.2_10 | |
sun | jre | 1.4.2_11 | |
sun | jre | 1.4.2_12 | |
sun | jre | 1.4.2_13 | |
sun | jre | 1.4.2_14 | |
sun | jre | 1.4.2_15 | |
sun | jre | 1.4.2_16 | |
sun | jre | 1.4.2_17 | |
sun | jre | 1.4.2_18 | |
sun | jre | 1.4.2_19 | |
sun | jre | 1.4.2_20 | |
sun | jre | 1.4.2_21 | |
sun | jre | 1.4.2_22 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | sdk | 1.4.2_1 | |
sun | sdk | 1.4.2_2 | |
sun | sdk | 1.4.2_02 | |
sun | sdk | 1.4.2_03 | |
sun | sdk | 1.4.2_3 | |
sun | sdk | 1.4.2_04 | |
sun | sdk | 1.4.2_4 | |
sun | sdk | 1.4.2_5 | |
sun | sdk | 1.4.2_05 | |
sun | sdk | 1.4.2_6 | |
sun | sdk | 1.4.2_06 | |
sun | sdk | 1.4.2_07 | |
sun | sdk | 1.4.2_7 | |
sun | sdk | 1.4.2_8 | |
sun | sdk | 1.4.2_08 | |
sun | sdk | 1.4.2_09 | |
sun | sdk | 1.4.2_9 | |
sun | sdk | 1.4.2_10 | |
sun | sdk | 1.4.2_11 | |
sun | sdk | 1.4.2_12 | |
sun | sdk | 1.4.2_13 | |
sun | sdk | 1.4.2_14 | |
sun | sdk | 1.4.2_15 | |
sun | sdk | 1.4.2_16 | |
sun | sdk | 1.4.2_17 | |
sun | sdk | 1.4.2_18 | |
sun | sdk | 1.4.2_19 | |
sun | sdk | 1.4.2_20 | |
sun | sdk | 1.4.2_21 | |
sun | sdk | 1.4.2_22 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_1:*:*:*:*:*:*", "matchCriteriaId": "8198F493-0447-4A87-9F16-5B6CB3572E38", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_10:*:*:*:*:*:*", "matchCriteriaId": "645BBE6D-BA5E-4D93-9152-759A2355013E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_11:*:*:*:*:*:*", "matchCriteriaId": "0EE694C9-940A-4899-844C-AC63412FA295", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_12:*:*:*:*:*:*", "matchCriteriaId": "BC9476DD-9B56-4811-A248-711C25181F29", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_13:*:*:*:*:*:*", "matchCriteriaId": "68D34082-2948-4D95-B43F-FBD59E2F3D28", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_14:*:*:*:*:*:*", "matchCriteriaId": "F2E01C07-4921-47CC-9AFC-D3B461D0B78D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_15:*:*:*:*:*:*", "matchCriteriaId": "7532E7D4-2F62-4DA0-B905-F95A0A735CE5", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_16:*:*:*:*:*:*", "matchCriteriaId": "0AF93193-889E-4F44-ADEB-E89E56DE6C7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_17:*:*:*:*:*:*", "matchCriteriaId": "68C19440-4172-4539-8E38-09DBCB1752E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_18:*:*:*:*:*:*", "matchCriteriaId": "3CC000EC-9717-47DA-B182-6C8CD3970F27", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_19:*:*:*:*:*:*", "matchCriteriaId": "115083C5-811F-47BA-8549-3BDFF9CA0740", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_2:*:*:*:*:*:*", "matchCriteriaId": "51337B8C-78F2-4207-998E-A3FC591F538B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_20:*:*:*:*:*:*", "matchCriteriaId": "48193108-CD9F-476E-A7D2-E0796F659BA5", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_21:*:*:*:*:*:*", "matchCriteriaId": "A0A80299-783A-4FBA-9EBF-5913942949A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_3:*:*:*:*:*:*", "matchCriteriaId": "76A4F852-0240-44D6-9BD5-FE79DEF16438", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_4:*:*:*:*:*:*", "matchCriteriaId": "F57E5943-5CC3-4736-85E8-FE7CC4F38735", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_5:*:*:*:*:*:*", "matchCriteriaId": "3C228E00-0F5C-41D2-8BD0-46AF682AE842", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_6:*:*:*:*:*:*", "matchCriteriaId": "0329E813-B2C8-4C84-BCAF-2D54C4AE0472", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_7:*:*:*:*:*:*", "matchCriteriaId": "7E3C40E1-7005-4F83-B347-177BEC9EE339", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_8:*:*:*:*:*:*", "matchCriteriaId": "6855E3F5-6F8E-44FA-A913-0D0F6A803DFF", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_9:*:*:*:*:*:*", "matchCriteriaId": "C79BDB6E-442B-41F1-A025-C17648A81FD9", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_1:*:*:*:*:*:*", "matchCriteriaId": "EBB09CE1-F4AC-472C-8D5D-594AEB322CFD", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_10:*:*:*:*:*:*", "matchCriteriaId": "722A93D8-B5BC-42F3-92A2-E424F61269A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_11:*:*:*:*:*:*", "matchCriteriaId": "775F2611-F11C-4B84-8F40-0D034B81BF18", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_12:*:*:*:*:*:*", "matchCriteriaId": "F20FDD9F-FF45-48BC-9207-54FB02E76071", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_13:*:*:*:*:*:*", "matchCriteriaId": "9FA326F5-894A-4B01-BCA3-B126DA81CA59", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_14:*:*:*:*:*:*", "matchCriteriaId": "228AB7B4-4BA4-43D4-B562-D438884DB152", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_15:*:*:*:*:*:*", "matchCriteriaId": "AFD5C688-2103-4D60-979E-D9BE69A989C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_16:*:*:*:*:*:*", "matchCriteriaId": "21421215-F722-4207-A2E5-E2DF4B29859B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_3:*:*:*:*:*:*", "matchCriteriaId": "D98175BF-B084-4FA5-899D-9E80DC3923EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_4:*:*:*:*:*:*", "matchCriteriaId": "820632CE-F8DF-47EE-B716-7530E60008B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_5:*:*:*:*:*:*", "matchCriteriaId": "FA2BD0A3-7B2D-447B-ABAC-7B867B03B632", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_6:*:*:*:*:*:*", "matchCriteriaId": "D54AB785-E9B7-47BD-B756-0C3A629D67DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_7:*:*:*:*:*:*", "matchCriteriaId": "E9412098-0353-4F7B-9245-010557E6C651", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_8:*:*:*:*:*:*", "matchCriteriaId": "FB0E9224-3D12-47E2-8E69-7B682284CDDD", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_9:*:*:*:*:*:*", "matchCriteriaId": "77BCD102-59A4-45A6-ADEF-CAB7F70E2377", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_1:*:*:*:*:*:*", "matchCriteriaId": "14E6127E-A40D-437D-B57B-0D7F57D08559", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_11:*:*:*:*:*:*", "matchCriteriaId": "28AE4411-45D1-4978-BA61-334AD04FF8FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_12:*:*:*:*:*:*", "matchCriteriaId": "479EB097-495A-4730-AF51-F2C0064EBA6E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_13:*:*:*:*:*:*", "matchCriteriaId": "9B3E7C12-8D97-42CC-9B2B-A0AE3267DE69", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_14:*:*:*:*:*:*", "matchCriteriaId": "5024BE9F-CE32-4099-A646-F3EC5DB6F63C", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_15:*:*:*:*:*:*", "matchCriteriaId": "DA9FB72A-C55F-4878-89D5-375FDA08163B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_16:*:*:*:*:*:*", "matchCriteriaId": "1CBC2A9C-9F21-4509-BA72-28B5DB16E55D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_17:*:*:*:*:*:*", "matchCriteriaId": "485F5ED3-062D-4A8E-AA34-9DC95D0D9646", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_18:*:*:*:*:*:*", "matchCriteriaId": "124364C5-0616-4C7A-A78F-08FABAA785CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_19:*:*:*:*:*:*", "matchCriteriaId": "A6BFFF1E-20D6-4508-9842-E7AB35F12B1D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_2:*:*:*:*:*:*", "matchCriteriaId": "DB7307A5-6F20-44FD-9D09-8FB76E444500", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_20:*:*:*:*:*:*", "matchCriteriaId": "2E7F3992-0C15-4371-BE14-0D2046B3976E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_21:*:*:*:*:*:*", "matchCriteriaId": "C5759CBC-D910-407D-83DF-A77FBDC8555D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_3:*:*:*:*:*:*", "matchCriteriaId": "0E45DE8A-477B-4BF7-893B-D11DDEE82E82", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_4:*:*:*:*:*:*", "matchCriteriaId": "D107CE0B-2EF2-4CF0-869E-3E27CBCA4997", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_5:*:*:*:*:*:*", "matchCriteriaId": "81DABB45-F39C-4BF4-8F2B-0CEE60A44C00", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_6:*:*:*:*:*:*", "matchCriteriaId": "CDDBD68A-771C-44FD-96A3-3AE189DE2591", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_7:*:*:*:*:*:*", "matchCriteriaId": "8FBD21F3-AC92-4154-948E-509FB8E097F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_8:*:*:*:*:*:*", "matchCriteriaId": "D91F9E0C-0A76-4DBC-A4E5-74E6682A5765", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_9:*:*:*:*:*:*", "matchCriteriaId": "86F7EF21-5395-4F1F-A15D-A1C7EDBFAB2A", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:*", "matchCriteriaId": "09027C19-D442-446F-B7A8-21DB6787CF43", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_10:*:*:*:*:*:*", "matchCriteriaId": "0A0FEC28-0707-4F42-9740-78F3D2D551EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_11:*:*:*:*:*:*", "matchCriteriaId": "C3C5879A-A608-4230-9DC1-C27F0F48A13B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_12:*:*:*:*:*:*", "matchCriteriaId": "0C71089A-BDDE-41FC-9DF9-9AEF4C2374DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_13:*:*:*:*:*:*", "matchCriteriaId": "2DBB6B73-8D6B-41FF-BEE0-E0C7F5F1EB41", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_14:*:*:*:*:*:*", "matchCriteriaId": "12A3B254-8580-45DB-BDE4-5B5A29CBFFB3", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_15:*:*:*:*:*:*", "matchCriteriaId": "1DB1DE6A-66AE-499B-AD92-9E6ACE474C6D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_16:*:*:*:*:*:*", "matchCriteriaId": "AADBB4F9-E43E-428B-9979-F47A15696C85", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_2:*:*:*:*:*:*", "matchCriteriaId": "7158D2C0-E9AC-4CD6-B777-EA7B7A181997", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_3:*:*:*:*:*:*", "matchCriteriaId": "90EC6C13-4B37-48E5-8199-A702A944D5A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_4:*:*:*:*:*:*", "matchCriteriaId": "2528152C-E20A-4D97-931C-A5EC3CEAA06D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_5:*:*:*:*:*:*", "matchCriteriaId": "A99DAB4C-272B-4C91-BC70-7729E1152590", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_6:*:*:*:*:*:*", "matchCriteriaId": "30DFC10A-A4D9-4F89-B17C-AB9260087D29", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_7:*:*:*:*:*:*", "matchCriteriaId": "272A5C44-18EC-41A9-8233-E9D4D0734EA6", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_8:*:*:*:*:*:*", "matchCriteriaId": "3DA21490-E253-4BDC-9BA8-5D068BE35189", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_9:*:*:*:*:*:*", "matchCriteriaId": "81C2C04D-D4BA-4C87-9609-C53AA63BFF19", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sun:jre:1.4.2_1:*:*:*:*:*:*:*", "matchCriteriaId": "1EEAB662-644A-4D7B-8237-64142CF48724", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_2:*:*:*:*:*:*:*", "matchCriteriaId": "D9598A49-95F2-42DB-B92C-CD026F739B83", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_02:*:*:*:*:*:*:*", "matchCriteriaId": "DB48B161-C239-4BB5-8667-7ACA5A5437F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_03:*:*:*:*:*:*:*", "matchCriteriaId": "83629616-1814-4858-B09F-79BEA82D6F55", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_3:*:*:*:*:*:*:*", "matchCriteriaId": "BED1009E-AE60-43A0-A0F5-38526EFCF423", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_4:*:*:*:*:*:*:*", "matchCriteriaId": "D011585C-0E62-4233-85FA-F29A07D68DA7", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_04:*:*:*:*:*:*:*", "matchCriteriaId": "03E8F351-F900-436E-A726-55AE31FBF832", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_05:*:*:*:*:*:*:*", "matchCriteriaId": "F76B79C6-ADD0-4992-A4BD-423A0AD38714", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_5:*:*:*:*:*:*:*", "matchCriteriaId": "F226D898-F0E8-41D8-BF40-54DE9FB5426D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_06:*:*:*:*:*:*:*", "matchCriteriaId": "FBFD41B5-6E33-4B00-81E8-9D91B0A03BD8", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_6:*:*:*:*:*:*:*", "matchCriteriaId": "4CB9CCD1-A67D-4800-9EC5-6E1A0B0B76E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_7:*:*:*:*:*:*:*", "matchCriteriaId": "CE28C283-447A-4F83-B96B-69F96E663C1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_07:*:*:*:*:*:*:*", "matchCriteriaId": "685D3F7F-30B9-4EB8-90FC-66A2A067A510", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_8:*:*:*:*:*:*:*", "matchCriteriaId": "D102063B-2434-4141-98E7-2DE501AE1728", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_08:*:*:*:*:*:*:*", "matchCriteriaId": "722B704B-A422-4163-AD48-F30CA4A07002", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_09:*:*:*:*:*:*:*", "matchCriteriaId": "C05784DC-626B-4D8D-A4DF-A42AC87131DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_9:*:*:*:*:*:*:*", "matchCriteriaId": "03B8CD03-CD31-4F4D-BA90-59435578A4F9", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_10:*:*:*:*:*:*:*", "matchCriteriaId": "41A994BF-1F64-480A-8AA5-748DDD0AB68C", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_11:*:*:*:*:*:*:*", "matchCriteriaId": "88519F2D-AD06-4F05-BEDA-A09216F1B481", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_12:*:*:*:*:*:*:*", "matchCriteriaId": "AC728978-368D-4B36-B149-70473E92BD1B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_13:*:*:*:*:*:*:*", "matchCriteriaId": "FD5187B1-CB86-48E8-A595-9FCFD9822C0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_14:*:*:*:*:*:*:*", "matchCriteriaId": "6C660DE4-543A-4E9B-825D-CD099D08CBD8", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_15:*:*:*:*:*:*:*", "matchCriteriaId": "98C1942E-16C0-4EB2-AB57-43EC6EC9C3A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_16:*:*:*:*:*:*:*", "matchCriteriaId": "318719C9-7B01-4021-B2EF-8341254DFE6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_17:*:*:*:*:*:*:*", "matchCriteriaId": "DB8FA9BA-51CA-4473-9FE1-9A32FB8C8041", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_18:*:*:*:*:*:*:*", "matchCriteriaId": "CC5E64B6-77DA-44BC-B646-AE01041B1830", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_19:*:*:*:*:*:*:*", "matchCriteriaId": "2DA35E80-9E0E-4A26-B631-A61542BE4739", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_20:*:*:*:*:*:*:*", "matchCriteriaId": "7EEB5367-1BB8-4ED3-8C04-ABA6BAA5AD10", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_21:*:*:*:*:*:*:*", "matchCriteriaId": "BED9E7C8-0418-4733-A496-61CCFD638859", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_22:*:*:*:*:*:*:*", "matchCriteriaId": "6566CE32-E042-424A-893B-C8A9E26E2869", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_01:*:*:*:*:*:*:*", "matchCriteriaId": "E6C4CA79-9D0A-4E47-A1A4-9CBEDDCFE05E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_1:*:*:*:*:*:*:*", "matchCriteriaId": "6F6453C9-7EE0-4FFB-861D-C2D9416DCABA", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_2:*:*:*:*:*:*:*", "matchCriteriaId": "89BF16DE-EEAB-4DA5-BFF1-7A0A58DE141F", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_02:*:*:*:*:*:*:*", "matchCriteriaId": "AF4E34FD-D927-42BB-8A16-031D77CB4B9E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_03:*:*:*:*:*:*:*", "matchCriteriaId": "37A3D49A-BE20-47BF-A85F-122357BAB098", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_3:*:*:*:*:*:*:*", "matchCriteriaId": "6DDE253E-C8B6-4C1D-AECE-ABEA1A67306B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_04:*:*:*:*:*:*:*", "matchCriteriaId": "F45DB5D3-7F35-4531-9A82-24EB50034787", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_4:*:*:*:*:*:*:*", "matchCriteriaId": "A56D9A60-F272-4D4C-A9DD-C93DAF783585", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_5:*:*:*:*:*:*:*", "matchCriteriaId": "EF109CAA-E8D2-4BD7-BE7C-AF8B2A78672E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_05:*:*:*:*:*:*:*", "matchCriteriaId": "4695F707-12E8-4BA4-BBE1-C21CB7213A2A", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_6:*:*:*:*:*:*:*", "matchCriteriaId": "976F4ACB-3725-45B7-B2EF-DEE4B88254E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_06:*:*:*:*:*:*:*", "matchCriteriaId": "C918FB49-DA13-4326-BE86-6F6BEA4CE4E1", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_07:*:*:*:*:*:*:*", "matchCriteriaId": "5573CAD1-39D1-4ADB-BB95-EBB554B43B4E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_7:*:*:*:*:*:*:*", "matchCriteriaId": "52BDD6A8-1611-4C3C-865D-6EDB5B9F8D88", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_8:*:*:*:*:*:*:*", "matchCriteriaId": "6A1F28FF-652A-4C89-9AC6-5E212F890811", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_08:*:*:*:*:*:*:*", "matchCriteriaId": "DD02EBDF-6E51-4538-9EDD-B1DE914D09C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_09:*:*:*:*:*:*:*", "matchCriteriaId": "53C3C0E3-5F40-412B-A4AD-A7A291DE2A08", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_9:*:*:*:*:*:*:*", "matchCriteriaId": "96A8C351-E9CD-431B-8B9D-712CA54C7213", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_10:*:*:*:*:*:*:*", "matchCriteriaId": "36888382-79C8-4C97-A654-C668CD68556F", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_11:*:*:*:*:*:*:*", "matchCriteriaId": "F34C99E6-F9F0-4EF3-8601-B47EAE3D7273", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_12:*:*:*:*:*:*:*", "matchCriteriaId": "A74DD08D-CEDB-460E-BED5-78F6CAF18BF5", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_13:*:*:*:*:*:*:*", "matchCriteriaId": "E60560EC-6DBD-4A17-BFFA-FAD9193A0BC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_14:*:*:*:*:*:*:*", "matchCriteriaId": "E4F64FBC-DC97-4FE3-A235-18B87945AF7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_15:*:*:*:*:*:*:*", "matchCriteriaId": "85048406-9051-4E69-94A8-5C449F3B89E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_16:*:*:*:*:*:*:*", "matchCriteriaId": "B1C88DD7-0B46-4405-BD35-60D27E2DBA14", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_17:*:*:*:*:*:*:*", "matchCriteriaId": "08D23B7C-7B8C-41B8-8D94-BB0F27C7F0A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_18:*:*:*:*:*:*:*", "matchCriteriaId": "1C49B997-95D3-4DA4-A353-DB41AD461C5E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_19:*:*:*:*:*:*:*", "matchCriteriaId": "6F70EF76-ED5F-4835-8252-FE613604FA3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_20:*:*:*:*:*:*:*", "matchCriteriaId": "6BDBCAD8-CDF7-4550-8EA2-1409B02FFAD6", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_21:*:*:*:*:*:*:*", "matchCriteriaId": "7E691333-0434-4808-9ED4-E82C6EC2FD37", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_22:*:*:*:*:*:*:*", "matchCriteriaId": "BBE7A538-FF2E-4622-8479-781AB73CBA45", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:sun:solaris:*:*:*:*:*:*:*:*", "matchCriteriaId": "469B74F2-4B89-42B8-8638-731E92D463B9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sun:jre:1.3.1_1:*:*:*:*:*:*:*", "matchCriteriaId": "EA460D9A-662F-4861-9835-3D3116FB9488", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_01:*:*:*:*:*:*:*", "matchCriteriaId": "7E49A68E-0886-4AED-8FF4-9455914BFE16", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_01a:*:*:*:*:*:*:*", "matchCriteriaId": "E94B0A27-60D3-42F5-9DF6-75F481C2460D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_02:*:*:*:*:*:*:*", "matchCriteriaId": "89E95205-DB64-44AD-81A4-B77BD7595AAF", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_2:*:*:*:*:*:*:*", "matchCriteriaId": "0875E34D-8544-49B9-BAD9-8191CC103A07", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_03:*:*:*:*:*:*:*", "matchCriteriaId": "62E772B9-8E41-476F-81F5-87B41F1827A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_3:*:*:*:*:*:*:*", "matchCriteriaId": "B9643B49-FC4B-4AD4-90AC-939DDAA96518", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_4:*:*:*:*:*:*:*", "matchCriteriaId": "F76773E5-0A91-49B8-8C9C-DD64AB9F74BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_04:*:*:*:*:*:*:*", "matchCriteriaId": "7CE78463-2CE8-43C6-BB06-AA40C72B1A4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_05:*:*:*:*:*:*:*", "matchCriteriaId": "31A04480-92DF-49AD-9B36-7F1FCB29DE90", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_5:*:*:*:*:*:*:*", "matchCriteriaId": "ADF93A34-0535-4289-B12C-A1E1E22C13D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_06:*:*:*:*:*:*:*", "matchCriteriaId": "E2FD0B72-683D-4FF6-BCF5-5DE85BF3064B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_6:*:*:*:*:*:*:*", "matchCriteriaId": "EC85B851-FEC7-4299-9EC5-D8A69E16B89C", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_07:*:*:*:*:*:*:*", "matchCriteriaId": "F78CD4B5-4B1D-4128-8AEA-2F967C38C6C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_7:*:*:*:*:*:*:*", "matchCriteriaId": "1B4E5018-6A0B-4F26-96AA-AD8F6EA7FB3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_8:*:*:*:*:*:*:*", "matchCriteriaId": "2978CF34-D48B-4ED2-A0C1-3CFAA5867223", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_08:*:*:*:*:*:*:*", "matchCriteriaId": "62CAA3E7-9D65-48F3-ACF7-9D705D94DE54", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_9:*:*:*:*:*:*:*", "matchCriteriaId": "2C0E6EA5-0D9F-4B15-860A-5DA3FD1765B8", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_09:*:*:*:*:*:*:*", "matchCriteriaId": "477C310B-50AD-4D40-8EDB-4A80F0BF321D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_10:*:*:*:*:*:*:*", "matchCriteriaId": "60A1F526-6B28-47A3-8D2C-06CA067E9164", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_11:*:*:*:*:*:*:*", "matchCriteriaId": "17F09D9E-B04B-477E-86E6-E1B1F9650973", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_12:*:*:*:*:*:*:*", "matchCriteriaId": "6F929C59-9602-4962-95B4-4165D66E5935", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_13:*:*:*:*:*:*:*", "matchCriteriaId": "E8B76949-9282-44D0-8075-74E482CE9A82", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_14:*:*:*:*:*:*:*", "matchCriteriaId": "B9B072DD-FC4F-4E07-9837-0E16017CA4AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_15:*:*:*:*:*:*:*", "matchCriteriaId": "969BE4EC-4D13-4B74-8137-FA0F83F0FDC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_16:*:*:*:*:*:*:*", "matchCriteriaId": "86408019-1B53-4AA8-9F05-47EBD0466EE2", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_17:*:*:*:*:*:*:*", "matchCriteriaId": "81F47561-F59C-4904-8E05-D8A9629405A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_18:*:*:*:*:*:*:*", "matchCriteriaId": "FB067445-8EA5-460F-B625-C21251E5A8D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_19:*:*:*:*:*:*:*", "matchCriteriaId": "B4C075BC-607E-47A1-A32D-B912D2FA03BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_20:*:*:*:*:*:*:*", "matchCriteriaId": "007175B8-48DB-46BE-B971-FB57B6A33723", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_21:*:*:*:*:*:*:*", "matchCriteriaId": "D5E6F92A-FC59-4CE7-B7F8-94CBF3DC8F21", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_22:*:*:*:*:*:*:*", "matchCriteriaId": "496901D5-014D-4920-A343-91A56F6FEFA0", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_23:*:*:*:*:*:*:*", "matchCriteriaId": "B2D18FBC-4C9B-4722-90AB-028D281654F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_24:*:*:*:*:*:*:*", "matchCriteriaId": "853BC114-592C-43FE-B227-EF41C494DC98", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_25:*:*:*:*:*:*:*", "matchCriteriaId": "B1F4E031-CE92-48C4-BECC-7C1190DB477A", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_01:*:*:*:*:*:*:*", "matchCriteriaId": "34710306-D6CF-4D07-84BF-71A8839BE416", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_01a:*:*:*:*:*:*:*", "matchCriteriaId": "44B93DC8-6375-4B41-B9BC-F22F592C56B9", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_2:*:*:*:*:*:*:*", "matchCriteriaId": "16AD9E9E-D6BD-4FCD-B857-F5013033200F", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_02:*:*:*:*:*:*:*", "matchCriteriaId": "87BF46A9-8E4A-4583-B35F-052FD481DF66", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_03:*:*:*:*:*:*:*", "matchCriteriaId": "32B351BB-6CA6-4CEF-9F5D-ED47774FC676", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_3:*:*:*:*:*:*:*", "matchCriteriaId": "21300F7C-6904-456C-949D-C0AFA630F4A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_4:*:*:*:*:*:*:*", "matchCriteriaId": "776FA44E-6277-4236-A872-103E7DDE5040", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_04:*:*:*:*:*:*:*", "matchCriteriaId": "CDA40FCD-1D34-4C47-908F-697433236153", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_5:*:*:*:*:*:*:*", "matchCriteriaId": "63267A02-DCE2-4B86-B370-B90F03C7E341", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_05:*:*:*:*:*:*:*", "matchCriteriaId": "00639A84-BD03-4BD9-A655-F806693DBC8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_6:*:*:*:*:*:*:*", "matchCriteriaId": "2E2AE42E-0E25-468F-A8CB-03991F356338", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_06:*:*:*:*:*:*:*", "matchCriteriaId": "14824B23-FF9F-4D6D-9D02-12B79BE346A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_7:*:*:*:*:*:*:*", "matchCriteriaId": "5E015A65-708E-45B9-B66A-2D0F09638FF5", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_07:*:*:*:*:*:*:*", "matchCriteriaId": "6493744C-A69D-4377-937E-85E7F5535EA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_8:*:*:*:*:*:*:*", "matchCriteriaId": "F86BA5FB-A611-458E-8E37-4D4927D04D89", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_08:*:*:*:*:*:*:*", "matchCriteriaId": "C09019B1-B873-41CE-951E-4777F324729C", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_9:*:*:*:*:*:*:*", "matchCriteriaId": "03949794-A1DD-420F-A468-8F00AEA7B69E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_09:*:*:*:*:*:*:*", "matchCriteriaId": "EC4209A0-E73F-4B5A-9925-B5D20F879455", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_10:*:*:*:*:*:*:*", "matchCriteriaId": "297DF5AD-FC22-432B-AE6A-2B1E6CFE1BE4", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_11:*:*:*:*:*:*:*", "matchCriteriaId": "BFB8516D-03C4-478D-AFE2-824867FDC739", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_12:*:*:*:*:*:*:*", "matchCriteriaId": "F82AED17-FEC3-47D0-A395-26ACD07FBE52", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_13:*:*:*:*:*:*:*", "matchCriteriaId": "9630BC7B-9039-4FA6-86F8-5274783F3EB1", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_14:*:*:*:*:*:*:*", "matchCriteriaId": "F1A6A15C-216A-42B1-84EF-B3D9A313D4A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_15:*:*:*:*:*:*:*", "matchCriteriaId": "EC39C819-9439-4029-8377-F6D58B3DFDFB", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_16:*:*:*:*:*:*:*", "matchCriteriaId": "A053DEF6-1317-4DA8-91D7-E1970DA62351", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_17:*:*:*:*:*:*:*", "matchCriteriaId": "F0DBFDD8-40AE-44F2-8F02-FB7A4FAE5235", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_18:*:*:*:*:*:*:*", "matchCriteriaId": "EB0605FF-3DDC-4F3A-8171-F3A447E9C292", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_19:*:*:*:*:*:*:*", "matchCriteriaId": "801FF3B4-0729-4710-BFC2-4B078029944F", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_20:*:*:*:*:*:*:*", "matchCriteriaId": "8EB8591E-3D6E-489B-B0D6-CEBB9D09EA68", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_21:*:*:*:*:*:*:*", "matchCriteriaId": "8A411676-6666-4B54-A008-443B9B42F670", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_22:*:*:*:*:*:*:*", "matchCriteriaId": "0AEDC9B2-8AA6-4DA2-A187-49A1DD106725", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_23:*:*:*:*:*:*:*", "matchCriteriaId": "8F69BEE4-CB4B-436A-9838-13239B368CF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_24:*:*:*:*:*:*:*", "matchCriteriaId": "11AC1050-38AF-49F4-A40C-AAF9710204AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_25:*:*:*:*:*:*:*", "matchCriteriaId": "8FA939E8-8747-4532-B6B4-6E83824C7067", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sun:java_se:*:*:business:*:*:*:*:*", "matchCriteriaId": "CB9A3291-3F2C-40E9-81D3-D148002E1782", "vulnerable": false } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_1:*:*:*:*:*:*", "matchCriteriaId": "8198F493-0447-4A87-9F16-5B6CB3572E38", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_10:*:*:*:*:*:*", "matchCriteriaId": "645BBE6D-BA5E-4D93-9152-759A2355013E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_11:*:*:*:*:*:*", "matchCriteriaId": "0EE694C9-940A-4899-844C-AC63412FA295", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_12:*:*:*:*:*:*", "matchCriteriaId": "BC9476DD-9B56-4811-A248-711C25181F29", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_13:*:*:*:*:*:*", "matchCriteriaId": "68D34082-2948-4D95-B43F-FBD59E2F3D28", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_14:*:*:*:*:*:*", "matchCriteriaId": "F2E01C07-4921-47CC-9AFC-D3B461D0B78D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_15:*:*:*:*:*:*", "matchCriteriaId": "7532E7D4-2F62-4DA0-B905-F95A0A735CE5", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_16:*:*:*:*:*:*", "matchCriteriaId": "0AF93193-889E-4F44-ADEB-E89E56DE6C7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_17:*:*:*:*:*:*", "matchCriteriaId": "68C19440-4172-4539-8E38-09DBCB1752E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_18:*:*:*:*:*:*", "matchCriteriaId": "3CC000EC-9717-47DA-B182-6C8CD3970F27", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_19:*:*:*:*:*:*", "matchCriteriaId": "115083C5-811F-47BA-8549-3BDFF9CA0740", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_2:*:*:*:*:*:*", "matchCriteriaId": "51337B8C-78F2-4207-998E-A3FC591F538B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_20:*:*:*:*:*:*", "matchCriteriaId": "48193108-CD9F-476E-A7D2-E0796F659BA5", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_21:*:*:*:*:*:*", "matchCriteriaId": "A0A80299-783A-4FBA-9EBF-5913942949A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_3:*:*:*:*:*:*", "matchCriteriaId": "76A4F852-0240-44D6-9BD5-FE79DEF16438", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_4:*:*:*:*:*:*", "matchCriteriaId": "F57E5943-5CC3-4736-85E8-FE7CC4F38735", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_5:*:*:*:*:*:*", "matchCriteriaId": "3C228E00-0F5C-41D2-8BD0-46AF682AE842", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_6:*:*:*:*:*:*", "matchCriteriaId": "0329E813-B2C8-4C84-BCAF-2D54C4AE0472", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_7:*:*:*:*:*:*", "matchCriteriaId": "7E3C40E1-7005-4F83-B347-177BEC9EE339", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_8:*:*:*:*:*:*", "matchCriteriaId": "6855E3F5-6F8E-44FA-A913-0D0F6A803DFF", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_9:*:*:*:*:*:*", "matchCriteriaId": "C79BDB6E-442B-41F1-A025-C17648A81FD9", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_1:*:*:*:*:*:*", "matchCriteriaId": "EBB09CE1-F4AC-472C-8D5D-594AEB322CFD", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_10:*:*:*:*:*:*", "matchCriteriaId": "722A93D8-B5BC-42F3-92A2-E424F61269A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_11:*:*:*:*:*:*", "matchCriteriaId": "775F2611-F11C-4B84-8F40-0D034B81BF18", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_12:*:*:*:*:*:*", "matchCriteriaId": "F20FDD9F-FF45-48BC-9207-54FB02E76071", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_13:*:*:*:*:*:*", "matchCriteriaId": "9FA326F5-894A-4B01-BCA3-B126DA81CA59", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_14:*:*:*:*:*:*", "matchCriteriaId": "228AB7B4-4BA4-43D4-B562-D438884DB152", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_15:*:*:*:*:*:*", "matchCriteriaId": "AFD5C688-2103-4D60-979E-D9BE69A989C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_16:*:*:*:*:*:*", "matchCriteriaId": "21421215-F722-4207-A2E5-E2DF4B29859B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_3:*:*:*:*:*:*", "matchCriteriaId": "D98175BF-B084-4FA5-899D-9E80DC3923EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_4:*:*:*:*:*:*", "matchCriteriaId": "820632CE-F8DF-47EE-B716-7530E60008B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_5:*:*:*:*:*:*", "matchCriteriaId": "FA2BD0A3-7B2D-447B-ABAC-7B867B03B632", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_6:*:*:*:*:*:*", "matchCriteriaId": "D54AB785-E9B7-47BD-B756-0C3A629D67DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_7:*:*:*:*:*:*", "matchCriteriaId": "E9412098-0353-4F7B-9245-010557E6C651", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_8:*:*:*:*:*:*", "matchCriteriaId": "FB0E9224-3D12-47E2-8E69-7B682284CDDD", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_9:*:*:*:*:*:*", "matchCriteriaId": "77BCD102-59A4-45A6-ADEF-CAB7F70E2377", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update2:*:*:*:*:*:*", "matchCriteriaId": "B8F93BBE-1E8C-4EB3-BCC7-20AB2D813F98", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_01:*:*:*:*:*:*:*", "matchCriteriaId": "27A472AF-049D-4D63-841C-1EF737E8D64D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_1:*:*:*:*:*:*:*", "matchCriteriaId": "1EEAB662-644A-4D7B-8237-64142CF48724", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_2:*:*:*:*:*:*:*", "matchCriteriaId": "D9598A49-95F2-42DB-B92C-CD026F739B83", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_02:*:*:*:*:*:*:*", "matchCriteriaId": "DB48B161-C239-4BB5-8667-7ACA5A5437F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_03:*:*:*:*:*:*:*", "matchCriteriaId": "83629616-1814-4858-B09F-79BEA82D6F55", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_3:*:*:*:*:*:*:*", "matchCriteriaId": "BED1009E-AE60-43A0-A0F5-38526EFCF423", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_4:*:*:*:*:*:*:*", "matchCriteriaId": "D011585C-0E62-4233-85FA-F29A07D68DA7", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_04:*:*:*:*:*:*:*", "matchCriteriaId": "03E8F351-F900-436E-A726-55AE31FBF832", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_05:*:*:*:*:*:*:*", "matchCriteriaId": "F76B79C6-ADD0-4992-A4BD-423A0AD38714", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_5:*:*:*:*:*:*:*", "matchCriteriaId": "F226D898-F0E8-41D8-BF40-54DE9FB5426D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_06:*:*:*:*:*:*:*", "matchCriteriaId": "FBFD41B5-6E33-4B00-81E8-9D91B0A03BD8", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_6:*:*:*:*:*:*:*", "matchCriteriaId": "4CB9CCD1-A67D-4800-9EC5-6E1A0B0B76E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_7:*:*:*:*:*:*:*", "matchCriteriaId": "CE28C283-447A-4F83-B96B-69F96E663C1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_07:*:*:*:*:*:*:*", "matchCriteriaId": "685D3F7F-30B9-4EB8-90FC-66A2A067A510", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_8:*:*:*:*:*:*:*", "matchCriteriaId": "D102063B-2434-4141-98E7-2DE501AE1728", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_08:*:*:*:*:*:*:*", "matchCriteriaId": "722B704B-A422-4163-AD48-F30CA4A07002", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_09:*:*:*:*:*:*:*", "matchCriteriaId": "C05784DC-626B-4D8D-A4DF-A42AC87131DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_9:*:*:*:*:*:*:*", "matchCriteriaId": "03B8CD03-CD31-4F4D-BA90-59435578A4F9", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_10:*:*:*:*:*:*:*", "matchCriteriaId": "41A994BF-1F64-480A-8AA5-748DDD0AB68C", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_11:*:*:*:*:*:*:*", "matchCriteriaId": "88519F2D-AD06-4F05-BEDA-A09216F1B481", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_12:*:*:*:*:*:*:*", "matchCriteriaId": "AC728978-368D-4B36-B149-70473E92BD1B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_13:*:*:*:*:*:*:*", "matchCriteriaId": "FD5187B1-CB86-48E8-A595-9FCFD9822C0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_14:*:*:*:*:*:*:*", "matchCriteriaId": "6C660DE4-543A-4E9B-825D-CD099D08CBD8", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_15:*:*:*:*:*:*:*", "matchCriteriaId": "98C1942E-16C0-4EB2-AB57-43EC6EC9C3A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_16:*:*:*:*:*:*:*", "matchCriteriaId": "318719C9-7B01-4021-B2EF-8341254DFE6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_17:*:*:*:*:*:*:*", "matchCriteriaId": "DB8FA9BA-51CA-4473-9FE1-9A32FB8C8041", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_18:*:*:*:*:*:*:*", "matchCriteriaId": "CC5E64B6-77DA-44BC-B646-AE01041B1830", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_19:*:*:*:*:*:*:*", "matchCriteriaId": "2DA35E80-9E0E-4A26-B631-A61542BE4739", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_20:*:*:*:*:*:*:*", "matchCriteriaId": "7EEB5367-1BB8-4ED3-8C04-ABA6BAA5AD10", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_21:*:*:*:*:*:*:*", "matchCriteriaId": "BED9E7C8-0418-4733-A496-61CCFD638859", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_22:*:*:*:*:*:*:*", "matchCriteriaId": "6566CE32-E042-424A-893B-C8A9E26E2869", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_1:*:*:*:*:*:*", "matchCriteriaId": "14E6127E-A40D-437D-B57B-0D7F57D08559", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_11:*:*:*:*:*:*", "matchCriteriaId": "28AE4411-45D1-4978-BA61-334AD04FF8FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_12:*:*:*:*:*:*", "matchCriteriaId": "479EB097-495A-4730-AF51-F2C0064EBA6E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_13:*:*:*:*:*:*", "matchCriteriaId": "9B3E7C12-8D97-42CC-9B2B-A0AE3267DE69", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_14:*:*:*:*:*:*", "matchCriteriaId": "5024BE9F-CE32-4099-A646-F3EC5DB6F63C", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_15:*:*:*:*:*:*", "matchCriteriaId": "DA9FB72A-C55F-4878-89D5-375FDA08163B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_16:*:*:*:*:*:*", "matchCriteriaId": "1CBC2A9C-9F21-4509-BA72-28B5DB16E55D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_17:*:*:*:*:*:*", "matchCriteriaId": "485F5ED3-062D-4A8E-AA34-9DC95D0D9646", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_18:*:*:*:*:*:*", "matchCriteriaId": "124364C5-0616-4C7A-A78F-08FABAA785CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_19:*:*:*:*:*:*", "matchCriteriaId": "A6BFFF1E-20D6-4508-9842-E7AB35F12B1D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_2:*:*:*:*:*:*", "matchCriteriaId": "DB7307A5-6F20-44FD-9D09-8FB76E444500", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_20:*:*:*:*:*:*", "matchCriteriaId": "2E7F3992-0C15-4371-BE14-0D2046B3976E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_21:*:*:*:*:*:*", "matchCriteriaId": "C5759CBC-D910-407D-83DF-A77FBDC8555D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_3:*:*:*:*:*:*", "matchCriteriaId": "0E45DE8A-477B-4BF7-893B-D11DDEE82E82", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_4:*:*:*:*:*:*", "matchCriteriaId": "D107CE0B-2EF2-4CF0-869E-3E27CBCA4997", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_5:*:*:*:*:*:*", "matchCriteriaId": "81DABB45-F39C-4BF4-8F2B-0CEE60A44C00", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_6:*:*:*:*:*:*", "matchCriteriaId": "CDDBD68A-771C-44FD-96A3-3AE189DE2591", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_7:*:*:*:*:*:*", "matchCriteriaId": "8FBD21F3-AC92-4154-948E-509FB8E097F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_8:*:*:*:*:*:*", "matchCriteriaId": "D91F9E0C-0A76-4DBC-A4E5-74E6682A5765", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_9:*:*:*:*:*:*", "matchCriteriaId": "86F7EF21-5395-4F1F-A15D-A1C7EDBFAB2A", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:*", "matchCriteriaId": "09027C19-D442-446F-B7A8-21DB6787CF43", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_10:*:*:*:*:*:*", "matchCriteriaId": "0A0FEC28-0707-4F42-9740-78F3D2D551EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_11:*:*:*:*:*:*", "matchCriteriaId": "C3C5879A-A608-4230-9DC1-C27F0F48A13B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_12:*:*:*:*:*:*", "matchCriteriaId": "0C71089A-BDDE-41FC-9DF9-9AEF4C2374DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_13:*:*:*:*:*:*", "matchCriteriaId": "2DBB6B73-8D6B-41FF-BEE0-E0C7F5F1EB41", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_14:*:*:*:*:*:*", "matchCriteriaId": "12A3B254-8580-45DB-BDE4-5B5A29CBFFB3", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_15:*:*:*:*:*:*", "matchCriteriaId": "1DB1DE6A-66AE-499B-AD92-9E6ACE474C6D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_16:*:*:*:*:*:*", "matchCriteriaId": "AADBB4F9-E43E-428B-9979-F47A15696C85", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_2:*:*:*:*:*:*", "matchCriteriaId": "7158D2C0-E9AC-4CD6-B777-EA7B7A181997", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_3:*:*:*:*:*:*", "matchCriteriaId": "90EC6C13-4B37-48E5-8199-A702A944D5A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_4:*:*:*:*:*:*", "matchCriteriaId": "2528152C-E20A-4D97-931C-A5EC3CEAA06D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_5:*:*:*:*:*:*", "matchCriteriaId": "A99DAB4C-272B-4C91-BC70-7729E1152590", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_6:*:*:*:*:*:*", "matchCriteriaId": "30DFC10A-A4D9-4F89-B17C-AB9260087D29", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_7:*:*:*:*:*:*", "matchCriteriaId": "272A5C44-18EC-41A9-8233-E9D4D0734EA6", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_8:*:*:*:*:*:*", "matchCriteriaId": "3DA21490-E253-4BDC-9BA8-5D068BE35189", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_9:*:*:*:*:*:*", "matchCriteriaId": "81C2C04D-D4BA-4C87-9609-C53AA63BFF19", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_1:*:*:*:*:*:*:*", "matchCriteriaId": "6F6453C9-7EE0-4FFB-861D-C2D9416DCABA", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_2:*:*:*:*:*:*:*", "matchCriteriaId": "89BF16DE-EEAB-4DA5-BFF1-7A0A58DE141F", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_02:*:*:*:*:*:*:*", "matchCriteriaId": "AF4E34FD-D927-42BB-8A16-031D77CB4B9E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_03:*:*:*:*:*:*:*", "matchCriteriaId": "37A3D49A-BE20-47BF-A85F-122357BAB098", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_3:*:*:*:*:*:*:*", "matchCriteriaId": "6DDE253E-C8B6-4C1D-AECE-ABEA1A67306B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_04:*:*:*:*:*:*:*", "matchCriteriaId": "F45DB5D3-7F35-4531-9A82-24EB50034787", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_4:*:*:*:*:*:*:*", "matchCriteriaId": "A56D9A60-F272-4D4C-A9DD-C93DAF783585", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_5:*:*:*:*:*:*:*", "matchCriteriaId": "EF109CAA-E8D2-4BD7-BE7C-AF8B2A78672E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_05:*:*:*:*:*:*:*", "matchCriteriaId": "4695F707-12E8-4BA4-BBE1-C21CB7213A2A", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_6:*:*:*:*:*:*:*", "matchCriteriaId": "976F4ACB-3725-45B7-B2EF-DEE4B88254E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_06:*:*:*:*:*:*:*", "matchCriteriaId": "C918FB49-DA13-4326-BE86-6F6BEA4CE4E1", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_07:*:*:*:*:*:*:*", "matchCriteriaId": "5573CAD1-39D1-4ADB-BB95-EBB554B43B4E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_7:*:*:*:*:*:*:*", "matchCriteriaId": "52BDD6A8-1611-4C3C-865D-6EDB5B9F8D88", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_8:*:*:*:*:*:*:*", "matchCriteriaId": "6A1F28FF-652A-4C89-9AC6-5E212F890811", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_08:*:*:*:*:*:*:*", "matchCriteriaId": "DD02EBDF-6E51-4538-9EDD-B1DE914D09C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_09:*:*:*:*:*:*:*", "matchCriteriaId": "53C3C0E3-5F40-412B-A4AD-A7A291DE2A08", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_9:*:*:*:*:*:*:*", "matchCriteriaId": "96A8C351-E9CD-431B-8B9D-712CA54C7213", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_10:*:*:*:*:*:*:*", "matchCriteriaId": "36888382-79C8-4C97-A654-C668CD68556F", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_11:*:*:*:*:*:*:*", "matchCriteriaId": "F34C99E6-F9F0-4EF3-8601-B47EAE3D7273", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_12:*:*:*:*:*:*:*", "matchCriteriaId": "A74DD08D-CEDB-460E-BED5-78F6CAF18BF5", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_13:*:*:*:*:*:*:*", "matchCriteriaId": "E60560EC-6DBD-4A17-BFFA-FAD9193A0BC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_14:*:*:*:*:*:*:*", "matchCriteriaId": "E4F64FBC-DC97-4FE3-A235-18B87945AF7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_15:*:*:*:*:*:*:*", "matchCriteriaId": "85048406-9051-4E69-94A8-5C449F3B89E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_16:*:*:*:*:*:*:*", "matchCriteriaId": "B1C88DD7-0B46-4405-BD35-60D27E2DBA14", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_17:*:*:*:*:*:*:*", "matchCriteriaId": "08D23B7C-7B8C-41B8-8D94-BB0F27C7F0A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_18:*:*:*:*:*:*:*", "matchCriteriaId": "1C49B997-95D3-4DA4-A353-DB41AD461C5E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_19:*:*:*:*:*:*:*", "matchCriteriaId": "6F70EF76-ED5F-4835-8252-FE613604FA3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_20:*:*:*:*:*:*:*", "matchCriteriaId": "6BDBCAD8-CDF7-4550-8EA2-1409B02FFAD6", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_21:*:*:*:*:*:*:*", "matchCriteriaId": "7E691333-0434-4808-9ED4-E82C6EC2FD37", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_22:*:*:*:*:*:*:*", "matchCriteriaId": "BBE7A538-FF2E-4622-8479-781AB73CBA45", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The JPEG Image Writer in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to gain privileges via a crafted image file, related to a \"quantization problem,\" aka Bug Id 6862968." }, { "lang": "es", "value": "El JPEG Image Writer en Sun Java SE en JDK y JRE v5.0 anteriores a Update 22, JDK y JRE 6 anteriores a Update 17, y SDK y JRE v1.4.x anteriores a v1.4.2_24 permite a los atacantes remotos obtener privilegios a trav\u00e9s de un archivo de imagen manipulado, relativo a \"problemas de cuantificaci\u00f3n\", tambi\u00e9n conocido como Bug 6862968." } ], "id": "CVE-2009-3873", "lastModified": "2024-11-21T01:08:23.620", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2009-11-05T16:30:00.467", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://java.sun.com/javase/6/webnotes/6u17.html" }, { "source": "cve@mitre.org", "url": "http://lists.apple.com/archives/security-announce/2009/Dec/msg00000.html" }, { "source": "cve@mitre.org", "url": "http://lists.apple.com/archives/security-announce/2009/Dec/msg00001.html" }, { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00010.html" }, { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=126566824131534\u0026w=2" }, { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=126566824131534\u0026w=2" }, { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=131593453929393\u0026w=2" }, { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=131593453929393\u0026w=2" }, { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=134254866602253\u0026w=2" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/37231" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/37239" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/37386" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/37581" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/37841" }, { "source": "cve@mitre.org", "url": "http://security.gentoo.org/glsa/glsa-200911-02.xml" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1023132" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-270474-1" }, { "source": "cve@mitre.org", "url": "http://support.apple.com/kb/HT3969" }, { "source": "cve@mitre.org", "url": "http://support.apple.com/kb/HT3970" }, { "source": "cve@mitre.org", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:084" }, { "source": "cve@mitre.org", "url": "http://www.oracle.com/technetwork/topics/security/cpujan2010-084891.html" }, { "source": "cve@mitre.org", "url": "http://www.redhat.com/support/errata/RHSA-2009-1694.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/36881" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2009/3131" }, { "source": "cve@mitre.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11746" }, { "source": "cve@mitre.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6970" }, { "source": "cve@mitre.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8396" }, { "source": "cve@mitre.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9602" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://java.sun.com/javase/6/webnotes/6u17.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.apple.com/archives/security-announce/2009/Dec/msg00000.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.apple.com/archives/security-announce/2009/Dec/msg00001.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00010.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=126566824131534\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=126566824131534\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=131593453929393\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=131593453929393\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=134254866602253\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/37231" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/37239" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/37386" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/37581" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/37841" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-200911-02.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1023132" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-270474-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://support.apple.com/kb/HT3969" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://support.apple.com/kb/HT3970" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:084" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.oracle.com/technetwork/topics/security/cpujan2010-084891.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2009-1694.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/36881" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2009/3131" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11746" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6970" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8396" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9602" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2009-08-10 20:30
Modified
2024-11-21 01:05
Severity ?
Summary
Race condition in the java.lang package in Sun Java SE 5.0 before Update 20 has unknown impact and attack vectors, related to a "3Y Race condition in reflection checks."
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sun:java_se:*:19:*:*:*:*:*:*", "matchCriteriaId": "DC8CDBBF-43EC-4FC0-BD17-C54BEB14F547", "versionEndIncluding": "5.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Race condition in the java.lang package in Sun Java SE 5.0 before Update 20 has unknown impact and attack vectors, related to a \"3Y Race condition in reflection checks.\"" }, { "lang": "es", "value": "Condici\u00f3n de carrera en el paquete java.lang en Sun Java SE v5.0 anterior a la actualizaci\u00f3n 20 tiene un impacto y vectores de ataque desconocidos, relacionados con \"Condici\u00f3n de carrera 3Y en comprobaciones de reflexi\u00f3n\"." } ], "id": "CVE-2009-2724", "lastModified": "2024-11-21T01:05:36.433", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2009-08-10T20:30:00.703", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://java.sun.com/j2se/1.5.0/ReleaseNotes.html" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/37386" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/37460" }, { "source": "cve@mitre.org", "url": "http://security.gentoo.org/glsa/glsa-200911-02.xml" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-118667-22-1" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2009/3316" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://java.sun.com/j2se/1.5.0/ReleaseNotes.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/37386" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/37460" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-200911-02.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-118667-22-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2009/3316" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-362" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2009-11-05 16:30
Modified
2024-11-21 01:08
Severity ?
Summary
Unspecified vulnerability in the JPEG JFIF Decoder in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to gain privileges via a crafted image file, aka Bug Id 6862969.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.4.2_1 | |
sun | jre | 1.4.2_2 | |
sun | jre | 1.4.2_02 | |
sun | jre | 1.4.2_03 | |
sun | jre | 1.4.2_3 | |
sun | jre | 1.4.2_4 | |
sun | jre | 1.4.2_04 | |
sun | jre | 1.4.2_05 | |
sun | jre | 1.4.2_5 | |
sun | jre | 1.4.2_06 | |
sun | jre | 1.4.2_6 | |
sun | jre | 1.4.2_7 | |
sun | jre | 1.4.2_07 | |
sun | jre | 1.4.2_8 | |
sun | jre | 1.4.2_08 | |
sun | jre | 1.4.2_09 | |
sun | jre | 1.4.2_9 | |
sun | jre | 1.4.2_10 | |
sun | jre | 1.4.2_11 | |
sun | jre | 1.4.2_12 | |
sun | jre | 1.4.2_13 | |
sun | jre | 1.4.2_14 | |
sun | jre | 1.4.2_15 | |
sun | jre | 1.4.2_16 | |
sun | jre | 1.4.2_17 | |
sun | jre | 1.4.2_18 | |
sun | jre | 1.4.2_19 | |
sun | jre | 1.4.2_20 | |
sun | jre | 1.4.2_21 | |
sun | jre | 1.4.2_22 | |
sun | sdk | 1.4.2_01 | |
sun | sdk | 1.4.2_1 | |
sun | sdk | 1.4.2_2 | |
sun | sdk | 1.4.2_02 | |
sun | sdk | 1.4.2_03 | |
sun | sdk | 1.4.2_3 | |
sun | sdk | 1.4.2_04 | |
sun | sdk | 1.4.2_4 | |
sun | sdk | 1.4.2_5 | |
sun | sdk | 1.4.2_05 | |
sun | sdk | 1.4.2_6 | |
sun | sdk | 1.4.2_06 | |
sun | sdk | 1.4.2_07 | |
sun | sdk | 1.4.2_7 | |
sun | sdk | 1.4.2_8 | |
sun | sdk | 1.4.2_08 | |
sun | sdk | 1.4.2_09 | |
sun | sdk | 1.4.2_9 | |
sun | sdk | 1.4.2_10 | |
sun | sdk | 1.4.2_11 | |
sun | sdk | 1.4.2_12 | |
sun | sdk | 1.4.2_13 | |
sun | sdk | 1.4.2_14 | |
sun | sdk | 1.4.2_15 | |
sun | sdk | 1.4.2_16 | |
sun | sdk | 1.4.2_17 | |
sun | sdk | 1.4.2_18 | |
sun | sdk | 1.4.2_19 | |
sun | sdk | 1.4.2_20 | |
sun | sdk | 1.4.2_21 | |
sun | sdk | 1.4.2_22 | |
sun | solaris | * | |
sun | jre | 1.3.1_1 | |
sun | jre | 1.3.1_01 | |
sun | jre | 1.3.1_01a | |
sun | jre | 1.3.1_02 | |
sun | jre | 1.3.1_2 | |
sun | jre | 1.3.1_03 | |
sun | jre | 1.3.1_3 | |
sun | jre | 1.3.1_4 | |
sun | jre | 1.3.1_04 | |
sun | jre | 1.3.1_05 | |
sun | jre | 1.3.1_5 | |
sun | jre | 1.3.1_06 | |
sun | jre | 1.3.1_6 | |
sun | jre | 1.3.1_07 | |
sun | jre | 1.3.1_7 | |
sun | jre | 1.3.1_8 | |
sun | jre | 1.3.1_08 | |
sun | jre | 1.3.1_9 | |
sun | jre | 1.3.1_09 | |
sun | jre | 1.3.1_10 | |
sun | jre | 1.3.1_11 | |
sun | jre | 1.3.1_12 | |
sun | jre | 1.3.1_13 | |
sun | jre | 1.3.1_14 | |
sun | jre | 1.3.1_15 | |
sun | jre | 1.3.1_16 | |
sun | jre | 1.3.1_17 | |
sun | jre | 1.3.1_18 | |
sun | jre | 1.3.1_19 | |
sun | jre | 1.3.1_20 | |
sun | jre | 1.3.1_21 | |
sun | jre | 1.3.1_22 | |
sun | jre | 1.3.1_23 | |
sun | jre | 1.3.1_24 | |
sun | jre | 1.3.1_25 | |
sun | sdk | 1.3.1_01 | |
sun | sdk | 1.3.1_01a | |
sun | sdk | 1.3.1_2 | |
sun | sdk | 1.3.1_02 | |
sun | sdk | 1.3.1_03 | |
sun | sdk | 1.3.1_3 | |
sun | sdk | 1.3.1_4 | |
sun | sdk | 1.3.1_04 | |
sun | sdk | 1.3.1_5 | |
sun | sdk | 1.3.1_05 | |
sun | sdk | 1.3.1_6 | |
sun | sdk | 1.3.1_06 | |
sun | sdk | 1.3.1_7 | |
sun | sdk | 1.3.1_07 | |
sun | sdk | 1.3.1_8 | |
sun | sdk | 1.3.1_08 | |
sun | sdk | 1.3.1_9 | |
sun | sdk | 1.3.1_09 | |
sun | sdk | 1.3.1_10 | |
sun | sdk | 1.3.1_11 | |
sun | sdk | 1.3.1_12 | |
sun | sdk | 1.3.1_13 | |
sun | sdk | 1.3.1_14 | |
sun | sdk | 1.3.1_15 | |
sun | sdk | 1.3.1_16 | |
sun | sdk | 1.3.1_17 | |
sun | sdk | 1.3.1_18 | |
sun | sdk | 1.3.1_19 | |
sun | sdk | 1.3.1_20 | |
sun | sdk | 1.3.1_21 | |
sun | sdk | 1.3.1_22 | |
sun | sdk | 1.3.1_23 | |
sun | sdk | 1.3.1_24 | |
sun | sdk | 1.3.1_25 | |
microsoft | windows | * | |
sun | java_se | * | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jre | 1.4.2_01 | |
sun | jre | 1.4.2_1 | |
sun | jre | 1.4.2_2 | |
sun | jre | 1.4.2_02 | |
sun | jre | 1.4.2_03 | |
sun | jre | 1.4.2_3 | |
sun | jre | 1.4.2_4 | |
sun | jre | 1.4.2_04 | |
sun | jre | 1.4.2_05 | |
sun | jre | 1.4.2_5 | |
sun | jre | 1.4.2_06 | |
sun | jre | 1.4.2_6 | |
sun | jre | 1.4.2_7 | |
sun | jre | 1.4.2_07 | |
sun | jre | 1.4.2_8 | |
sun | jre | 1.4.2_08 | |
sun | jre | 1.4.2_09 | |
sun | jre | 1.4.2_9 | |
sun | jre | 1.4.2_10 | |
sun | jre | 1.4.2_11 | |
sun | jre | 1.4.2_12 | |
sun | jre | 1.4.2_13 | |
sun | jre | 1.4.2_14 | |
sun | jre | 1.4.2_15 | |
sun | jre | 1.4.2_16 | |
sun | jre | 1.4.2_17 | |
sun | jre | 1.4.2_18 | |
sun | jre | 1.4.2_19 | |
sun | jre | 1.4.2_20 | |
sun | jre | 1.4.2_21 | |
sun | jre | 1.4.2_22 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | sdk | 1.4.2_1 | |
sun | sdk | 1.4.2_2 | |
sun | sdk | 1.4.2_02 | |
sun | sdk | 1.4.2_03 | |
sun | sdk | 1.4.2_3 | |
sun | sdk | 1.4.2_04 | |
sun | sdk | 1.4.2_4 | |
sun | sdk | 1.4.2_5 | |
sun | sdk | 1.4.2_05 | |
sun | sdk | 1.4.2_6 | |
sun | sdk | 1.4.2_06 | |
sun | sdk | 1.4.2_07 | |
sun | sdk | 1.4.2_7 | |
sun | sdk | 1.4.2_8 | |
sun | sdk | 1.4.2_08 | |
sun | sdk | 1.4.2_09 | |
sun | sdk | 1.4.2_9 | |
sun | sdk | 1.4.2_10 | |
sun | sdk | 1.4.2_11 | |
sun | sdk | 1.4.2_12 | |
sun | sdk | 1.4.2_13 | |
sun | sdk | 1.4.2_14 | |
sun | sdk | 1.4.2_15 | |
sun | sdk | 1.4.2_16 | |
sun | sdk | 1.4.2_17 | |
sun | sdk | 1.4.2_18 | |
sun | sdk | 1.4.2_19 | |
sun | sdk | 1.4.2_20 | |
sun | sdk | 1.4.2_21 | |
sun | sdk | 1.4.2_22 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_1:*:*:*:*:*:*", "matchCriteriaId": "8198F493-0447-4A87-9F16-5B6CB3572E38", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_10:*:*:*:*:*:*", "matchCriteriaId": "645BBE6D-BA5E-4D93-9152-759A2355013E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_11:*:*:*:*:*:*", "matchCriteriaId": "0EE694C9-940A-4899-844C-AC63412FA295", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_12:*:*:*:*:*:*", "matchCriteriaId": "BC9476DD-9B56-4811-A248-711C25181F29", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_13:*:*:*:*:*:*", "matchCriteriaId": "68D34082-2948-4D95-B43F-FBD59E2F3D28", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_14:*:*:*:*:*:*", "matchCriteriaId": "F2E01C07-4921-47CC-9AFC-D3B461D0B78D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_15:*:*:*:*:*:*", "matchCriteriaId": "7532E7D4-2F62-4DA0-B905-F95A0A735CE5", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_16:*:*:*:*:*:*", "matchCriteriaId": "0AF93193-889E-4F44-ADEB-E89E56DE6C7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_17:*:*:*:*:*:*", "matchCriteriaId": "68C19440-4172-4539-8E38-09DBCB1752E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_18:*:*:*:*:*:*", "matchCriteriaId": "3CC000EC-9717-47DA-B182-6C8CD3970F27", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_19:*:*:*:*:*:*", "matchCriteriaId": "115083C5-811F-47BA-8549-3BDFF9CA0740", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_2:*:*:*:*:*:*", "matchCriteriaId": "51337B8C-78F2-4207-998E-A3FC591F538B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_20:*:*:*:*:*:*", "matchCriteriaId": "48193108-CD9F-476E-A7D2-E0796F659BA5", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_21:*:*:*:*:*:*", "matchCriteriaId": "A0A80299-783A-4FBA-9EBF-5913942949A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_3:*:*:*:*:*:*", "matchCriteriaId": "76A4F852-0240-44D6-9BD5-FE79DEF16438", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_4:*:*:*:*:*:*", "matchCriteriaId": "F57E5943-5CC3-4736-85E8-FE7CC4F38735", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_5:*:*:*:*:*:*", "matchCriteriaId": "3C228E00-0F5C-41D2-8BD0-46AF682AE842", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_6:*:*:*:*:*:*", "matchCriteriaId": "0329E813-B2C8-4C84-BCAF-2D54C4AE0472", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_7:*:*:*:*:*:*", "matchCriteriaId": "7E3C40E1-7005-4F83-B347-177BEC9EE339", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_8:*:*:*:*:*:*", "matchCriteriaId": "6855E3F5-6F8E-44FA-A913-0D0F6A803DFF", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_9:*:*:*:*:*:*", "matchCriteriaId": "C79BDB6E-442B-41F1-A025-C17648A81FD9", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_1:*:*:*:*:*:*", "matchCriteriaId": "EBB09CE1-F4AC-472C-8D5D-594AEB322CFD", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_10:*:*:*:*:*:*", "matchCriteriaId": "722A93D8-B5BC-42F3-92A2-E424F61269A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_11:*:*:*:*:*:*", "matchCriteriaId": "775F2611-F11C-4B84-8F40-0D034B81BF18", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_12:*:*:*:*:*:*", "matchCriteriaId": "F20FDD9F-FF45-48BC-9207-54FB02E76071", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_13:*:*:*:*:*:*", "matchCriteriaId": "9FA326F5-894A-4B01-BCA3-B126DA81CA59", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_14:*:*:*:*:*:*", "matchCriteriaId": "228AB7B4-4BA4-43D4-B562-D438884DB152", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_15:*:*:*:*:*:*", "matchCriteriaId": "AFD5C688-2103-4D60-979E-D9BE69A989C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_16:*:*:*:*:*:*", "matchCriteriaId": "21421215-F722-4207-A2E5-E2DF4B29859B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_3:*:*:*:*:*:*", "matchCriteriaId": "D98175BF-B084-4FA5-899D-9E80DC3923EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_4:*:*:*:*:*:*", "matchCriteriaId": "820632CE-F8DF-47EE-B716-7530E60008B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_5:*:*:*:*:*:*", "matchCriteriaId": "FA2BD0A3-7B2D-447B-ABAC-7B867B03B632", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_6:*:*:*:*:*:*", "matchCriteriaId": "D54AB785-E9B7-47BD-B756-0C3A629D67DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_7:*:*:*:*:*:*", "matchCriteriaId": "E9412098-0353-4F7B-9245-010557E6C651", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_8:*:*:*:*:*:*", "matchCriteriaId": "FB0E9224-3D12-47E2-8E69-7B682284CDDD", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_9:*:*:*:*:*:*", "matchCriteriaId": "77BCD102-59A4-45A6-ADEF-CAB7F70E2377", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_1:*:*:*:*:*:*", "matchCriteriaId": "14E6127E-A40D-437D-B57B-0D7F57D08559", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_11:*:*:*:*:*:*", "matchCriteriaId": "28AE4411-45D1-4978-BA61-334AD04FF8FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_12:*:*:*:*:*:*", "matchCriteriaId": "479EB097-495A-4730-AF51-F2C0064EBA6E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_13:*:*:*:*:*:*", "matchCriteriaId": "9B3E7C12-8D97-42CC-9B2B-A0AE3267DE69", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_14:*:*:*:*:*:*", "matchCriteriaId": "5024BE9F-CE32-4099-A646-F3EC5DB6F63C", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_15:*:*:*:*:*:*", "matchCriteriaId": "DA9FB72A-C55F-4878-89D5-375FDA08163B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_16:*:*:*:*:*:*", "matchCriteriaId": "1CBC2A9C-9F21-4509-BA72-28B5DB16E55D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_17:*:*:*:*:*:*", "matchCriteriaId": "485F5ED3-062D-4A8E-AA34-9DC95D0D9646", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_18:*:*:*:*:*:*", "matchCriteriaId": "124364C5-0616-4C7A-A78F-08FABAA785CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_19:*:*:*:*:*:*", "matchCriteriaId": "A6BFFF1E-20D6-4508-9842-E7AB35F12B1D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_2:*:*:*:*:*:*", "matchCriteriaId": "DB7307A5-6F20-44FD-9D09-8FB76E444500", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_20:*:*:*:*:*:*", "matchCriteriaId": "2E7F3992-0C15-4371-BE14-0D2046B3976E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_21:*:*:*:*:*:*", "matchCriteriaId": "C5759CBC-D910-407D-83DF-A77FBDC8555D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_3:*:*:*:*:*:*", "matchCriteriaId": "0E45DE8A-477B-4BF7-893B-D11DDEE82E82", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_4:*:*:*:*:*:*", "matchCriteriaId": "D107CE0B-2EF2-4CF0-869E-3E27CBCA4997", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_5:*:*:*:*:*:*", "matchCriteriaId": "81DABB45-F39C-4BF4-8F2B-0CEE60A44C00", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_6:*:*:*:*:*:*", "matchCriteriaId": "CDDBD68A-771C-44FD-96A3-3AE189DE2591", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_7:*:*:*:*:*:*", "matchCriteriaId": "8FBD21F3-AC92-4154-948E-509FB8E097F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_8:*:*:*:*:*:*", "matchCriteriaId": "D91F9E0C-0A76-4DBC-A4E5-74E6682A5765", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_9:*:*:*:*:*:*", "matchCriteriaId": "86F7EF21-5395-4F1F-A15D-A1C7EDBFAB2A", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:*", "matchCriteriaId": "09027C19-D442-446F-B7A8-21DB6787CF43", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_10:*:*:*:*:*:*", "matchCriteriaId": "0A0FEC28-0707-4F42-9740-78F3D2D551EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_11:*:*:*:*:*:*", "matchCriteriaId": "C3C5879A-A608-4230-9DC1-C27F0F48A13B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_12:*:*:*:*:*:*", "matchCriteriaId": "0C71089A-BDDE-41FC-9DF9-9AEF4C2374DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_13:*:*:*:*:*:*", "matchCriteriaId": "2DBB6B73-8D6B-41FF-BEE0-E0C7F5F1EB41", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_14:*:*:*:*:*:*", "matchCriteriaId": "12A3B254-8580-45DB-BDE4-5B5A29CBFFB3", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_15:*:*:*:*:*:*", "matchCriteriaId": "1DB1DE6A-66AE-499B-AD92-9E6ACE474C6D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_16:*:*:*:*:*:*", "matchCriteriaId": "AADBB4F9-E43E-428B-9979-F47A15696C85", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_2:*:*:*:*:*:*", "matchCriteriaId": "7158D2C0-E9AC-4CD6-B777-EA7B7A181997", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_3:*:*:*:*:*:*", "matchCriteriaId": "90EC6C13-4B37-48E5-8199-A702A944D5A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_4:*:*:*:*:*:*", "matchCriteriaId": "2528152C-E20A-4D97-931C-A5EC3CEAA06D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_5:*:*:*:*:*:*", "matchCriteriaId": "A99DAB4C-272B-4C91-BC70-7729E1152590", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_6:*:*:*:*:*:*", "matchCriteriaId": "30DFC10A-A4D9-4F89-B17C-AB9260087D29", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_7:*:*:*:*:*:*", "matchCriteriaId": "272A5C44-18EC-41A9-8233-E9D4D0734EA6", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_8:*:*:*:*:*:*", "matchCriteriaId": "3DA21490-E253-4BDC-9BA8-5D068BE35189", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_9:*:*:*:*:*:*", "matchCriteriaId": "81C2C04D-D4BA-4C87-9609-C53AA63BFF19", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sun:jre:1.4.2_1:*:*:*:*:*:*:*", "matchCriteriaId": "1EEAB662-644A-4D7B-8237-64142CF48724", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_2:*:*:*:*:*:*:*", "matchCriteriaId": "D9598A49-95F2-42DB-B92C-CD026F739B83", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_02:*:*:*:*:*:*:*", "matchCriteriaId": "DB48B161-C239-4BB5-8667-7ACA5A5437F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_03:*:*:*:*:*:*:*", "matchCriteriaId": "83629616-1814-4858-B09F-79BEA82D6F55", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_3:*:*:*:*:*:*:*", "matchCriteriaId": "BED1009E-AE60-43A0-A0F5-38526EFCF423", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_4:*:*:*:*:*:*:*", "matchCriteriaId": "D011585C-0E62-4233-85FA-F29A07D68DA7", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_04:*:*:*:*:*:*:*", "matchCriteriaId": "03E8F351-F900-436E-A726-55AE31FBF832", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_05:*:*:*:*:*:*:*", "matchCriteriaId": "F76B79C6-ADD0-4992-A4BD-423A0AD38714", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_5:*:*:*:*:*:*:*", "matchCriteriaId": "F226D898-F0E8-41D8-BF40-54DE9FB5426D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_06:*:*:*:*:*:*:*", "matchCriteriaId": "FBFD41B5-6E33-4B00-81E8-9D91B0A03BD8", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_6:*:*:*:*:*:*:*", "matchCriteriaId": "4CB9CCD1-A67D-4800-9EC5-6E1A0B0B76E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_7:*:*:*:*:*:*:*", "matchCriteriaId": "CE28C283-447A-4F83-B96B-69F96E663C1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_07:*:*:*:*:*:*:*", "matchCriteriaId": "685D3F7F-30B9-4EB8-90FC-66A2A067A510", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_8:*:*:*:*:*:*:*", "matchCriteriaId": "D102063B-2434-4141-98E7-2DE501AE1728", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_08:*:*:*:*:*:*:*", "matchCriteriaId": "722B704B-A422-4163-AD48-F30CA4A07002", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_09:*:*:*:*:*:*:*", "matchCriteriaId": "C05784DC-626B-4D8D-A4DF-A42AC87131DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_9:*:*:*:*:*:*:*", "matchCriteriaId": "03B8CD03-CD31-4F4D-BA90-59435578A4F9", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_10:*:*:*:*:*:*:*", "matchCriteriaId": "41A994BF-1F64-480A-8AA5-748DDD0AB68C", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_11:*:*:*:*:*:*:*", "matchCriteriaId": "88519F2D-AD06-4F05-BEDA-A09216F1B481", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_12:*:*:*:*:*:*:*", "matchCriteriaId": "AC728978-368D-4B36-B149-70473E92BD1B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_13:*:*:*:*:*:*:*", "matchCriteriaId": "FD5187B1-CB86-48E8-A595-9FCFD9822C0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_14:*:*:*:*:*:*:*", "matchCriteriaId": "6C660DE4-543A-4E9B-825D-CD099D08CBD8", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_15:*:*:*:*:*:*:*", "matchCriteriaId": "98C1942E-16C0-4EB2-AB57-43EC6EC9C3A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_16:*:*:*:*:*:*:*", "matchCriteriaId": "318719C9-7B01-4021-B2EF-8341254DFE6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_17:*:*:*:*:*:*:*", "matchCriteriaId": "DB8FA9BA-51CA-4473-9FE1-9A32FB8C8041", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_18:*:*:*:*:*:*:*", "matchCriteriaId": "CC5E64B6-77DA-44BC-B646-AE01041B1830", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_19:*:*:*:*:*:*:*", "matchCriteriaId": "2DA35E80-9E0E-4A26-B631-A61542BE4739", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_20:*:*:*:*:*:*:*", "matchCriteriaId": "7EEB5367-1BB8-4ED3-8C04-ABA6BAA5AD10", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_21:*:*:*:*:*:*:*", "matchCriteriaId": "BED9E7C8-0418-4733-A496-61CCFD638859", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_22:*:*:*:*:*:*:*", "matchCriteriaId": "6566CE32-E042-424A-893B-C8A9E26E2869", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_01:*:*:*:*:*:*:*", "matchCriteriaId": "E6C4CA79-9D0A-4E47-A1A4-9CBEDDCFE05E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_1:*:*:*:*:*:*:*", "matchCriteriaId": "6F6453C9-7EE0-4FFB-861D-C2D9416DCABA", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_2:*:*:*:*:*:*:*", "matchCriteriaId": "89BF16DE-EEAB-4DA5-BFF1-7A0A58DE141F", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_02:*:*:*:*:*:*:*", "matchCriteriaId": "AF4E34FD-D927-42BB-8A16-031D77CB4B9E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_03:*:*:*:*:*:*:*", "matchCriteriaId": "37A3D49A-BE20-47BF-A85F-122357BAB098", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_3:*:*:*:*:*:*:*", "matchCriteriaId": "6DDE253E-C8B6-4C1D-AECE-ABEA1A67306B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_04:*:*:*:*:*:*:*", "matchCriteriaId": "F45DB5D3-7F35-4531-9A82-24EB50034787", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_4:*:*:*:*:*:*:*", "matchCriteriaId": "A56D9A60-F272-4D4C-A9DD-C93DAF783585", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_5:*:*:*:*:*:*:*", "matchCriteriaId": "EF109CAA-E8D2-4BD7-BE7C-AF8B2A78672E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_05:*:*:*:*:*:*:*", "matchCriteriaId": "4695F707-12E8-4BA4-BBE1-C21CB7213A2A", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_6:*:*:*:*:*:*:*", "matchCriteriaId": "976F4ACB-3725-45B7-B2EF-DEE4B88254E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_06:*:*:*:*:*:*:*", "matchCriteriaId": "C918FB49-DA13-4326-BE86-6F6BEA4CE4E1", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_07:*:*:*:*:*:*:*", "matchCriteriaId": "5573CAD1-39D1-4ADB-BB95-EBB554B43B4E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_7:*:*:*:*:*:*:*", "matchCriteriaId": "52BDD6A8-1611-4C3C-865D-6EDB5B9F8D88", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_8:*:*:*:*:*:*:*", "matchCriteriaId": "6A1F28FF-652A-4C89-9AC6-5E212F890811", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_08:*:*:*:*:*:*:*", "matchCriteriaId": "DD02EBDF-6E51-4538-9EDD-B1DE914D09C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_09:*:*:*:*:*:*:*", "matchCriteriaId": "53C3C0E3-5F40-412B-A4AD-A7A291DE2A08", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_9:*:*:*:*:*:*:*", "matchCriteriaId": "96A8C351-E9CD-431B-8B9D-712CA54C7213", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_10:*:*:*:*:*:*:*", "matchCriteriaId": "36888382-79C8-4C97-A654-C668CD68556F", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_11:*:*:*:*:*:*:*", "matchCriteriaId": "F34C99E6-F9F0-4EF3-8601-B47EAE3D7273", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_12:*:*:*:*:*:*:*", "matchCriteriaId": "A74DD08D-CEDB-460E-BED5-78F6CAF18BF5", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_13:*:*:*:*:*:*:*", "matchCriteriaId": "E60560EC-6DBD-4A17-BFFA-FAD9193A0BC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_14:*:*:*:*:*:*:*", "matchCriteriaId": "E4F64FBC-DC97-4FE3-A235-18B87945AF7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_15:*:*:*:*:*:*:*", "matchCriteriaId": "85048406-9051-4E69-94A8-5C449F3B89E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_16:*:*:*:*:*:*:*", "matchCriteriaId": "B1C88DD7-0B46-4405-BD35-60D27E2DBA14", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_17:*:*:*:*:*:*:*", "matchCriteriaId": "08D23B7C-7B8C-41B8-8D94-BB0F27C7F0A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_18:*:*:*:*:*:*:*", "matchCriteriaId": "1C49B997-95D3-4DA4-A353-DB41AD461C5E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_19:*:*:*:*:*:*:*", "matchCriteriaId": "6F70EF76-ED5F-4835-8252-FE613604FA3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_20:*:*:*:*:*:*:*", "matchCriteriaId": "6BDBCAD8-CDF7-4550-8EA2-1409B02FFAD6", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_21:*:*:*:*:*:*:*", "matchCriteriaId": "7E691333-0434-4808-9ED4-E82C6EC2FD37", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_22:*:*:*:*:*:*:*", "matchCriteriaId": "BBE7A538-FF2E-4622-8479-781AB73CBA45", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:sun:solaris:*:*:*:*:*:*:*:*", "matchCriteriaId": "469B74F2-4B89-42B8-8638-731E92D463B9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sun:jre:1.3.1_1:*:*:*:*:*:*:*", "matchCriteriaId": "EA460D9A-662F-4861-9835-3D3116FB9488", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_01:*:*:*:*:*:*:*", "matchCriteriaId": "7E49A68E-0886-4AED-8FF4-9455914BFE16", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_01a:*:*:*:*:*:*:*", "matchCriteriaId": "E94B0A27-60D3-42F5-9DF6-75F481C2460D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_02:*:*:*:*:*:*:*", "matchCriteriaId": "89E95205-DB64-44AD-81A4-B77BD7595AAF", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_2:*:*:*:*:*:*:*", "matchCriteriaId": "0875E34D-8544-49B9-BAD9-8191CC103A07", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_03:*:*:*:*:*:*:*", "matchCriteriaId": "62E772B9-8E41-476F-81F5-87B41F1827A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_3:*:*:*:*:*:*:*", "matchCriteriaId": "B9643B49-FC4B-4AD4-90AC-939DDAA96518", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_4:*:*:*:*:*:*:*", "matchCriteriaId": "F76773E5-0A91-49B8-8C9C-DD64AB9F74BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_04:*:*:*:*:*:*:*", "matchCriteriaId": "7CE78463-2CE8-43C6-BB06-AA40C72B1A4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_05:*:*:*:*:*:*:*", "matchCriteriaId": "31A04480-92DF-49AD-9B36-7F1FCB29DE90", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_5:*:*:*:*:*:*:*", "matchCriteriaId": "ADF93A34-0535-4289-B12C-A1E1E22C13D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_06:*:*:*:*:*:*:*", "matchCriteriaId": "E2FD0B72-683D-4FF6-BCF5-5DE85BF3064B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_6:*:*:*:*:*:*:*", "matchCriteriaId": "EC85B851-FEC7-4299-9EC5-D8A69E16B89C", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_07:*:*:*:*:*:*:*", "matchCriteriaId": "F78CD4B5-4B1D-4128-8AEA-2F967C38C6C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_7:*:*:*:*:*:*:*", "matchCriteriaId": "1B4E5018-6A0B-4F26-96AA-AD8F6EA7FB3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_8:*:*:*:*:*:*:*", "matchCriteriaId": "2978CF34-D48B-4ED2-A0C1-3CFAA5867223", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_08:*:*:*:*:*:*:*", "matchCriteriaId": "62CAA3E7-9D65-48F3-ACF7-9D705D94DE54", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_9:*:*:*:*:*:*:*", "matchCriteriaId": "2C0E6EA5-0D9F-4B15-860A-5DA3FD1765B8", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_09:*:*:*:*:*:*:*", "matchCriteriaId": "477C310B-50AD-4D40-8EDB-4A80F0BF321D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_10:*:*:*:*:*:*:*", "matchCriteriaId": "60A1F526-6B28-47A3-8D2C-06CA067E9164", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_11:*:*:*:*:*:*:*", "matchCriteriaId": "17F09D9E-B04B-477E-86E6-E1B1F9650973", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_12:*:*:*:*:*:*:*", "matchCriteriaId": "6F929C59-9602-4962-95B4-4165D66E5935", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_13:*:*:*:*:*:*:*", "matchCriteriaId": "E8B76949-9282-44D0-8075-74E482CE9A82", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_14:*:*:*:*:*:*:*", "matchCriteriaId": "B9B072DD-FC4F-4E07-9837-0E16017CA4AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_15:*:*:*:*:*:*:*", "matchCriteriaId": "969BE4EC-4D13-4B74-8137-FA0F83F0FDC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_16:*:*:*:*:*:*:*", "matchCriteriaId": "86408019-1B53-4AA8-9F05-47EBD0466EE2", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_17:*:*:*:*:*:*:*", "matchCriteriaId": "81F47561-F59C-4904-8E05-D8A9629405A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_18:*:*:*:*:*:*:*", "matchCriteriaId": "FB067445-8EA5-460F-B625-C21251E5A8D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_19:*:*:*:*:*:*:*", "matchCriteriaId": "B4C075BC-607E-47A1-A32D-B912D2FA03BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_20:*:*:*:*:*:*:*", "matchCriteriaId": "007175B8-48DB-46BE-B971-FB57B6A33723", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_21:*:*:*:*:*:*:*", "matchCriteriaId": "D5E6F92A-FC59-4CE7-B7F8-94CBF3DC8F21", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_22:*:*:*:*:*:*:*", "matchCriteriaId": "496901D5-014D-4920-A343-91A56F6FEFA0", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_23:*:*:*:*:*:*:*", "matchCriteriaId": "B2D18FBC-4C9B-4722-90AB-028D281654F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_24:*:*:*:*:*:*:*", "matchCriteriaId": "853BC114-592C-43FE-B227-EF41C494DC98", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_25:*:*:*:*:*:*:*", "matchCriteriaId": "B1F4E031-CE92-48C4-BECC-7C1190DB477A", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_01:*:*:*:*:*:*:*", "matchCriteriaId": "34710306-D6CF-4D07-84BF-71A8839BE416", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_01a:*:*:*:*:*:*:*", "matchCriteriaId": "44B93DC8-6375-4B41-B9BC-F22F592C56B9", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_2:*:*:*:*:*:*:*", "matchCriteriaId": "16AD9E9E-D6BD-4FCD-B857-F5013033200F", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_02:*:*:*:*:*:*:*", "matchCriteriaId": "87BF46A9-8E4A-4583-B35F-052FD481DF66", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_03:*:*:*:*:*:*:*", "matchCriteriaId": "32B351BB-6CA6-4CEF-9F5D-ED47774FC676", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_3:*:*:*:*:*:*:*", "matchCriteriaId": "21300F7C-6904-456C-949D-C0AFA630F4A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_4:*:*:*:*:*:*:*", "matchCriteriaId": "776FA44E-6277-4236-A872-103E7DDE5040", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_04:*:*:*:*:*:*:*", "matchCriteriaId": "CDA40FCD-1D34-4C47-908F-697433236153", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_5:*:*:*:*:*:*:*", "matchCriteriaId": "63267A02-DCE2-4B86-B370-B90F03C7E341", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_05:*:*:*:*:*:*:*", "matchCriteriaId": "00639A84-BD03-4BD9-A655-F806693DBC8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_6:*:*:*:*:*:*:*", "matchCriteriaId": "2E2AE42E-0E25-468F-A8CB-03991F356338", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_06:*:*:*:*:*:*:*", "matchCriteriaId": "14824B23-FF9F-4D6D-9D02-12B79BE346A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_7:*:*:*:*:*:*:*", "matchCriteriaId": "5E015A65-708E-45B9-B66A-2D0F09638FF5", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_07:*:*:*:*:*:*:*", "matchCriteriaId": "6493744C-A69D-4377-937E-85E7F5535EA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_8:*:*:*:*:*:*:*", "matchCriteriaId": "F86BA5FB-A611-458E-8E37-4D4927D04D89", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_08:*:*:*:*:*:*:*", "matchCriteriaId": "C09019B1-B873-41CE-951E-4777F324729C", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_9:*:*:*:*:*:*:*", "matchCriteriaId": "03949794-A1DD-420F-A468-8F00AEA7B69E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_09:*:*:*:*:*:*:*", "matchCriteriaId": "EC4209A0-E73F-4B5A-9925-B5D20F879455", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_10:*:*:*:*:*:*:*", "matchCriteriaId": "297DF5AD-FC22-432B-AE6A-2B1E6CFE1BE4", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_11:*:*:*:*:*:*:*", "matchCriteriaId": "BFB8516D-03C4-478D-AFE2-824867FDC739", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_12:*:*:*:*:*:*:*", "matchCriteriaId": "F82AED17-FEC3-47D0-A395-26ACD07FBE52", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_13:*:*:*:*:*:*:*", "matchCriteriaId": "9630BC7B-9039-4FA6-86F8-5274783F3EB1", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_14:*:*:*:*:*:*:*", "matchCriteriaId": "F1A6A15C-216A-42B1-84EF-B3D9A313D4A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_15:*:*:*:*:*:*:*", "matchCriteriaId": "EC39C819-9439-4029-8377-F6D58B3DFDFB", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_16:*:*:*:*:*:*:*", "matchCriteriaId": "A053DEF6-1317-4DA8-91D7-E1970DA62351", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_17:*:*:*:*:*:*:*", "matchCriteriaId": "F0DBFDD8-40AE-44F2-8F02-FB7A4FAE5235", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_18:*:*:*:*:*:*:*", "matchCriteriaId": "EB0605FF-3DDC-4F3A-8171-F3A447E9C292", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_19:*:*:*:*:*:*:*", "matchCriteriaId": "801FF3B4-0729-4710-BFC2-4B078029944F", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_20:*:*:*:*:*:*:*", "matchCriteriaId": "8EB8591E-3D6E-489B-B0D6-CEBB9D09EA68", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_21:*:*:*:*:*:*:*", "matchCriteriaId": "8A411676-6666-4B54-A008-443B9B42F670", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_22:*:*:*:*:*:*:*", "matchCriteriaId": "0AEDC9B2-8AA6-4DA2-A187-49A1DD106725", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_23:*:*:*:*:*:*:*", "matchCriteriaId": "8F69BEE4-CB4B-436A-9838-13239B368CF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_24:*:*:*:*:*:*:*", "matchCriteriaId": "11AC1050-38AF-49F4-A40C-AAF9710204AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_25:*:*:*:*:*:*:*", "matchCriteriaId": "8FA939E8-8747-4532-B6B4-6E83824C7067", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sun:java_se:*:*:business:*:*:*:*:*", "matchCriteriaId": "CB9A3291-3F2C-40E9-81D3-D148002E1782", "vulnerable": false } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_1:*:*:*:*:*:*", "matchCriteriaId": "8198F493-0447-4A87-9F16-5B6CB3572E38", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_10:*:*:*:*:*:*", "matchCriteriaId": "645BBE6D-BA5E-4D93-9152-759A2355013E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_11:*:*:*:*:*:*", "matchCriteriaId": "0EE694C9-940A-4899-844C-AC63412FA295", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_12:*:*:*:*:*:*", "matchCriteriaId": "BC9476DD-9B56-4811-A248-711C25181F29", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_13:*:*:*:*:*:*", "matchCriteriaId": "68D34082-2948-4D95-B43F-FBD59E2F3D28", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_14:*:*:*:*:*:*", "matchCriteriaId": "F2E01C07-4921-47CC-9AFC-D3B461D0B78D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_15:*:*:*:*:*:*", "matchCriteriaId": "7532E7D4-2F62-4DA0-B905-F95A0A735CE5", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_16:*:*:*:*:*:*", "matchCriteriaId": "0AF93193-889E-4F44-ADEB-E89E56DE6C7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_17:*:*:*:*:*:*", "matchCriteriaId": "68C19440-4172-4539-8E38-09DBCB1752E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_18:*:*:*:*:*:*", "matchCriteriaId": "3CC000EC-9717-47DA-B182-6C8CD3970F27", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_19:*:*:*:*:*:*", "matchCriteriaId": "115083C5-811F-47BA-8549-3BDFF9CA0740", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_2:*:*:*:*:*:*", "matchCriteriaId": "51337B8C-78F2-4207-998E-A3FC591F538B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_20:*:*:*:*:*:*", "matchCriteriaId": "48193108-CD9F-476E-A7D2-E0796F659BA5", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_21:*:*:*:*:*:*", "matchCriteriaId": "A0A80299-783A-4FBA-9EBF-5913942949A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_3:*:*:*:*:*:*", "matchCriteriaId": "76A4F852-0240-44D6-9BD5-FE79DEF16438", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_4:*:*:*:*:*:*", "matchCriteriaId": "F57E5943-5CC3-4736-85E8-FE7CC4F38735", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_5:*:*:*:*:*:*", "matchCriteriaId": "3C228E00-0F5C-41D2-8BD0-46AF682AE842", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_6:*:*:*:*:*:*", "matchCriteriaId": "0329E813-B2C8-4C84-BCAF-2D54C4AE0472", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_7:*:*:*:*:*:*", "matchCriteriaId": "7E3C40E1-7005-4F83-B347-177BEC9EE339", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_8:*:*:*:*:*:*", "matchCriteriaId": "6855E3F5-6F8E-44FA-A913-0D0F6A803DFF", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update_9:*:*:*:*:*:*", "matchCriteriaId": "C79BDB6E-442B-41F1-A025-C17648A81FD9", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_1:*:*:*:*:*:*", "matchCriteriaId": "EBB09CE1-F4AC-472C-8D5D-594AEB322CFD", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_10:*:*:*:*:*:*", "matchCriteriaId": "722A93D8-B5BC-42F3-92A2-E424F61269A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_11:*:*:*:*:*:*", "matchCriteriaId": "775F2611-F11C-4B84-8F40-0D034B81BF18", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_12:*:*:*:*:*:*", "matchCriteriaId": "F20FDD9F-FF45-48BC-9207-54FB02E76071", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_13:*:*:*:*:*:*", "matchCriteriaId": "9FA326F5-894A-4B01-BCA3-B126DA81CA59", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_14:*:*:*:*:*:*", "matchCriteriaId": "228AB7B4-4BA4-43D4-B562-D438884DB152", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_15:*:*:*:*:*:*", "matchCriteriaId": "AFD5C688-2103-4D60-979E-D9BE69A989C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_16:*:*:*:*:*:*", "matchCriteriaId": "21421215-F722-4207-A2E5-E2DF4B29859B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_3:*:*:*:*:*:*", "matchCriteriaId": "D98175BF-B084-4FA5-899D-9E80DC3923EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_4:*:*:*:*:*:*", "matchCriteriaId": "820632CE-F8DF-47EE-B716-7530E60008B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_5:*:*:*:*:*:*", "matchCriteriaId": "FA2BD0A3-7B2D-447B-ABAC-7B867B03B632", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_6:*:*:*:*:*:*", "matchCriteriaId": "D54AB785-E9B7-47BD-B756-0C3A629D67DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_7:*:*:*:*:*:*", "matchCriteriaId": "E9412098-0353-4F7B-9245-010557E6C651", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_8:*:*:*:*:*:*", "matchCriteriaId": "FB0E9224-3D12-47E2-8E69-7B682284CDDD", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_9:*:*:*:*:*:*", "matchCriteriaId": "77BCD102-59A4-45A6-ADEF-CAB7F70E2377", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update2:*:*:*:*:*:*", "matchCriteriaId": "B8F93BBE-1E8C-4EB3-BCC7-20AB2D813F98", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_01:*:*:*:*:*:*:*", "matchCriteriaId": "27A472AF-049D-4D63-841C-1EF737E8D64D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_1:*:*:*:*:*:*:*", "matchCriteriaId": "1EEAB662-644A-4D7B-8237-64142CF48724", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_2:*:*:*:*:*:*:*", "matchCriteriaId": "D9598A49-95F2-42DB-B92C-CD026F739B83", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_02:*:*:*:*:*:*:*", "matchCriteriaId": "DB48B161-C239-4BB5-8667-7ACA5A5437F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_03:*:*:*:*:*:*:*", "matchCriteriaId": "83629616-1814-4858-B09F-79BEA82D6F55", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_3:*:*:*:*:*:*:*", "matchCriteriaId": "BED1009E-AE60-43A0-A0F5-38526EFCF423", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_4:*:*:*:*:*:*:*", "matchCriteriaId": "D011585C-0E62-4233-85FA-F29A07D68DA7", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_04:*:*:*:*:*:*:*", "matchCriteriaId": "03E8F351-F900-436E-A726-55AE31FBF832", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_05:*:*:*:*:*:*:*", "matchCriteriaId": "F76B79C6-ADD0-4992-A4BD-423A0AD38714", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_5:*:*:*:*:*:*:*", "matchCriteriaId": "F226D898-F0E8-41D8-BF40-54DE9FB5426D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_06:*:*:*:*:*:*:*", "matchCriteriaId": "FBFD41B5-6E33-4B00-81E8-9D91B0A03BD8", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_6:*:*:*:*:*:*:*", "matchCriteriaId": "4CB9CCD1-A67D-4800-9EC5-6E1A0B0B76E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_7:*:*:*:*:*:*:*", "matchCriteriaId": "CE28C283-447A-4F83-B96B-69F96E663C1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_07:*:*:*:*:*:*:*", "matchCriteriaId": "685D3F7F-30B9-4EB8-90FC-66A2A067A510", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_8:*:*:*:*:*:*:*", "matchCriteriaId": "D102063B-2434-4141-98E7-2DE501AE1728", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_08:*:*:*:*:*:*:*", "matchCriteriaId": "722B704B-A422-4163-AD48-F30CA4A07002", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_09:*:*:*:*:*:*:*", "matchCriteriaId": "C05784DC-626B-4D8D-A4DF-A42AC87131DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_9:*:*:*:*:*:*:*", "matchCriteriaId": "03B8CD03-CD31-4F4D-BA90-59435578A4F9", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_10:*:*:*:*:*:*:*", "matchCriteriaId": "41A994BF-1F64-480A-8AA5-748DDD0AB68C", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_11:*:*:*:*:*:*:*", "matchCriteriaId": "88519F2D-AD06-4F05-BEDA-A09216F1B481", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_12:*:*:*:*:*:*:*", "matchCriteriaId": "AC728978-368D-4B36-B149-70473E92BD1B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_13:*:*:*:*:*:*:*", "matchCriteriaId": "FD5187B1-CB86-48E8-A595-9FCFD9822C0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_14:*:*:*:*:*:*:*", "matchCriteriaId": "6C660DE4-543A-4E9B-825D-CD099D08CBD8", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_15:*:*:*:*:*:*:*", "matchCriteriaId": "98C1942E-16C0-4EB2-AB57-43EC6EC9C3A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_16:*:*:*:*:*:*:*", "matchCriteriaId": "318719C9-7B01-4021-B2EF-8341254DFE6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_17:*:*:*:*:*:*:*", "matchCriteriaId": "DB8FA9BA-51CA-4473-9FE1-9A32FB8C8041", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_18:*:*:*:*:*:*:*", "matchCriteriaId": "CC5E64B6-77DA-44BC-B646-AE01041B1830", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_19:*:*:*:*:*:*:*", "matchCriteriaId": "2DA35E80-9E0E-4A26-B631-A61542BE4739", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_20:*:*:*:*:*:*:*", "matchCriteriaId": "7EEB5367-1BB8-4ED3-8C04-ABA6BAA5AD10", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_21:*:*:*:*:*:*:*", "matchCriteriaId": "BED9E7C8-0418-4733-A496-61CCFD638859", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_22:*:*:*:*:*:*:*", "matchCriteriaId": "6566CE32-E042-424A-893B-C8A9E26E2869", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_1:*:*:*:*:*:*", "matchCriteriaId": "14E6127E-A40D-437D-B57B-0D7F57D08559", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_11:*:*:*:*:*:*", "matchCriteriaId": "28AE4411-45D1-4978-BA61-334AD04FF8FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_12:*:*:*:*:*:*", "matchCriteriaId": "479EB097-495A-4730-AF51-F2C0064EBA6E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_13:*:*:*:*:*:*", "matchCriteriaId": "9B3E7C12-8D97-42CC-9B2B-A0AE3267DE69", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_14:*:*:*:*:*:*", "matchCriteriaId": "5024BE9F-CE32-4099-A646-F3EC5DB6F63C", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_15:*:*:*:*:*:*", "matchCriteriaId": "DA9FB72A-C55F-4878-89D5-375FDA08163B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_16:*:*:*:*:*:*", "matchCriteriaId": "1CBC2A9C-9F21-4509-BA72-28B5DB16E55D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_17:*:*:*:*:*:*", "matchCriteriaId": "485F5ED3-062D-4A8E-AA34-9DC95D0D9646", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_18:*:*:*:*:*:*", "matchCriteriaId": "124364C5-0616-4C7A-A78F-08FABAA785CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_19:*:*:*:*:*:*", "matchCriteriaId": "A6BFFF1E-20D6-4508-9842-E7AB35F12B1D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_2:*:*:*:*:*:*", "matchCriteriaId": "DB7307A5-6F20-44FD-9D09-8FB76E444500", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_20:*:*:*:*:*:*", "matchCriteriaId": "2E7F3992-0C15-4371-BE14-0D2046B3976E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_21:*:*:*:*:*:*", "matchCriteriaId": "C5759CBC-D910-407D-83DF-A77FBDC8555D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_3:*:*:*:*:*:*", "matchCriteriaId": "0E45DE8A-477B-4BF7-893B-D11DDEE82E82", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_4:*:*:*:*:*:*", "matchCriteriaId": "D107CE0B-2EF2-4CF0-869E-3E27CBCA4997", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_5:*:*:*:*:*:*", "matchCriteriaId": "81DABB45-F39C-4BF4-8F2B-0CEE60A44C00", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_6:*:*:*:*:*:*", "matchCriteriaId": "CDDBD68A-771C-44FD-96A3-3AE189DE2591", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_7:*:*:*:*:*:*", "matchCriteriaId": "8FBD21F3-AC92-4154-948E-509FB8E097F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_8:*:*:*:*:*:*", "matchCriteriaId": "D91F9E0C-0A76-4DBC-A4E5-74E6682A5765", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update_9:*:*:*:*:*:*", "matchCriteriaId": "86F7EF21-5395-4F1F-A15D-A1C7EDBFAB2A", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:*", "matchCriteriaId": "09027C19-D442-446F-B7A8-21DB6787CF43", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_10:*:*:*:*:*:*", "matchCriteriaId": "0A0FEC28-0707-4F42-9740-78F3D2D551EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_11:*:*:*:*:*:*", "matchCriteriaId": "C3C5879A-A608-4230-9DC1-C27F0F48A13B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_12:*:*:*:*:*:*", "matchCriteriaId": "0C71089A-BDDE-41FC-9DF9-9AEF4C2374DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_13:*:*:*:*:*:*", "matchCriteriaId": "2DBB6B73-8D6B-41FF-BEE0-E0C7F5F1EB41", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_14:*:*:*:*:*:*", "matchCriteriaId": "12A3B254-8580-45DB-BDE4-5B5A29CBFFB3", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_15:*:*:*:*:*:*", "matchCriteriaId": "1DB1DE6A-66AE-499B-AD92-9E6ACE474C6D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_16:*:*:*:*:*:*", "matchCriteriaId": "AADBB4F9-E43E-428B-9979-F47A15696C85", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_2:*:*:*:*:*:*", "matchCriteriaId": "7158D2C0-E9AC-4CD6-B777-EA7B7A181997", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_3:*:*:*:*:*:*", "matchCriteriaId": "90EC6C13-4B37-48E5-8199-A702A944D5A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_4:*:*:*:*:*:*", "matchCriteriaId": "2528152C-E20A-4D97-931C-A5EC3CEAA06D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_5:*:*:*:*:*:*", "matchCriteriaId": "A99DAB4C-272B-4C91-BC70-7729E1152590", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_6:*:*:*:*:*:*", "matchCriteriaId": "30DFC10A-A4D9-4F89-B17C-AB9260087D29", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_7:*:*:*:*:*:*", "matchCriteriaId": "272A5C44-18EC-41A9-8233-E9D4D0734EA6", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_8:*:*:*:*:*:*", "matchCriteriaId": "3DA21490-E253-4BDC-9BA8-5D068BE35189", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_9:*:*:*:*:*:*", "matchCriteriaId": "81C2C04D-D4BA-4C87-9609-C53AA63BFF19", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_1:*:*:*:*:*:*:*", "matchCriteriaId": "6F6453C9-7EE0-4FFB-861D-C2D9416DCABA", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_2:*:*:*:*:*:*:*", "matchCriteriaId": "89BF16DE-EEAB-4DA5-BFF1-7A0A58DE141F", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_02:*:*:*:*:*:*:*", "matchCriteriaId": "AF4E34FD-D927-42BB-8A16-031D77CB4B9E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_03:*:*:*:*:*:*:*", "matchCriteriaId": "37A3D49A-BE20-47BF-A85F-122357BAB098", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_3:*:*:*:*:*:*:*", "matchCriteriaId": "6DDE253E-C8B6-4C1D-AECE-ABEA1A67306B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_04:*:*:*:*:*:*:*", "matchCriteriaId": "F45DB5D3-7F35-4531-9A82-24EB50034787", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_4:*:*:*:*:*:*:*", "matchCriteriaId": "A56D9A60-F272-4D4C-A9DD-C93DAF783585", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_5:*:*:*:*:*:*:*", "matchCriteriaId": "EF109CAA-E8D2-4BD7-BE7C-AF8B2A78672E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_05:*:*:*:*:*:*:*", "matchCriteriaId": "4695F707-12E8-4BA4-BBE1-C21CB7213A2A", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_6:*:*:*:*:*:*:*", "matchCriteriaId": "976F4ACB-3725-45B7-B2EF-DEE4B88254E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_06:*:*:*:*:*:*:*", "matchCriteriaId": "C918FB49-DA13-4326-BE86-6F6BEA4CE4E1", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_07:*:*:*:*:*:*:*", "matchCriteriaId": "5573CAD1-39D1-4ADB-BB95-EBB554B43B4E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_7:*:*:*:*:*:*:*", "matchCriteriaId": "52BDD6A8-1611-4C3C-865D-6EDB5B9F8D88", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_8:*:*:*:*:*:*:*", "matchCriteriaId": "6A1F28FF-652A-4C89-9AC6-5E212F890811", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_08:*:*:*:*:*:*:*", "matchCriteriaId": "DD02EBDF-6E51-4538-9EDD-B1DE914D09C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_09:*:*:*:*:*:*:*", "matchCriteriaId": "53C3C0E3-5F40-412B-A4AD-A7A291DE2A08", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_9:*:*:*:*:*:*:*", "matchCriteriaId": "96A8C351-E9CD-431B-8B9D-712CA54C7213", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_10:*:*:*:*:*:*:*", "matchCriteriaId": "36888382-79C8-4C97-A654-C668CD68556F", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_11:*:*:*:*:*:*:*", "matchCriteriaId": "F34C99E6-F9F0-4EF3-8601-B47EAE3D7273", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_12:*:*:*:*:*:*:*", "matchCriteriaId": "A74DD08D-CEDB-460E-BED5-78F6CAF18BF5", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_13:*:*:*:*:*:*:*", "matchCriteriaId": "E60560EC-6DBD-4A17-BFFA-FAD9193A0BC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_14:*:*:*:*:*:*:*", "matchCriteriaId": "E4F64FBC-DC97-4FE3-A235-18B87945AF7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_15:*:*:*:*:*:*:*", "matchCriteriaId": "85048406-9051-4E69-94A8-5C449F3B89E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_16:*:*:*:*:*:*:*", "matchCriteriaId": "B1C88DD7-0B46-4405-BD35-60D27E2DBA14", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_17:*:*:*:*:*:*:*", "matchCriteriaId": "08D23B7C-7B8C-41B8-8D94-BB0F27C7F0A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_18:*:*:*:*:*:*:*", "matchCriteriaId": "1C49B997-95D3-4DA4-A353-DB41AD461C5E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_19:*:*:*:*:*:*:*", "matchCriteriaId": "6F70EF76-ED5F-4835-8252-FE613604FA3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_20:*:*:*:*:*:*:*", "matchCriteriaId": "6BDBCAD8-CDF7-4550-8EA2-1409B02FFAD6", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_21:*:*:*:*:*:*:*", "matchCriteriaId": "7E691333-0434-4808-9ED4-E82C6EC2FD37", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_22:*:*:*:*:*:*:*", "matchCriteriaId": "BBE7A538-FF2E-4622-8479-781AB73CBA45", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in the JPEG JFIF Decoder in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to gain privileges via a crafted image file, aka Bug Id 6862969." }, { "lang": "es", "value": "Vulnerabilidad no especificada en el JPEG JFIF Decoder en Sun Java SE en JDK y JRE v5.0 anteriores a Update 22, JDK y JRE 6 anteriores a Update 17, SDK y JRE v1.3.x anteriores a v1.3.1_27, y SDK y JRE v1.4.x anteriores a v1.4.2_24 permite a los atacantes remotos obtener privilegios a trav\u00e9s de una archivo de imagen manipulado, tambi\u00e9n conocido como Id 6862969." } ], "id": "CVE-2009-3872", "lastModified": "2024-11-21T01:08:23.397", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2009-11-05T16:30:00.437", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://java.sun.com/javase/6/webnotes/6u17.html" }, { "source": "cve@mitre.org", "url": "http://lists.apple.com/archives/security-announce/2009/Dec/msg00000.html" }, { "source": "cve@mitre.org", "url": "http://lists.apple.com/archives/security-announce/2009/Dec/msg00001.html" }, { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00010.html" }, { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=126566824131534\u0026w=2" }, { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=126566824131534\u0026w=2" }, { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=131593453929393\u0026w=2" }, { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=131593453929393\u0026w=2" }, { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=134254866602253\u0026w=2" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/37231" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/37239" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/37386" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/37581" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/37841" }, { "source": "cve@mitre.org", "url": "http://security.gentoo.org/glsa/glsa-200911-02.xml" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1023132" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-270474-1" }, { "source": "cve@mitre.org", "url": "http://support.apple.com/kb/HT3969" }, { "source": "cve@mitre.org", "url": "http://support.apple.com/kb/HT3970" }, { "source": "cve@mitre.org", "url": "http://www.oracle.com/technetwork/topics/security/cpujan2010-084891.html" }, { "source": "cve@mitre.org", "url": "http://www.redhat.com/support/errata/RHSA-2009-1694.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/36881" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2009/3131" }, { "source": "cve@mitre.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11715" }, { "source": "cve@mitre.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6963" }, { "source": "cve@mitre.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8475" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://java.sun.com/javase/6/webnotes/6u17.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.apple.com/archives/security-announce/2009/Dec/msg00000.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.apple.com/archives/security-announce/2009/Dec/msg00001.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00010.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=126566824131534\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=126566824131534\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=131593453929393\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=131593453929393\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=134254866602253\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/37231" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/37239" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/37386" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/37581" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/37841" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-200911-02.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1023132" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-270474-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://support.apple.com/kb/HT3969" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://support.apple.com/kb/HT3970" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.oracle.com/technetwork/topics/security/cpujan2010-084891.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2009-1694.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/36881" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2009/3131" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11715" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6963" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8475" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2009-08-10 18:30
Modified
2024-11-21 01:05
Severity ?
Summary
The encoder in Sun Java SE 6 before Update 15, and OpenJDK, grants read access to private variables with unspecified names, which allows context-dependent attackers to obtain sensitive information via an untrusted (1) applet or (2) application.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sun:java_se:*:14:*:*:*:*:*:*", "matchCriteriaId": "EB9DE8D5-D4F6-45DE-9DB4-9E5BB7E518F9", "versionEndIncluding": "6", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:openjdk:*:*:*:*:*:*:*:*", "matchCriteriaId": "0E78309B-E13F-4B65-9F59-39A993B900AF", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The encoder in Sun Java SE 6 before Update 15, and OpenJDK, grants read access to private variables with unspecified names, which allows context-dependent attackers to obtain sensitive information via an untrusted (1) applet or (2) application." }, { "lang": "es", "value": "The codificador en Sun Java SE v6 anteriores a Update 15, y OpenJDK, permite acceso de lectura a variables privadas con nombres no especificados, permitiendo a atacantes dependientes del contexto obtener informaci\u00f3n sensible mediante (1) un applet o (2) una aplicaci\u00f3n no confiables." } ], "id": "CVE-2009-2690", "lastModified": "2024-11-21T01:05:30.983", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2009-08-10T18:30:00.453", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://java.sun.com/javase/6/webnotes/6u15.html" }, { "source": "cve@mitre.org", "url": "http://lists.apple.com/archives/security-announce/2009/Sep/msg00000.html" }, { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00001.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/36162" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/36176" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/36180" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/37386" }, { "source": "cve@mitre.org", "url": "http://security.gentoo.org/glsa/glsa-200911-02.xml" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-125139-16-1" }, { "source": "cve@mitre.org", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:209" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2009/2543" }, { "source": "cve@mitre.org", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=513223" }, { "source": "cve@mitre.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9443" }, { "source": "cve@mitre.org", "url": "https://rhn.redhat.com/errata/RHSA-2009-1200.html" }, { "source": "cve@mitre.org", "url": "https://rhn.redhat.com/errata/RHSA-2009-1201.html" }, { "source": "cve@mitre.org", "url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00310.html" }, { "source": "cve@mitre.org", "url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00325.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://java.sun.com/javase/6/webnotes/6u15.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.apple.com/archives/security-announce/2009/Sep/msg00000.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00001.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/36162" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/36176" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/36180" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/37386" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-200911-02.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-125139-16-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:209" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2009/2543" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=513223" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9443" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://rhn.redhat.com/errata/RHSA-2009-1200.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://rhn.redhat.com/errata/RHSA-2009-1201.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00310.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00325.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2009-08-10 18:30
Modified
2024-11-21 01:04
Severity ?
Summary
The Java Management Extensions (JMX) implementation in Sun Java SE 6 before Update 15, and OpenJDK, does not properly enforce OpenType checks, which allows context-dependent attackers to bypass intended access restrictions by leveraging finalizer resurrection to obtain a reference to a privileged object.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sun:java_se:*:14:*:*:*:*:*:*", "matchCriteriaId": "EB9DE8D5-D4F6-45DE-9DB4-9E5BB7E518F9", "versionEndIncluding": "6", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:openjdk:*:*:*:*:*:*:*:*", "matchCriteriaId": "0E78309B-E13F-4B65-9F59-39A993B900AF", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Java Management Extensions (JMX) implementation in Sun Java SE 6 before Update 15, and OpenJDK, does not properly enforce OpenType checks, which allows context-dependent attackers to bypass intended access restrictions by leveraging finalizer resurrection to obtain a reference to a privileged object." }, { "lang": "es", "value": "La implementaci\u00f3n de Java Management Extensions (JMX) en Sun Java SE v6 anteriores a Update 15, y en OpenJDK, no refuerza adecuadamente las validaciones OpenType, permitiendo a los atacantes dependientes del contexto saltar las restricciones de acceso previstas al aprovechar la re-ejecuci\u00f3n de un m\u00e9todo finalizador para obtener una referencia a un objeto privilegiado." } ], "id": "CVE-2009-2476", "lastModified": "2024-11-21T01:04:57.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2009-08-10T18:30:00.407", "references": [ { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://java.sun.com/javase/6/webnotes/6u15.html" }, { "source": "secalert@redhat.com", "url": "http://lists.apple.com/archives/security-announce/2009/Sep/msg00000.html" }, { "source": "secalert@redhat.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00001.html" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/36162" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/36176" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/36180" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/37386" }, { "source": "secalert@redhat.com", "url": "http://security.gentoo.org/glsa/glsa-200911-02.xml" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-125139-16-1" }, { "source": "secalert@redhat.com", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:209" }, { "source": "secalert@redhat.com", "url": "http://www.vupen.com/english/advisories/2009/2543" }, { "source": "secalert@redhat.com", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=513220" }, { "source": "secalert@redhat.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10381" }, { "source": "secalert@redhat.com", "url": "https://rhn.redhat.com/errata/RHSA-2009-1200.html" }, { "source": "secalert@redhat.com", "url": "https://rhn.redhat.com/errata/RHSA-2009-1201.html" }, { "source": "secalert@redhat.com", "url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00310.html" }, { "source": "secalert@redhat.com", "url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00325.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://java.sun.com/javase/6/webnotes/6u15.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.apple.com/archives/security-announce/2009/Sep/msg00000.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00001.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/36162" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/36176" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/36180" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/37386" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-200911-02.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-125139-16-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:209" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2009/2543" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=513220" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10381" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://rhn.redhat.com/errata/RHSA-2009-1200.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://rhn.redhat.com/errata/RHSA-2009-1201.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00310.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00325.html" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }