Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2010-0840

Summary
Assigner-oracle
Assigner Org ID-43595867-4340-4103-b7a2-9a5208d29a85
Published At-01 Apr, 2010 | 16:00
Updated At-22 Oct, 2025 | 00:05
Rejected At-
Credits

Oracle JRE Unspecified Vulnerability

Unspecified vulnerability in the Java Runtime Environment (JRE) in Java SE component allows remote attackers to affect confidentiality, integrity, and availability via Unknown vectors.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
â–¼Known Exploited Vulnerabilities (KEV)
cisa.gov
Vendor:
Oracle CorporationOracle
Product:Java Runtime Environment (JRE)
Added At:25 May, 2022
Due At:15 Jun, 2022

Oracle JRE Unspecified Vulnerability

Unspecified vulnerability in the Java Runtime Environment (JRE) in Java SE component allows remote attackers to affect confidentiality, integrity, and availability via Unknown vectors.

Used in Ransomware

:

Unknown

CWE

:
N/A

Required Action:

Apply updates per vendor instructions.

Additional Notes:

https://nvd.nist.gov/vuln/detail/CVE-2010-0840
â–¼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:oracle
Assigner Org ID:43595867-4340-4103-b7a2-9a5208d29a85
Published At:01 Apr, 2010 | 16:00
Updated At:22 Oct, 2025 | 00:05
Rejected At:
â–¼CVE Numbering Authority (CNA)

Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE and Java for Business 6 Update 18, 5.0 Update 23, and 1.4.2_25 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the March 2010 CPU. Oracle has not commented on claims from a reliable researcher that this is related to improper checks when executing privileged methods in the Java Runtime Environment (JRE), which allows attackers to execute arbitrary code via (1) an untrusted object that extends the trusted class but has not modified a certain method, or (2) "a similar trust issue with interfaces," aka "Trusted Methods Chaining Remote Code Execution Vulnerability."

Affected Products
Vendor
n/a
Product
n/a
Versions
Affected
  • n/a
Problem Types
TypeCWE IDDescription
textN/An/a
Type: text
CWE ID: N/A
Description: n/a
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://lists.apple.com/archives/security-announce/2010//May/msg00001.html
vendor-advisory
x_refsource_APPLE
http://marc.info/?l=bugtraq&m=134254866602253&w=2
vendor-advisory
x_refsource_HP
http://www.securityfocus.com/archive/1/510528/100/0/threaded
mailing-list
x_refsource_BUGTRAQ
http://secunia.com/advisories/39317
third-party-advisory
x_refsource_SECUNIA
http://www.redhat.com/support/errata/RHSA-2010-0383.html
vendor-advisory
x_refsource_REDHAT
http://secunia.com/advisories/40545
third-party-advisory
x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2010/1454
vdb-entry
x_refsource_VUPEN
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13971
vdb-entry
signature
x_refsource_OVAL
http://secunia.com/advisories/39819
third-party-advisory
x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2010/1107
vdb-entry
x_refsource_VUPEN
http://www.redhat.com/support/errata/RHSA-2010-0338.html
vendor-advisory
x_refsource_REDHAT
http://www.vupen.com/english/advisories/2010/1793
vdb-entry
x_refsource_VUPEN
http://lists.apple.com/archives/security-announce/2010//May/msg00002.html
vendor-advisory
x_refsource_APPLE
http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html
vendor-advisory
x_refsource_SUSE
http://secunia.com/advisories/43308
third-party-advisory
x_refsource_SECUNIA
http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html
x_refsource_CONFIRM
http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751
vendor-advisory
x_refsource_HP
http://marc.info/?l=bugtraq&m=127557596201693&w=2
vendor-advisory
x_refsource_HP
http://www.oracle.com/technetwork/topics/security/javacpumar2010-083341.html
x_refsource_CONFIRM
http://www.redhat.com/support/errata/RHSA-2010-0339.html
vendor-advisory
x_refsource_REDHAT
http://marc.info/?l=bugtraq&m=127557596201693&w=2
vendor-advisory
x_refsource_HP
http://secunia.com/advisories/39292
third-party-advisory
x_refsource_SECUNIA
http://support.apple.com/kb/HT4170
x_refsource_CONFIRM
http://www.vupen.com/english/advisories/2010/1523
vdb-entry
x_refsource_VUPEN
http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html
x_refsource_CONFIRM
http://www.securityfocus.com/bid/39065
vdb-entry
x_refsource_BID
http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00001.html
vendor-advisory
x_refsource_SUSE
http://secunia.com/advisories/39659
third-party-advisory
x_refsource_SECUNIA
http://www.redhat.com/support/errata/RHSA-2010-0471.html
vendor-advisory
x_refsource_REDHAT
http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html
vendor-advisory
x_refsource_SUSE
http://ubuntu.com/usn/usn-923-1
vendor-advisory
x_refsource_UBUNTU
http://www.vmware.com/security/advisories/VMSA-2011-0003.html
x_refsource_CONFIRM
http://www.redhat.com/support/errata/RHSA-2010-0337.html
vendor-advisory
x_refsource_REDHAT
http://www.redhat.com/support/errata/RHSA-2010-0489.html
vendor-advisory
x_refsource_REDHAT
http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751
vendor-advisory
x_refsource_HP
http://www.zerodayinitiative.com/advisories/ZDI-10-056
x_refsource_MISC
http://secunia.com/advisories/40211
third-party-advisory
x_refsource_SECUNIA
http://support.apple.com/kb/HT4171
x_refsource_CONFIRM
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9974
vdb-entry
signature
x_refsource_OVAL
http://www.mandriva.com/security/advisories?name=MDVSA-2010:084
vendor-advisory
x_refsource_MANDRIVA
http://www.securityfocus.com/archive/1/516397/100/0/threaded
mailing-list
x_refsource_BUGTRAQ
http://www.vupen.com/english/advisories/2010/1191
vdb-entry
x_refsource_VUPEN
Hyperlink: http://lists.apple.com/archives/security-announce/2010//May/msg00001.html
Resource:
vendor-advisory
x_refsource_APPLE
Hyperlink: http://marc.info/?l=bugtraq&m=134254866602253&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://www.securityfocus.com/archive/1/510528/100/0/threaded
Resource:
mailing-list
x_refsource_BUGTRAQ
Hyperlink: http://secunia.com/advisories/39317
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.redhat.com/support/errata/RHSA-2010-0383.html
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: http://secunia.com/advisories/40545
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.vupen.com/english/advisories/2010/1454
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13971
Resource:
vdb-entry
signature
x_refsource_OVAL
Hyperlink: http://secunia.com/advisories/39819
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.vupen.com/english/advisories/2010/1107
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://www.redhat.com/support/errata/RHSA-2010-0338.html
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: http://www.vupen.com/english/advisories/2010/1793
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://lists.apple.com/archives/security-announce/2010//May/msg00002.html
Resource:
vendor-advisory
x_refsource_APPLE
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html
Resource:
vendor-advisory
x_refsource_SUSE
Hyperlink: http://secunia.com/advisories/43308
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html
Resource:
x_refsource_CONFIRM
Hyperlink: http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://marc.info/?l=bugtraq&m=127557596201693&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://www.oracle.com/technetwork/topics/security/javacpumar2010-083341.html
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.redhat.com/support/errata/RHSA-2010-0339.html
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: http://marc.info/?l=bugtraq&m=127557596201693&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://secunia.com/advisories/39292
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://support.apple.com/kb/HT4170
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.vupen.com/english/advisories/2010/1523
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.securityfocus.com/bid/39065
Resource:
vdb-entry
x_refsource_BID
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00001.html
Resource:
vendor-advisory
x_refsource_SUSE
Hyperlink: http://secunia.com/advisories/39659
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.redhat.com/support/errata/RHSA-2010-0471.html
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html
Resource:
vendor-advisory
x_refsource_SUSE
Hyperlink: http://ubuntu.com/usn/usn-923-1
Resource:
vendor-advisory
x_refsource_UBUNTU
Hyperlink: http://www.vmware.com/security/advisories/VMSA-2011-0003.html
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.redhat.com/support/errata/RHSA-2010-0337.html
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: http://www.redhat.com/support/errata/RHSA-2010-0489.html
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://www.zerodayinitiative.com/advisories/ZDI-10-056
Resource:
x_refsource_MISC
Hyperlink: http://secunia.com/advisories/40211
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://support.apple.com/kb/HT4171
Resource:
x_refsource_CONFIRM
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9974
Resource:
vdb-entry
signature
x_refsource_OVAL
Hyperlink: http://www.mandriva.com/security/advisories?name=MDVSA-2010:084
Resource:
vendor-advisory
x_refsource_MANDRIVA
Hyperlink: http://www.securityfocus.com/archive/1/516397/100/0/threaded
Resource:
mailing-list
x_refsource_BUGTRAQ
Hyperlink: http://www.vupen.com/english/advisories/2010/1191
Resource:
vdb-entry
x_refsource_VUPEN
â–¼Authorized Data Publishers (ADP)
1. CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://lists.apple.com/archives/security-announce/2010//May/msg00001.html
vendor-advisory
x_refsource_APPLE
x_transferred
http://marc.info/?l=bugtraq&m=134254866602253&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://www.securityfocus.com/archive/1/510528/100/0/threaded
mailing-list
x_refsource_BUGTRAQ
x_transferred
http://secunia.com/advisories/39317
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.redhat.com/support/errata/RHSA-2010-0383.html
vendor-advisory
x_refsource_REDHAT
x_transferred
http://secunia.com/advisories/40545
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.vupen.com/english/advisories/2010/1454
vdb-entry
x_refsource_VUPEN
x_transferred
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13971
vdb-entry
signature
x_refsource_OVAL
x_transferred
http://secunia.com/advisories/39819
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.vupen.com/english/advisories/2010/1107
vdb-entry
x_refsource_VUPEN
x_transferred
http://www.redhat.com/support/errata/RHSA-2010-0338.html
vendor-advisory
x_refsource_REDHAT
x_transferred
http://www.vupen.com/english/advisories/2010/1793
vdb-entry
x_refsource_VUPEN
x_transferred
http://lists.apple.com/archives/security-announce/2010//May/msg00002.html
vendor-advisory
x_refsource_APPLE
x_transferred
http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html
vendor-advisory
x_refsource_SUSE
x_transferred
http://secunia.com/advisories/43308
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html
x_refsource_CONFIRM
x_transferred
http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751
vendor-advisory
x_refsource_HP
x_transferred
http://marc.info/?l=bugtraq&m=127557596201693&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://www.oracle.com/technetwork/topics/security/javacpumar2010-083341.html
x_refsource_CONFIRM
x_transferred
http://www.redhat.com/support/errata/RHSA-2010-0339.html
vendor-advisory
x_refsource_REDHAT
x_transferred
http://marc.info/?l=bugtraq&m=127557596201693&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://secunia.com/advisories/39292
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://support.apple.com/kb/HT4170
x_refsource_CONFIRM
x_transferred
http://www.vupen.com/english/advisories/2010/1523
vdb-entry
x_refsource_VUPEN
x_transferred
http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html
x_refsource_CONFIRM
x_transferred
http://www.securityfocus.com/bid/39065
vdb-entry
x_refsource_BID
x_transferred
http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00001.html
vendor-advisory
x_refsource_SUSE
x_transferred
http://secunia.com/advisories/39659
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.redhat.com/support/errata/RHSA-2010-0471.html
vendor-advisory
x_refsource_REDHAT
x_transferred
http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html
vendor-advisory
x_refsource_SUSE
x_transferred
http://ubuntu.com/usn/usn-923-1
vendor-advisory
x_refsource_UBUNTU
x_transferred
http://www.vmware.com/security/advisories/VMSA-2011-0003.html
x_refsource_CONFIRM
x_transferred
http://www.redhat.com/support/errata/RHSA-2010-0337.html
vendor-advisory
x_refsource_REDHAT
x_transferred
http://www.redhat.com/support/errata/RHSA-2010-0489.html
vendor-advisory
x_refsource_REDHAT
x_transferred
http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751
vendor-advisory
x_refsource_HP
x_transferred
http://www.zerodayinitiative.com/advisories/ZDI-10-056
x_refsource_MISC
x_transferred
http://secunia.com/advisories/40211
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://support.apple.com/kb/HT4171
x_refsource_CONFIRM
x_transferred
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9974
vdb-entry
signature
x_refsource_OVAL
x_transferred
http://www.mandriva.com/security/advisories?name=MDVSA-2010:084
vendor-advisory
x_refsource_MANDRIVA
x_transferred
http://www.securityfocus.com/archive/1/516397/100/0/threaded
mailing-list
x_refsource_BUGTRAQ
x_transferred
http://www.vupen.com/english/advisories/2010/1191
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://lists.apple.com/archives/security-announce/2010//May/msg00001.html
Resource:
vendor-advisory
x_refsource_APPLE
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=134254866602253&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://www.securityfocus.com/archive/1/510528/100/0/threaded
Resource:
mailing-list
x_refsource_BUGTRAQ
x_transferred
Hyperlink: http://secunia.com/advisories/39317
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.redhat.com/support/errata/RHSA-2010-0383.html
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: http://secunia.com/advisories/40545
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2010/1454
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13971
Resource:
vdb-entry
signature
x_refsource_OVAL
x_transferred
Hyperlink: http://secunia.com/advisories/39819
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2010/1107
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://www.redhat.com/support/errata/RHSA-2010-0338.html
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2010/1793
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://lists.apple.com/archives/security-announce/2010//May/msg00002.html
Resource:
vendor-advisory
x_refsource_APPLE
x_transferred
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html
Resource:
vendor-advisory
x_refsource_SUSE
x_transferred
Hyperlink: http://secunia.com/advisories/43308
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=127557596201693&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://www.oracle.com/technetwork/topics/security/javacpumar2010-083341.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.redhat.com/support/errata/RHSA-2010-0339.html
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=127557596201693&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://secunia.com/advisories/39292
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://support.apple.com/kb/HT4170
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2010/1523
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.securityfocus.com/bid/39065
Resource:
vdb-entry
x_refsource_BID
x_transferred
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00001.html
Resource:
vendor-advisory
x_refsource_SUSE
x_transferred
Hyperlink: http://secunia.com/advisories/39659
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.redhat.com/support/errata/RHSA-2010-0471.html
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html
Resource:
vendor-advisory
x_refsource_SUSE
x_transferred
Hyperlink: http://ubuntu.com/usn/usn-923-1
Resource:
vendor-advisory
x_refsource_UBUNTU
x_transferred
Hyperlink: http://www.vmware.com/security/advisories/VMSA-2011-0003.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.redhat.com/support/errata/RHSA-2010-0337.html
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: http://www.redhat.com/support/errata/RHSA-2010-0489.html
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://www.zerodayinitiative.com/advisories/ZDI-10-056
Resource:
x_refsource_MISC
x_transferred
Hyperlink: http://secunia.com/advisories/40211
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://support.apple.com/kb/HT4171
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9974
Resource:
vdb-entry
signature
x_refsource_OVAL
x_transferred
Hyperlink: http://www.mandriva.com/security/advisories?name=MDVSA-2010:084
Resource:
vendor-advisory
x_refsource_MANDRIVA
x_transferred
Hyperlink: http://www.securityfocus.com/archive/1/516397/100/0/threaded
Resource:
mailing-list
x_refsource_BUGTRAQ
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2010/1191
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
2. CISA ADP Vulnrichment
Affected Products
Problem Types
TypeCWE IDDescription
CWECWE-noinfoCWE-noinfo Not enough information
Type: CWE
CWE ID: CWE-noinfo
Description: CWE-noinfo Not enough information
Metrics
VersionBase scoreBase severityVector
3.19.8CRITICAL
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Version: 3.1
Base score: 9.8
Base severity: CRITICAL
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Metrics Other Info
kev
dateAdded:
2022-05-25
reference:
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2010-0840
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
CVE-2010-0840 added to CISA KEV2022-05-25 00:00:00
Event: CVE-2010-0840 added to CISA KEV
Date: 2022-05-25 00:00:00
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2010-0840
government-resource
Hyperlink: https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2010-0840
Resource:
government-resource
Information is not available yet
â–¼National Vulnerability Database (NVD)
nvd.nist.gov
Source:secalert_us@oracle.com
Published At:01 Apr, 2010 | 16:30
Updated At:22 Oct, 2025 | 01:15

Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE and Java for Business 6 Update 18, 5.0 Update 23, and 1.4.2_25 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the March 2010 CPU. Oracle has not commented on claims from a reliable researcher that this is related to improper checks when executing privileged methods in the Java Runtime Environment (JRE), which allows attackers to execute arbitrary code via (1) an untrusted object that extends the trusted class but has not modified a certain method, or (2) "a similar trust issue with interfaces," aka "Trusted Methods Chaining Remote Code Execution Vulnerability."

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
2022-05-252022-06-15Oracle JRE Unspecified VulnerabilityApply updates per vendor instructions.
Date Added: 2022-05-25
Due Date: 2022-06-15
Vulnerability Name: Oracle JRE Unspecified Vulnerability
Required Action: Apply updates per vendor instructions.
Metrics
TypeVersionBase scoreBase severityVector
Primary3.19.8CRITICAL
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Secondary3.19.8CRITICAL
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Primary2.07.5HIGH
AV:N/AC:L/Au:N/C:P/I:P/A:P
Type: Primary
Version: 3.1
Base score: 9.8
Base severity: CRITICAL
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Type: Secondary
Version: 3.1
Base score: 9.8
Base severity: CRITICAL
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Type: Primary
Version: 2.0
Base score: 7.5
Base severity: HIGH
Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P
CPE Matches

Oracle Corporation
oracle
>>jre>>1.4.2_25
cpe:2.3:a:oracle:jre:1.4.2_25:*:*:*:*:*:*:*
Oracle Corporation
oracle
>>jre>>1.5.0
cpe:2.3:a:oracle:jre:1.5.0:update23:*:*:*:*:*:*
Oracle Corporation
oracle
>>jre>>1.6.0
cpe:2.3:a:oracle:jre:1.6.0:update18:*:*:*:*:*:*
openSUSE
opensuse
>>opensuse>>11.0
cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:*
openSUSE
opensuse
>>opensuse>>11.1
cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*
openSUSE
opensuse
>>opensuse>>11.2
cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*
Canonical Ltd.
canonical
>>ubuntu_linux>>8.04
cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
Canonical Ltd.
canonical
>>ubuntu_linux>>8.10
cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*
Canonical Ltd.
canonical
>>ubuntu_linux>>9.04
cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
Canonical Ltd.
canonical
>>ubuntu_linux>>9.10
cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
NVD-CWE-noinfoPrimarynvd@nist.gov
CWE ID: NVD-CWE-noinfo
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Per: http://www.oracle.com/technology/deploy/security/critical-patch-updates/javacpumar2010.html 'Affected product releases and versions: • Java SE: • JDK and JRE 6 Update 18 and earlier for Windows, Solaris, and Linux • JDK 5.0 Update 23 and earlier for Solaris • SDK 1.4.2_25 and earlier for Solaris • Java for Business: • JDK and JRE 6 Update 18 and earlier for Windows, Solaris and Linux • JDK and JRE 5.0 Update 23 and earlier for Windows, Solaris and Linux • SDK and JRE 1.4.2_25 and earlier for Windows, Solaris and Linux'
Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751secalert_us@oracle.com
Broken Link
http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751secalert_us@oracle.com
Broken Link
http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751secalert_us@oracle.com
Broken Link
http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751secalert_us@oracle.com
Broken Link
http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751secalert_us@oracle.com
Broken Link
http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751secalert_us@oracle.com
Broken Link
http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751secalert_us@oracle.com
Broken Link
http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751secalert_us@oracle.com
Broken Link
http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751secalert_us@oracle.com
Broken Link
http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751secalert_us@oracle.com
Broken Link
http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751secalert_us@oracle.com
Broken Link
http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751secalert_us@oracle.com
Broken Link
http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751secalert_us@oracle.com
Broken Link
http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751secalert_us@oracle.com
Broken Link
http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751secalert_us@oracle.com
Broken Link
http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751secalert_us@oracle.com
Broken Link
http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751secalert_us@oracle.com
Broken Link
http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751secalert_us@oracle.com
Broken Link
http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751secalert_us@oracle.com
Broken Link
http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751secalert_us@oracle.com
Broken Link
http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751secalert_us@oracle.com
Broken Link
http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751secalert_us@oracle.com
Broken Link
http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751secalert_us@oracle.com
Broken Link
http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751secalert_us@oracle.com
Broken Link
http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751secalert_us@oracle.com
Broken Link
http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751secalert_us@oracle.com
Broken Link
http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751secalert_us@oracle.com
Broken Link
http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751secalert_us@oracle.com
Broken Link
http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751secalert_us@oracle.com
Broken Link
http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751secalert_us@oracle.com
Broken Link
http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751secalert_us@oracle.com
Broken Link
http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751secalert_us@oracle.com
Broken Link
http://lists.apple.com/archives/security-announce/2010//May/msg00001.htmlsecalert_us@oracle.com
Mailing List
Third Party Advisory
http://lists.apple.com/archives/security-announce/2010//May/msg00002.htmlsecalert_us@oracle.com
Mailing List
Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00001.htmlsecalert_us@oracle.com
Mailing List
Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.htmlsecalert_us@oracle.com
Mailing List
Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.htmlsecalert_us@oracle.com
Mailing List
Third Party Advisory
http://marc.info/?l=bugtraq&m=127557596201693&w=2secalert_us@oracle.com
Mailing List
http://marc.info/?l=bugtraq&m=127557596201693&w=2secalert_us@oracle.com
Mailing List
http://marc.info/?l=bugtraq&m=127557596201693&w=2secalert_us@oracle.com
Mailing List
http://marc.info/?l=bugtraq&m=127557596201693&w=2secalert_us@oracle.com
Mailing List
http://marc.info/?l=bugtraq&m=127557596201693&w=2secalert_us@oracle.com
Mailing List
http://marc.info/?l=bugtraq&m=127557596201693&w=2secalert_us@oracle.com
Mailing List
http://marc.info/?l=bugtraq&m=127557596201693&w=2secalert_us@oracle.com
Mailing List
http://marc.info/?l=bugtraq&m=127557596201693&w=2secalert_us@oracle.com
Mailing List
http://marc.info/?l=bugtraq&m=127557596201693&w=2secalert_us@oracle.com
Mailing List
http://marc.info/?l=bugtraq&m=127557596201693&w=2secalert_us@oracle.com
Mailing List
http://marc.info/?l=bugtraq&m=127557596201693&w=2secalert_us@oracle.com
Mailing List
http://marc.info/?l=bugtraq&m=127557596201693&w=2secalert_us@oracle.com
Mailing List
http://marc.info/?l=bugtraq&m=127557596201693&w=2secalert_us@oracle.com
Mailing List
http://marc.info/?l=bugtraq&m=127557596201693&w=2secalert_us@oracle.com
Mailing List
http://marc.info/?l=bugtraq&m=127557596201693&w=2secalert_us@oracle.com
Mailing List
http://marc.info/?l=bugtraq&m=127557596201693&w=2secalert_us@oracle.com
Mailing List
http://marc.info/?l=bugtraq&m=127557596201693&w=2secalert_us@oracle.com
Mailing List
http://marc.info/?l=bugtraq&m=127557596201693&w=2secalert_us@oracle.com
Mailing List
http://marc.info/?l=bugtraq&m=127557596201693&w=2secalert_us@oracle.com
Mailing List
http://marc.info/?l=bugtraq&m=127557596201693&w=2secalert_us@oracle.com
Mailing List
http://marc.info/?l=bugtraq&m=127557596201693&w=2secalert_us@oracle.com
Mailing List
http://marc.info/?l=bugtraq&m=127557596201693&w=2secalert_us@oracle.com
Mailing List
http://marc.info/?l=bugtraq&m=127557596201693&w=2secalert_us@oracle.com
Mailing List
http://marc.info/?l=bugtraq&m=127557596201693&w=2secalert_us@oracle.com
Mailing List
http://marc.info/?l=bugtraq&m=127557596201693&w=2secalert_us@oracle.com
Mailing List
http://marc.info/?l=bugtraq&m=127557596201693&w=2secalert_us@oracle.com
Mailing List
http://marc.info/?l=bugtraq&m=127557596201693&w=2secalert_us@oracle.com
Mailing List
http://marc.info/?l=bugtraq&m=127557596201693&w=2secalert_us@oracle.com
Mailing List
http://marc.info/?l=bugtraq&m=127557596201693&w=2secalert_us@oracle.com
Mailing List
http://marc.info/?l=bugtraq&m=127557596201693&w=2secalert_us@oracle.com
Mailing List
http://marc.info/?l=bugtraq&m=127557596201693&w=2secalert_us@oracle.com
Mailing List
http://marc.info/?l=bugtraq&m=127557596201693&w=2secalert_us@oracle.com
Mailing List
http://marc.info/?l=bugtraq&m=134254866602253&w=2secalert_us@oracle.com
Mailing List
http://secunia.com/advisories/39292secalert_us@oracle.com
Broken Link
Vendor Advisory
http://secunia.com/advisories/39317secalert_us@oracle.com
Broken Link
Vendor Advisory
http://secunia.com/advisories/39659secalert_us@oracle.com
Broken Link
Vendor Advisory
http://secunia.com/advisories/39819secalert_us@oracle.com
Broken Link
Vendor Advisory
http://secunia.com/advisories/40211secalert_us@oracle.com
Broken Link
Vendor Advisory
http://secunia.com/advisories/40545secalert_us@oracle.com
Broken Link
Vendor Advisory
http://secunia.com/advisories/43308secalert_us@oracle.com
Broken Link
Vendor Advisory
http://support.apple.com/kb/HT4170secalert_us@oracle.com
Release Notes
Third Party Advisory
http://support.apple.com/kb/HT4171secalert_us@oracle.com
Release Notes
Third Party Advisory
http://ubuntu.com/usn/usn-923-1secalert_us@oracle.com
Third Party Advisory
http://www.mandriva.com/security/advisories?name=MDVSA-2010:084secalert_us@oracle.com
Broken Link
http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.htmlsecalert_us@oracle.com
Patch
Third Party Advisory
http://www.oracle.com/technetwork/topics/security/javacpumar2010-083341.htmlsecalert_us@oracle.com
Patch
Third Party Advisory
http://www.redhat.com/support/errata/RHSA-2010-0337.htmlsecalert_us@oracle.com
Broken Link
http://www.redhat.com/support/errata/RHSA-2010-0338.htmlsecalert_us@oracle.com
Broken Link
http://www.redhat.com/support/errata/RHSA-2010-0339.htmlsecalert_us@oracle.com
Broken Link
http://www.redhat.com/support/errata/RHSA-2010-0383.htmlsecalert_us@oracle.com
Broken Link
http://www.redhat.com/support/errata/RHSA-2010-0471.htmlsecalert_us@oracle.com
Broken Link
http://www.redhat.com/support/errata/RHSA-2010-0489.htmlsecalert_us@oracle.com
Broken Link
http://www.securityfocus.com/archive/1/510528/100/0/threadedsecalert_us@oracle.com
Broken Link
Third Party Advisory
VDB Entry
http://www.securityfocus.com/archive/1/516397/100/0/threadedsecalert_us@oracle.com
Broken Link
Third Party Advisory
VDB Entry
http://www.securityfocus.com/bid/39065secalert_us@oracle.com
Broken Link
Third Party Advisory
VDB Entry
http://www.vmware.com/security/advisories/VMSA-2011-0003.htmlsecalert_us@oracle.com
Third Party Advisory
http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.htmlsecalert_us@oracle.com
Release Notes
http://www.vupen.com/english/advisories/2010/1107secalert_us@oracle.com
Broken Link
http://www.vupen.com/english/advisories/2010/1191secalert_us@oracle.com
Broken Link
Vendor Advisory
http://www.vupen.com/english/advisories/2010/1454secalert_us@oracle.com
Broken Link
Vendor Advisory
http://www.vupen.com/english/advisories/2010/1523secalert_us@oracle.com
Broken Link
Vendor Advisory
http://www.vupen.com/english/advisories/2010/1793secalert_us@oracle.com
Broken Link
Vendor Advisory
http://www.zerodayinitiative.com/advisories/ZDI-10-056secalert_us@oracle.com
Third Party Advisory
VDB Entry
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13971secalert_us@oracle.com
Broken Link
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9974secalert_us@oracle.com
Broken Link
http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://lists.apple.com/archives/security-announce/2010//May/msg00001.htmlaf854a3a-2127-422b-91ae-364da2661108
Mailing List
Third Party Advisory
http://lists.apple.com/archives/security-announce/2010//May/msg00002.htmlaf854a3a-2127-422b-91ae-364da2661108
Mailing List
Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00001.htmlaf854a3a-2127-422b-91ae-364da2661108
Mailing List
Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.htmlaf854a3a-2127-422b-91ae-364da2661108
Mailing List
Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.htmlaf854a3a-2127-422b-91ae-364da2661108
Mailing List
Third Party Advisory
http://marc.info/?l=bugtraq&m=127557596201693&w=2af854a3a-2127-422b-91ae-364da2661108
Mailing List
http://marc.info/?l=bugtraq&m=127557596201693&w=2af854a3a-2127-422b-91ae-364da2661108
Mailing List
http://marc.info/?l=bugtraq&m=127557596201693&w=2af854a3a-2127-422b-91ae-364da2661108
Mailing List
http://marc.info/?l=bugtraq&m=127557596201693&w=2af854a3a-2127-422b-91ae-364da2661108
Mailing List
http://marc.info/?l=bugtraq&m=127557596201693&w=2af854a3a-2127-422b-91ae-364da2661108
Mailing List
http://marc.info/?l=bugtraq&m=127557596201693&w=2af854a3a-2127-422b-91ae-364da2661108
Mailing List
http://marc.info/?l=bugtraq&m=127557596201693&w=2af854a3a-2127-422b-91ae-364da2661108
Mailing List
http://marc.info/?l=bugtraq&m=127557596201693&w=2af854a3a-2127-422b-91ae-364da2661108
Mailing List
http://marc.info/?l=bugtraq&m=127557596201693&w=2af854a3a-2127-422b-91ae-364da2661108
Mailing List
http://marc.info/?l=bugtraq&m=127557596201693&w=2af854a3a-2127-422b-91ae-364da2661108
Mailing List
http://marc.info/?l=bugtraq&m=127557596201693&w=2af854a3a-2127-422b-91ae-364da2661108
Mailing List
http://marc.info/?l=bugtraq&m=127557596201693&w=2af854a3a-2127-422b-91ae-364da2661108
Mailing List
http://marc.info/?l=bugtraq&m=127557596201693&w=2af854a3a-2127-422b-91ae-364da2661108
Mailing List
http://marc.info/?l=bugtraq&m=127557596201693&w=2af854a3a-2127-422b-91ae-364da2661108
Mailing List
http://marc.info/?l=bugtraq&m=127557596201693&w=2af854a3a-2127-422b-91ae-364da2661108
Mailing List
http://marc.info/?l=bugtraq&m=127557596201693&w=2af854a3a-2127-422b-91ae-364da2661108
Mailing List
http://marc.info/?l=bugtraq&m=127557596201693&w=2af854a3a-2127-422b-91ae-364da2661108
Mailing List
http://marc.info/?l=bugtraq&m=127557596201693&w=2af854a3a-2127-422b-91ae-364da2661108
Mailing List
http://marc.info/?l=bugtraq&m=127557596201693&w=2af854a3a-2127-422b-91ae-364da2661108
Mailing List
http://marc.info/?l=bugtraq&m=127557596201693&w=2af854a3a-2127-422b-91ae-364da2661108
Mailing List
http://marc.info/?l=bugtraq&m=127557596201693&w=2af854a3a-2127-422b-91ae-364da2661108
Mailing List
http://marc.info/?l=bugtraq&m=127557596201693&w=2af854a3a-2127-422b-91ae-364da2661108
Mailing List
http://marc.info/?l=bugtraq&m=127557596201693&w=2af854a3a-2127-422b-91ae-364da2661108
Mailing List
http://marc.info/?l=bugtraq&m=127557596201693&w=2af854a3a-2127-422b-91ae-364da2661108
Mailing List
http://marc.info/?l=bugtraq&m=127557596201693&w=2af854a3a-2127-422b-91ae-364da2661108
Mailing List
http://marc.info/?l=bugtraq&m=127557596201693&w=2af854a3a-2127-422b-91ae-364da2661108
Mailing List
http://marc.info/?l=bugtraq&m=127557596201693&w=2af854a3a-2127-422b-91ae-364da2661108
Mailing List
http://marc.info/?l=bugtraq&m=127557596201693&w=2af854a3a-2127-422b-91ae-364da2661108
Mailing List
http://marc.info/?l=bugtraq&m=127557596201693&w=2af854a3a-2127-422b-91ae-364da2661108
Mailing List
http://marc.info/?l=bugtraq&m=127557596201693&w=2af854a3a-2127-422b-91ae-364da2661108
Mailing List
http://marc.info/?l=bugtraq&m=127557596201693&w=2af854a3a-2127-422b-91ae-364da2661108
Mailing List
http://marc.info/?l=bugtraq&m=127557596201693&w=2af854a3a-2127-422b-91ae-364da2661108
Mailing List
http://marc.info/?l=bugtraq&m=134254866602253&w=2af854a3a-2127-422b-91ae-364da2661108
Mailing List
http://secunia.com/advisories/39292af854a3a-2127-422b-91ae-364da2661108
Broken Link
Vendor Advisory
http://secunia.com/advisories/39317af854a3a-2127-422b-91ae-364da2661108
Broken Link
Vendor Advisory
http://secunia.com/advisories/39659af854a3a-2127-422b-91ae-364da2661108
Broken Link
Vendor Advisory
http://secunia.com/advisories/39819af854a3a-2127-422b-91ae-364da2661108
Broken Link
Vendor Advisory
http://secunia.com/advisories/40211af854a3a-2127-422b-91ae-364da2661108
Broken Link
Vendor Advisory
http://secunia.com/advisories/40545af854a3a-2127-422b-91ae-364da2661108
Broken Link
Vendor Advisory
http://secunia.com/advisories/43308af854a3a-2127-422b-91ae-364da2661108
Broken Link
Vendor Advisory
http://support.apple.com/kb/HT4170af854a3a-2127-422b-91ae-364da2661108
Release Notes
Third Party Advisory
http://support.apple.com/kb/HT4171af854a3a-2127-422b-91ae-364da2661108
Release Notes
Third Party Advisory
http://ubuntu.com/usn/usn-923-1af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.mandriva.com/security/advisories?name=MDVSA-2010:084af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.htmlaf854a3a-2127-422b-91ae-364da2661108
Patch
Third Party Advisory
http://www.oracle.com/technetwork/topics/security/javacpumar2010-083341.htmlaf854a3a-2127-422b-91ae-364da2661108
Patch
Third Party Advisory
http://www.redhat.com/support/errata/RHSA-2010-0337.htmlaf854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.redhat.com/support/errata/RHSA-2010-0338.htmlaf854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.redhat.com/support/errata/RHSA-2010-0339.htmlaf854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.redhat.com/support/errata/RHSA-2010-0383.htmlaf854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.redhat.com/support/errata/RHSA-2010-0471.htmlaf854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.redhat.com/support/errata/RHSA-2010-0489.htmlaf854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.securityfocus.com/archive/1/510528/100/0/threadedaf854a3a-2127-422b-91ae-364da2661108
Broken Link
Third Party Advisory
VDB Entry
http://www.securityfocus.com/archive/1/516397/100/0/threadedaf854a3a-2127-422b-91ae-364da2661108
Broken Link
Third Party Advisory
VDB Entry
http://www.securityfocus.com/bid/39065af854a3a-2127-422b-91ae-364da2661108
Broken Link
Third Party Advisory
VDB Entry
http://www.vmware.com/security/advisories/VMSA-2011-0003.htmlaf854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.htmlaf854a3a-2127-422b-91ae-364da2661108
Release Notes
http://www.vupen.com/english/advisories/2010/1107af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.vupen.com/english/advisories/2010/1191af854a3a-2127-422b-91ae-364da2661108
Broken Link
Vendor Advisory
http://www.vupen.com/english/advisories/2010/1454af854a3a-2127-422b-91ae-364da2661108
Broken Link
Vendor Advisory
http://www.vupen.com/english/advisories/2010/1523af854a3a-2127-422b-91ae-364da2661108
Broken Link
Vendor Advisory
http://www.vupen.com/english/advisories/2010/1793af854a3a-2127-422b-91ae-364da2661108
Broken Link
Vendor Advisory
http://www.zerodayinitiative.com/advisories/ZDI-10-056af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
VDB Entry
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13971af854a3a-2127-422b-91ae-364da2661108
Broken Link
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9974af854a3a-2127-422b-91ae-364da2661108
Broken Link
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2010-0840134c704f-9b21-4f2e-91b3-4a467353bcc0
N/A
Hyperlink: http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751
Source: secalert_us@oracle.com
Resource:
Broken Link
Hyperlink: http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751
Source: secalert_us@oracle.com
Resource:
Broken Link
Hyperlink: http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751
Source: secalert_us@oracle.com
Resource:
Broken Link
Hyperlink: http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751
Source: secalert_us@oracle.com
Resource:
Broken Link
Hyperlink: http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751
Source: secalert_us@oracle.com
Resource:
Broken Link
Hyperlink: http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751
Source: secalert_us@oracle.com
Resource:
Broken Link
Hyperlink: http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751
Source: secalert_us@oracle.com
Resource:
Broken Link
Hyperlink: http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751
Source: secalert_us@oracle.com
Resource:
Broken Link
Hyperlink: http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751
Source: secalert_us@oracle.com
Resource:
Broken Link
Hyperlink: http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751
Source: secalert_us@oracle.com
Resource:
Broken Link
Hyperlink: http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751
Source: secalert_us@oracle.com
Resource:
Broken Link
Hyperlink: http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751
Source: secalert_us@oracle.com
Resource:
Broken Link
Hyperlink: http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751
Source: secalert_us@oracle.com
Resource:
Broken Link
Hyperlink: http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751
Source: secalert_us@oracle.com
Resource:
Broken Link
Hyperlink: http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751
Source: secalert_us@oracle.com
Resource:
Broken Link
Hyperlink: http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751
Source: secalert_us@oracle.com
Resource:
Broken Link
Hyperlink: http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751
Source: secalert_us@oracle.com
Resource:
Broken Link
Hyperlink: http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751
Source: secalert_us@oracle.com
Resource:
Broken Link
Hyperlink: http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751
Source: secalert_us@oracle.com
Resource:
Broken Link
Hyperlink: http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751
Source: secalert_us@oracle.com
Resource:
Broken Link
Hyperlink: http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751
Source: secalert_us@oracle.com
Resource:
Broken Link
Hyperlink: http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751
Source: secalert_us@oracle.com
Resource:
Broken Link
Hyperlink: http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751
Source: secalert_us@oracle.com
Resource:
Broken Link
Hyperlink: http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751
Source: secalert_us@oracle.com
Resource:
Broken Link
Hyperlink: http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751
Source: secalert_us@oracle.com
Resource:
Broken Link
Hyperlink: http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751
Source: secalert_us@oracle.com
Resource:
Broken Link
Hyperlink: http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751
Source: secalert_us@oracle.com
Resource:
Broken Link
Hyperlink: http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751
Source: secalert_us@oracle.com
Resource:
Broken Link
Hyperlink: http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751
Source: secalert_us@oracle.com
Resource:
Broken Link
Hyperlink: http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751
Source: secalert_us@oracle.com
Resource:
Broken Link
Hyperlink: http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751
Source: secalert_us@oracle.com
Resource:
Broken Link
Hyperlink: http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751
Source: secalert_us@oracle.com
Resource:
Broken Link
Hyperlink: http://lists.apple.com/archives/security-announce/2010//May/msg00001.html
Source: secalert_us@oracle.com
Resource:
Mailing List
Third Party Advisory
Hyperlink: http://lists.apple.com/archives/security-announce/2010//May/msg00002.html
Source: secalert_us@oracle.com
Resource:
Mailing List
Third Party Advisory
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00001.html
Source: secalert_us@oracle.com
Resource:
Mailing List
Third Party Advisory
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html
Source: secalert_us@oracle.com
Resource:
Mailing List
Third Party Advisory
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html
Source: secalert_us@oracle.com
Resource:
Mailing List
Third Party Advisory
Hyperlink: http://marc.info/?l=bugtraq&m=127557596201693&w=2
Source: secalert_us@oracle.com
Resource:
Mailing List
Hyperlink: http://marc.info/?l=bugtraq&m=127557596201693&w=2
Source: secalert_us@oracle.com
Resource:
Mailing List
Hyperlink: http://marc.info/?l=bugtraq&m=127557596201693&w=2
Source: secalert_us@oracle.com
Resource:
Mailing List
Hyperlink: http://marc.info/?l=bugtraq&m=127557596201693&w=2
Source: secalert_us@oracle.com
Resource:
Mailing List
Hyperlink: http://marc.info/?l=bugtraq&m=127557596201693&w=2
Source: secalert_us@oracle.com
Resource:
Mailing List
Hyperlink: http://marc.info/?l=bugtraq&m=127557596201693&w=2
Source: secalert_us@oracle.com
Resource:
Mailing List
Hyperlink: http://marc.info/?l=bugtraq&m=127557596201693&w=2
Source: secalert_us@oracle.com
Resource:
Mailing List
Hyperlink: http://marc.info/?l=bugtraq&m=127557596201693&w=2
Source: secalert_us@oracle.com
Resource:
Mailing List
Hyperlink: http://marc.info/?l=bugtraq&m=127557596201693&w=2
Source: secalert_us@oracle.com
Resource:
Mailing List
Hyperlink: http://marc.info/?l=bugtraq&m=127557596201693&w=2
Source: secalert_us@oracle.com
Resource:
Mailing List
Hyperlink: http://marc.info/?l=bugtraq&m=127557596201693&w=2
Source: secalert_us@oracle.com
Resource:
Mailing List
Hyperlink: http://marc.info/?l=bugtraq&m=127557596201693&w=2
Source: secalert_us@oracle.com
Resource:
Mailing List
Hyperlink: http://marc.info/?l=bugtraq&m=127557596201693&w=2
Source: secalert_us@oracle.com
Resource:
Mailing List
Hyperlink: http://marc.info/?l=bugtraq&m=127557596201693&w=2
Source: secalert_us@oracle.com
Resource:
Mailing List
Hyperlink: http://marc.info/?l=bugtraq&m=127557596201693&w=2
Source: secalert_us@oracle.com
Resource:
Mailing List
Hyperlink: http://marc.info/?l=bugtraq&m=127557596201693&w=2
Source: secalert_us@oracle.com
Resource:
Mailing List
Hyperlink: http://marc.info/?l=bugtraq&m=127557596201693&w=2
Source: secalert_us@oracle.com
Resource:
Mailing List
Hyperlink: http://marc.info/?l=bugtraq&m=127557596201693&w=2
Source: secalert_us@oracle.com
Resource:
Mailing List
Hyperlink: http://marc.info/?l=bugtraq&m=127557596201693&w=2
Source: secalert_us@oracle.com
Resource:
Mailing List
Hyperlink: http://marc.info/?l=bugtraq&m=127557596201693&w=2
Source: secalert_us@oracle.com
Resource:
Mailing List
Hyperlink: http://marc.info/?l=bugtraq&m=127557596201693&w=2
Source: secalert_us@oracle.com
Resource:
Mailing List
Hyperlink: http://marc.info/?l=bugtraq&m=127557596201693&w=2
Source: secalert_us@oracle.com
Resource:
Mailing List
Hyperlink: http://marc.info/?l=bugtraq&m=127557596201693&w=2
Source: secalert_us@oracle.com
Resource:
Mailing List
Hyperlink: http://marc.info/?l=bugtraq&m=127557596201693&w=2
Source: secalert_us@oracle.com
Resource:
Mailing List
Hyperlink: http://marc.info/?l=bugtraq&m=127557596201693&w=2
Source: secalert_us@oracle.com
Resource:
Mailing List
Hyperlink: http://marc.info/?l=bugtraq&m=127557596201693&w=2
Source: secalert_us@oracle.com
Resource:
Mailing List
Hyperlink: http://marc.info/?l=bugtraq&m=127557596201693&w=2
Source: secalert_us@oracle.com
Resource:
Mailing List
Hyperlink: http://marc.info/?l=bugtraq&m=127557596201693&w=2
Source: secalert_us@oracle.com
Resource:
Mailing List
Hyperlink: http://marc.info/?l=bugtraq&m=127557596201693&w=2
Source: secalert_us@oracle.com
Resource:
Mailing List
Hyperlink: http://marc.info/?l=bugtraq&m=127557596201693&w=2
Source: secalert_us@oracle.com
Resource:
Mailing List
Hyperlink: http://marc.info/?l=bugtraq&m=127557596201693&w=2
Source: secalert_us@oracle.com
Resource:
Mailing List
Hyperlink: http://marc.info/?l=bugtraq&m=127557596201693&w=2
Source: secalert_us@oracle.com
Resource:
Mailing List
Hyperlink: http://marc.info/?l=bugtraq&m=134254866602253&w=2
Source: secalert_us@oracle.com
Resource:
Mailing List
Hyperlink: http://secunia.com/advisories/39292
Source: secalert_us@oracle.com
Resource:
Broken Link
Vendor Advisory
Hyperlink: http://secunia.com/advisories/39317
Source: secalert_us@oracle.com
Resource:
Broken Link
Vendor Advisory
Hyperlink: http://secunia.com/advisories/39659
Source: secalert_us@oracle.com
Resource:
Broken Link
Vendor Advisory
Hyperlink: http://secunia.com/advisories/39819
Source: secalert_us@oracle.com
Resource:
Broken Link
Vendor Advisory
Hyperlink: http://secunia.com/advisories/40211
Source: secalert_us@oracle.com
Resource:
Broken Link
Vendor Advisory
Hyperlink: http://secunia.com/advisories/40545
Source: secalert_us@oracle.com
Resource:
Broken Link
Vendor Advisory
Hyperlink: http://secunia.com/advisories/43308
Source: secalert_us@oracle.com
Resource:
Broken Link
Vendor Advisory
Hyperlink: http://support.apple.com/kb/HT4170
Source: secalert_us@oracle.com
Resource:
Release Notes
Third Party Advisory
Hyperlink: http://support.apple.com/kb/HT4171
Source: secalert_us@oracle.com
Resource:
Release Notes
Third Party Advisory
Hyperlink: http://ubuntu.com/usn/usn-923-1
Source: secalert_us@oracle.com
Resource:
Third Party Advisory
Hyperlink: http://www.mandriva.com/security/advisories?name=MDVSA-2010:084
Source: secalert_us@oracle.com
Resource:
Broken Link
Hyperlink: http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html
Source: secalert_us@oracle.com
Resource:
Patch
Third Party Advisory
Hyperlink: http://www.oracle.com/technetwork/topics/security/javacpumar2010-083341.html
Source: secalert_us@oracle.com
Resource:
Patch
Third Party Advisory
Hyperlink: http://www.redhat.com/support/errata/RHSA-2010-0337.html
Source: secalert_us@oracle.com
Resource:
Broken Link
Hyperlink: http://www.redhat.com/support/errata/RHSA-2010-0338.html
Source: secalert_us@oracle.com
Resource:
Broken Link
Hyperlink: http://www.redhat.com/support/errata/RHSA-2010-0339.html
Source: secalert_us@oracle.com
Resource:
Broken Link
Hyperlink: http://www.redhat.com/support/errata/RHSA-2010-0383.html
Source: secalert_us@oracle.com
Resource:
Broken Link
Hyperlink: http://www.redhat.com/support/errata/RHSA-2010-0471.html
Source: secalert_us@oracle.com
Resource:
Broken Link
Hyperlink: http://www.redhat.com/support/errata/RHSA-2010-0489.html
Source: secalert_us@oracle.com
Resource:
Broken Link
Hyperlink: http://www.securityfocus.com/archive/1/510528/100/0/threaded
Source: secalert_us@oracle.com
Resource:
Broken Link
Third Party Advisory
VDB Entry
Hyperlink: http://www.securityfocus.com/archive/1/516397/100/0/threaded
Source: secalert_us@oracle.com
Resource:
Broken Link
Third Party Advisory
VDB Entry
Hyperlink: http://www.securityfocus.com/bid/39065
Source: secalert_us@oracle.com
Resource:
Broken Link
Third Party Advisory
VDB Entry
Hyperlink: http://www.vmware.com/security/advisories/VMSA-2011-0003.html
Source: secalert_us@oracle.com
Resource:
Third Party Advisory
Hyperlink: http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html
Source: secalert_us@oracle.com
Resource:
Release Notes
Hyperlink: http://www.vupen.com/english/advisories/2010/1107
Source: secalert_us@oracle.com
Resource:
Broken Link
Hyperlink: http://www.vupen.com/english/advisories/2010/1191
Source: secalert_us@oracle.com
Resource:
Broken Link
Vendor Advisory
Hyperlink: http://www.vupen.com/english/advisories/2010/1454
Source: secalert_us@oracle.com
Resource:
Broken Link
Vendor Advisory
Hyperlink: http://www.vupen.com/english/advisories/2010/1523
Source: secalert_us@oracle.com
Resource:
Broken Link
Vendor Advisory
Hyperlink: http://www.vupen.com/english/advisories/2010/1793
Source: secalert_us@oracle.com
Resource:
Broken Link
Vendor Advisory
Hyperlink: http://www.zerodayinitiative.com/advisories/ZDI-10-056
Source: secalert_us@oracle.com
Resource:
Third Party Advisory
VDB Entry
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13971
Source: secalert_us@oracle.com
Resource:
Broken Link
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9974
Source: secalert_us@oracle.com
Resource:
Broken Link
Hyperlink: http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: http://lists.apple.com/archives/security-announce/2010//May/msg00001.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Third Party Advisory
Hyperlink: http://lists.apple.com/archives/security-announce/2010//May/msg00002.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Third Party Advisory
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00001.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Third Party Advisory
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Third Party Advisory
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Third Party Advisory
Hyperlink: http://marc.info/?l=bugtraq&m=127557596201693&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Hyperlink: http://marc.info/?l=bugtraq&m=127557596201693&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Hyperlink: http://marc.info/?l=bugtraq&m=127557596201693&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Hyperlink: http://marc.info/?l=bugtraq&m=127557596201693&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Hyperlink: http://marc.info/?l=bugtraq&m=127557596201693&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Hyperlink: http://marc.info/?l=bugtraq&m=127557596201693&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Hyperlink: http://marc.info/?l=bugtraq&m=127557596201693&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Hyperlink: http://marc.info/?l=bugtraq&m=127557596201693&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Hyperlink: http://marc.info/?l=bugtraq&m=127557596201693&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Hyperlink: http://marc.info/?l=bugtraq&m=127557596201693&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Hyperlink: http://marc.info/?l=bugtraq&m=127557596201693&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Hyperlink: http://marc.info/?l=bugtraq&m=127557596201693&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Hyperlink: http://marc.info/?l=bugtraq&m=127557596201693&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Hyperlink: http://marc.info/?l=bugtraq&m=127557596201693&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Hyperlink: http://marc.info/?l=bugtraq&m=127557596201693&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Hyperlink: http://marc.info/?l=bugtraq&m=127557596201693&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Hyperlink: http://marc.info/?l=bugtraq&m=127557596201693&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Hyperlink: http://marc.info/?l=bugtraq&m=127557596201693&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Hyperlink: http://marc.info/?l=bugtraq&m=127557596201693&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Hyperlink: http://marc.info/?l=bugtraq&m=127557596201693&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Hyperlink: http://marc.info/?l=bugtraq&m=127557596201693&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Hyperlink: http://marc.info/?l=bugtraq&m=127557596201693&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Hyperlink: http://marc.info/?l=bugtraq&m=127557596201693&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Hyperlink: http://marc.info/?l=bugtraq&m=127557596201693&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Hyperlink: http://marc.info/?l=bugtraq&m=127557596201693&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Hyperlink: http://marc.info/?l=bugtraq&m=127557596201693&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Hyperlink: http://marc.info/?l=bugtraq&m=127557596201693&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Hyperlink: http://marc.info/?l=bugtraq&m=127557596201693&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Hyperlink: http://marc.info/?l=bugtraq&m=127557596201693&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Hyperlink: http://marc.info/?l=bugtraq&m=127557596201693&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Hyperlink: http://marc.info/?l=bugtraq&m=127557596201693&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Hyperlink: http://marc.info/?l=bugtraq&m=127557596201693&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Hyperlink: http://marc.info/?l=bugtraq&m=134254866602253&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Hyperlink: http://secunia.com/advisories/39292
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Vendor Advisory
Hyperlink: http://secunia.com/advisories/39317
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Vendor Advisory
Hyperlink: http://secunia.com/advisories/39659
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Vendor Advisory
Hyperlink: http://secunia.com/advisories/39819
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Vendor Advisory
Hyperlink: http://secunia.com/advisories/40211
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Vendor Advisory
Hyperlink: http://secunia.com/advisories/40545
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Vendor Advisory
Hyperlink: http://secunia.com/advisories/43308
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Vendor Advisory
Hyperlink: http://support.apple.com/kb/HT4170
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Release Notes
Third Party Advisory
Hyperlink: http://support.apple.com/kb/HT4171
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Release Notes
Third Party Advisory
Hyperlink: http://ubuntu.com/usn/usn-923-1
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: http://www.mandriva.com/security/advisories?name=MDVSA-2010:084
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Third Party Advisory
Hyperlink: http://www.oracle.com/technetwork/topics/security/javacpumar2010-083341.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Third Party Advisory
Hyperlink: http://www.redhat.com/support/errata/RHSA-2010-0337.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: http://www.redhat.com/support/errata/RHSA-2010-0338.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: http://www.redhat.com/support/errata/RHSA-2010-0339.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: http://www.redhat.com/support/errata/RHSA-2010-0383.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: http://www.redhat.com/support/errata/RHSA-2010-0471.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: http://www.redhat.com/support/errata/RHSA-2010-0489.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: http://www.securityfocus.com/archive/1/510528/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Third Party Advisory
VDB Entry
Hyperlink: http://www.securityfocus.com/archive/1/516397/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Third Party Advisory
VDB Entry
Hyperlink: http://www.securityfocus.com/bid/39065
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Third Party Advisory
VDB Entry
Hyperlink: http://www.vmware.com/security/advisories/VMSA-2011-0003.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Release Notes
Hyperlink: http://www.vupen.com/english/advisories/2010/1107
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: http://www.vupen.com/english/advisories/2010/1191
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Vendor Advisory
Hyperlink: http://www.vupen.com/english/advisories/2010/1454
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Vendor Advisory
Hyperlink: http://www.vupen.com/english/advisories/2010/1523
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Vendor Advisory
Hyperlink: http://www.vupen.com/english/advisories/2010/1793
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Vendor Advisory
Hyperlink: http://www.zerodayinitiative.com/advisories/ZDI-10-056
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
VDB Entry
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13971
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9974
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2010-0840
Source: 134c704f-9b21-4f2e-91b3-4a467353bcc0
Resource: N/A

Change History

0
Information is not available yet

Similar CVEs

1217Records found

CVE-2008-5440
Matching Score-8
Assigner-Oracle
ShareView Details
Matching Score-8
Assigner-Oracle
CVSS Score-7.5||HIGH
EPSS-1.95% / 83.17%
||
7 Day CHG~0.00%
Published-14 Jan, 2009 | 01:00
Updated-07 Aug, 2024 | 10:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Unspecified vulnerability in the TimesTen Data Server component in Oracle Database 7.0.5.0.0 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the January 2009 CPU. Oracle has not commented on reliable researcher claims that this is a format string vulnerability via the msg parameter in the evtdump CGI module.

Action-Not Available
Vendor-n/aOracle Corporation
Product-timesten_in-memory_databasen/a
CVE-2015-2265
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-5.80% / 90.32%
||
7 Day CHG~0.00%
Published-24 Mar, 2015 | 17:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The remove_bad_chars function in utils/cups-browsed.c in cups-filters before 1.0.66 allows remote IPP printers to execute arbitrary commands via consecutive shell metacharacters in the (1) model or (2) PDL. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-2707.

Action-Not Available
Vendor-n/aThe Linux FoundationCanonical Ltd.
Product-ubuntu_linuxcups-filtersn/a
CWE ID-CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
CVE-2015-2606
Matching Score-8
Assigner-Oracle
ShareView Details
Matching Score-8
Assigner-Oracle
CVSS Score-7.5||HIGH
EPSS-0.72% / 72.15%
||
7 Day CHG~0.00%
Published-16 Jul, 2015 | 10:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Unspecified vulnerability in the Oracle Endeca Information Discovery Studio component in Oracle Fusion Middleware 2.2.2, 2.3, 2.4, 3.0, and 3.1 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Integrator, a different vulnerability than CVE-2015-2602, CVE-2015-2603, CVE-2015-2604, CVE-2015-2605, and CVE-2015-4745.

Action-Not Available
Vendor-n/aOracle Corporation
Product-fusion_middlewaren/a
CVE-2008-3142
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-1.65% / 81.73%
||
7 Day CHG~0.00%
Published-01 Aug, 2008 | 14:00
Updated-07 Aug, 2024 | 09:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple buffer overflows in Python 2.5.2 and earlier on 32bit platforms allow context-dependent attackers to cause a denial of service (crash) or have unspecified other impact via a long string that leads to incorrect memory allocation during Unicode string processing, related to the unicode_resize function and the PyMem_RESIZE macro.

Action-Not Available
Vendor-n/aDebian GNU/LinuxCanonical Ltd.Python Software Foundation
Product-ubuntu_linuxdebian_linuxpythonn/a
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2015-2603
Matching Score-8
Assigner-Oracle
ShareView Details
Matching Score-8
Assigner-Oracle
CVSS Score-7.5||HIGH
EPSS-0.72% / 72.15%
||
7 Day CHG~0.00%
Published-16 Jul, 2015 | 10:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Unspecified vulnerability in the Oracle Endeca Information Discovery Studio component in Oracle Fusion Middleware 2.2.2, 2.3, 2.4, 3.0, and 3.1 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Integrator, a different vulnerability than CVE-2015-2602, CVE-2015-2604, CVE-2015-2605, CVE-2015-2606, and CVE-2015-4745.

Action-Not Available
Vendor-n/aOracle Corporation
Product-fusion_middlewaren/a
CVE-2008-5023
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-7.5||HIGH
EPSS-18.39% / 95.08%
||
7 Day CHG~0.00%
Published-13 Nov, 2008 | 11:00
Updated-07 Aug, 2024 | 10:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Firefox 3.x before 3.0.4, Firefox 2.x before 2.0.0.18, and SeaMonkey 1.x before 1.1.13 allows remote attackers to bypass the protection mechanism for codebase principals and execute arbitrary script via the -moz-binding CSS property in a signed JAR file.

Action-Not Available
Vendor-n/aCanonical Ltd.Mozilla CorporationDebian GNU/Linux
Product-firefoxubuntu_linuxdebian_linuxseamonkeyn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2024-21014
Matching Score-8
Assigner-Oracle
ShareView Details
Matching Score-8
Assigner-Oracle
CVSS Score-9.8||CRITICAL
EPSS-1.23% / 78.90%
||
7 Day CHG~0.00%
Published-16 Apr, 2024 | 21:26
Updated-17 Mar, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Vulnerability in the Oracle Hospitality Simphony product of Oracle Food and Beverage Applications (component: Simphony Enterprise Server). Supported versions that are affected are 19.1.0-19.5.4. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Hospitality Simphony. Successful attacks of this vulnerability can result in takeover of Oracle Hospitality Simphony. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).

Action-Not Available
Vendor-Oracle Corporation
Product-hospitality_simphonyHospitality Simphony
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2014-4043
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-1.64% / 81.66%
||
7 Day CHG~0.00%
Published-06 Oct, 2014 | 23:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The posix_spawn_file_actions_addopen function in glibc before 2.20 does not copy its path argument in accordance with the POSIX specification, which allows context-dependent attackers to trigger use-after-free vulnerabilities.

Action-Not Available
Vendor-n/aGNUopenSUSE
Product-opensuseglibcn/a
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2015-2238
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.11% / 29.04%
||
7 Day CHG~0.00%
Published-09 Mar, 2015 | 00:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple unspecified vulnerabilities in Google V8 before 4.1.0.21, as used in Google Chrome before 41.0.2272.76, allow attackers to cause a denial of service or possibly have other impact via unknown vectors.

Action-Not Available
Vendor-n/aGoogle LLCCanonical Ltd.
Product-v8ubuntu_linuxchromen/a
CVE-2015-2709
Matching Score-8
Assigner-Mozilla Corporation
ShareView Details
Matching Score-8
Assigner-Mozilla Corporation
CVSS Score-7.5||HIGH
EPSS-1.08% / 77.44%
||
7 Day CHG~0.00%
Published-14 May, 2015 | 10:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 38.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.

Action-Not Available
Vendor-n/aMozilla CorporationNovellopenSUSE
Product-firefoxopensusesuse_linux_enterprise_serversuse_linux_enterprise_desktopsuse_linux_enterprise_software_development_kitn/a
CVE-2008-5022
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-7.5||HIGH
EPSS-13.45% / 94.04%
||
7 Day CHG~0.00%
Published-13 Nov, 2008 | 11:00
Updated-07 Aug, 2024 | 10:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The nsXMLHttpRequest::NotifyEventListeners method in Firefox 3.x before 3.0.4, Firefox 2.x before 2.0.0.18, Thunderbird 2.x before 2.0.0.18, and SeaMonkey 1.x before 1.1.13 allows remote attackers to bypass the same-origin policy and execute arbitrary script via multiple listeners, which bypass the inner window check.

Action-Not Available
Vendor-n/aCanonical Ltd.Mozilla CorporationDebian GNU/Linux
Product-ubuntu_linuxdebian_linuxthunderbirdfirefoxseamonkeyn/a
CWE ID-CWE-287
Improper Authentication
CVE-2015-2331
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-42.71% / 97.38%
||
7 Day CHG~0.00%
Published-30 Mar, 2015 | 10:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Integer overflow in the _zip_cdir_new function in zip_dirent.c in libzip 0.11.2 and earlier, as used in the ZIP extension in PHP before 5.4.39, 5.5.x before 5.5.23, and 5.6.x before 5.6.7 and other products, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a ZIP archive that contains many entries, leading to a heap-based buffer overflow.

Action-Not Available
Vendor-nihn/aopenSUSEFedora ProjectThe PHP GroupDebian GNU/Linux
Product-fedoraopensusephpdebian_linuxlibzipn/a
CVE-2015-2604
Matching Score-8
Assigner-Oracle
ShareView Details
Matching Score-8
Assigner-Oracle
CVSS Score-7.5||HIGH
EPSS-0.72% / 72.15%
||
7 Day CHG~0.00%
Published-16 Jul, 2015 | 10:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Unspecified vulnerability in the Oracle Endeca Information Discovery Studio component in Oracle Fusion Middleware 2.2.2, 2.3, 2.4, 3.0, and 3.1 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Integrator, a different vulnerability than CVE-2015-2602, CVE-2015-2603, CVE-2015-2605, CVE-2015-2606, and CVE-2015-4745.

Action-Not Available
Vendor-n/aOracle Corporation
Product-fusion_middlewaren/a
CVE-2015-2059
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.83% / 74.12%
||
7 Day CHG~0.00%
Published-12 Aug, 2015 | 14:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The stringprep_utf8_to_ucs4 function in libin before 1.31, as used in jabberd2, allows context-dependent attackers to read system memory and possibly have other unspecified impact via invalid UTF-8 characters in a string, which triggers an out-of-bounds read.

Action-Not Available
Vendor-n/aGNUFedora ProjectopenSUSE
Product-libidnfedoraopensusen/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2015-2590
Matching Score-8
Assigner-Oracle
ShareView Details
Matching Score-8
Assigner-Oracle
CVSS Score-9.8||CRITICAL
EPSS-61.54% / 98.28%
||
7 Day CHG~0.00%
Published-16 Jul, 2015 | 10:00
Updated-22 Oct, 2025 | 00:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Known KEV||Action Due Date - 2022-03-24||Apply updates per vendor instructions.

Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45, and Java SE Embedded 7u75 and 8u33 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2015-4732.

Action-Not Available
Vendor-n/aSUSECanonical Ltd.Red Hat, Inc.openSUSEOracle CorporationDebian GNU/Linux
Product-enterprise_linux_for_ibm_z_systemssatelliteenterprise_linux_serverenterprise_linux_eusubuntu_linuxenterprise_linux_for_power_little_endianopensuselinux_enterprise_desktoplinux_enterprise_debuginfoenterprise_linux_desktopenterprise_linux_for_power_big_endian_eusjdkjredebian_linuxenterprise_linux_server_ausenterprise_linux_for_power_little_endian_eusenterprise_linux_for_ibm_z_systems_eusenterprise_linux_for_power_big_endianenterprise_linux_server_tuslinux_enterprise_serverenterprise_linux_workstationn/aJava SE
CVE-2015-2605
Matching Score-8
Assigner-Oracle
ShareView Details
Matching Score-8
Assigner-Oracle
CVSS Score-7.5||HIGH
EPSS-0.72% / 72.15%
||
7 Day CHG~0.00%
Published-16 Jul, 2015 | 10:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Unspecified vulnerability in the Oracle Endeca Information Discovery Studio component in Oracle Fusion Middleware 2.2.2, 2.3, 2.4, 3.0, and 3.1 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Integrator, a different vulnerability than CVE-2015-2602, CVE-2015-2603, CVE-2015-2604, CVE-2015-2606, and CVE-2015-4745.

Action-Not Available
Vendor-n/aOracle Corporation
Product-fusion_middlewaren/a
CVE-2015-2301
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-12.74% / 93.84%
||
7 Day CHG~0.00%
Published-30 Mar, 2015 | 10:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Use-after-free vulnerability in the phar_rename_archive function in phar_object.c in PHP before 5.5.22 and 5.6.x before 5.6.6 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger an attempted renaming of a Phar archive to the name of an existing file.

Action-Not Available
Vendor-n/aopenSUSERed Hat, Inc.The PHP GroupApple Inc.Debian GNU/LinuxCanonical Ltd.
Product-enterprise_linux_serverenterprise_linux_hpc_nodeopensuseenterprise_linux_hpc_node_eusubuntu_linuxenterprise_linux_desktopenterprise_linux_server_eusenterprise_linux_workstationphpdebian_linuxmac_os_xn/a
CWE ID-CWE-416
Use After Free
CVE-2000-1236
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.97% / 76.28%
||
7 Day CHG~0.00%
Published-14 Jul, 2005 | 04:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

SQL injection vulnerability in mod_sql in Oracle Internet Application Server (IAS) 3.0.7 and earlier allows remote attackers to execute arbitrary SQL commands via the query string of the URL.

Action-Not Available
Vendor-n/aOracle Corporation
Product-application_servern/a
CVE-2000-0169
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-19.27% / 95.22%
||
7 Day CHG~0.00%
Published-02 Jun, 2000 | 04:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Batch files in the Oracle web listener ows-bin directory allow remote attackers to execute commands via a malformed URL that includes '?&'.

Action-Not Available
Vendor-n/aOracle Corporation
Product-application_servern/a
CVE-2015-2636
Matching Score-8
Assigner-Oracle
ShareView Details
Matching Score-8
Assigner-Oracle
CVSS Score-7.5||HIGH
EPSS-0.69% / 71.27%
||
7 Day CHG~0.00%
Published-16 Jul, 2015 | 10:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Unspecified vulnerability in the Oracle Data Integrator component in Oracle Fusion Middleware 11.1.1.3.0 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Data Quality based on Trillium, a different vulnerability than CVE-2015-0443, CVE-2015-0444, CVE-2015-0445, CVE-2015-0446, CVE-2015-2634, CVE-2015-2635, CVE-2015-4758, and CVE-2015-4759.

Action-Not Available
Vendor-n/aOracle Corporation
Product-fusion_middlewaren/a
CVE-2008-5024
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-7.5||HIGH
EPSS-7.22% / 91.43%
||
7 Day CHG~0.00%
Published-13 Nov, 2008 | 11:00
Updated-07 Aug, 2024 | 10:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Mozilla Firefox 3.x before 3.0.4, Firefox 2.x before 2.0.0.18, Thunderbird 2.x before 2.0.0.18, and SeaMonkey 1.x before 1.1.13 do not properly escape quote characters used for XML processing, which allows remote attackers to conduct XML injection attacks via the default namespace in an E4X document.

Action-Not Available
Vendor-n/aCanonical Ltd.Mozilla CorporationDebian GNU/Linux
Product-ubuntu_linuxdebian_linuxthunderbirdfirefoxseamonkeyn/a
CWE ID-CWE-91
XML Injection (aka Blind XPath Injection)
CVE-2015-1472
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-4.76% / 89.22%
||
7 Day CHG~0.00%
Published-08 Apr, 2015 | 10:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The ADDW macro in stdio-common/vfscanf.c in the GNU C Library (aka glibc or libc6) before 2.21 does not properly consider data-type size during memory allocation, which allows context-dependent attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a long line containing wide characters that are improperly handled in a wscanf call.

Action-Not Available
Vendor-n/aGNUCanonical Ltd.
Product-glibcubuntu_linuxn/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2015-1284
Matching Score-8
Assigner-Chrome
ShareView Details
Matching Score-8
Assigner-Chrome
CVSS Score-7.5||HIGH
EPSS-1.22% / 78.80%
||
7 Day CHG~0.00%
Published-23 Jul, 2015 | 00:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The LocalFrame::isURLAllowed function in core/frame/LocalFrame.cpp in Blink, as used in Google Chrome before 44.0.2403.89, does not properly check for a page's maximum number of frames, which allows remote attackers to cause a denial of service (invalid count value and use-after-free) or possibly have unspecified other impact via crafted JavaScript code that makes many createElement calls for IFRAME elements.

Action-Not Available
Vendor-n/aRed Hat, Inc.Google LLCopenSUSE
Product-enterprise_linux_workstation_supplementaryopensuseenterprise_linux_server_supplementarychromeenterprise_linux_desktop_supplementaryn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2015-1215
Matching Score-8
Assigner-Chrome
ShareView Details
Matching Score-8
Assigner-Chrome
CVSS Score-7.5||HIGH
EPSS-0.97% / 76.31%
||
7 Day CHG~0.00%
Published-09 Mar, 2015 | 00:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The filters implementation in Skia, as used in Google Chrome before 41.0.2272.76, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger an out-of-bounds write operation.

Action-Not Available
Vendor-n/aRed Hat, Inc.Google LLCCanonical Ltd.
Product-enterprise_linux_workstation_supplementaryubuntu_linuxenterprise_linux_server_supplementarychromeenterprise_linux_server_supplementary_eusenterprise_linux_desktop_supplementaryn/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2015-0804
Matching Score-8
Assigner-Mozilla Corporation
ShareView Details
Matching Score-8
Assigner-Mozilla Corporation
CVSS Score-7.5||HIGH
EPSS-1.67% / 81.84%
||
7 Day CHG~0.00%
Published-01 Apr, 2015 | 10:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The HTMLSourceElement::BindToTree function in Mozilla Firefox before 37.0 does not properly constrain a data type after omitting namespace validation during certain tree-binding operations, which allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free) via a crafted HTML document containing a SOURCE element.

Action-Not Available
Vendor-n/aMozilla CorporationopenSUSECanonical Ltd.
Product-firefoxopensuseubuntu_linuxn/a
CVE-2014-2423
Matching Score-8
Assigner-Oracle
ShareView Details
Matching Score-8
Assigner-Oracle
CVSS Score-7.5||HIGH
EPSS-4.32% / 88.66%
||
7 Day CHG~0.00%
Published-16 Apr, 2014 | 02:05
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Unspecified vulnerability in Oracle Java SE 6u71, 7u51, and 8, and Java SE Embedded 7u51, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to JAX-WS, a different vulnerability than CVE-2014-0452 and CVE-2014-0458.

Action-Not Available
Vendor-n/aDebian GNU/LinuxOracle CorporationCanonical Ltd.
Product-debian_linuxjreubuntu_linuxjdkn/a
CVE-2015-1217
Matching Score-8
Assigner-Chrome
ShareView Details
Matching Score-8
Assigner-Chrome
CVSS Score-7.5||HIGH
EPSS-1.65% / 81.71%
||
7 Day CHG~0.00%
Published-09 Mar, 2015 | 00:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The V8LazyEventListener::prepareListenerObject function in bindings/core/v8/V8LazyEventListener.cpp in the V8 bindings in Blink, as used in Google Chrome before 41.0.2272.76, does not properly compile listeners, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that leverage "type confusion."

Action-Not Available
Vendor-n/aRed Hat, Inc.Google LLCCanonical Ltd.
Product-enterprise_linux_workstation_supplementaryubuntu_linuxenterprise_linux_server_supplementarychromeenterprise_linux_server_supplementary_eusenterprise_linux_desktop_supplementaryn/a
CVE-2015-1289
Matching Score-8
Assigner-Chrome
ShareView Details
Matching Score-8
Assigner-Chrome
CVSS Score-7.5||HIGH
EPSS-1.47% / 80.64%
||
7 Day CHG~0.00%
Published-23 Jul, 2015 | 00:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple unspecified vulnerabilities in Google Chrome before 44.0.2403.89 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.

Action-Not Available
Vendor-n/aopenSUSERed Hat, Inc.Google LLCDebian GNU/Linux
Product-enterprise_linux_workstation_supplementaryopensuseenterprise_linux_server_supplementaryenterprise_linux_server_supplementary_euschromedebian_linuxenterprise_linux_desktop_supplementaryn/a
CVE-2015-1243
Matching Score-8
Assigner-Chrome
ShareView Details
Matching Score-8
Assigner-Chrome
CVSS Score-7.5||HIGH
EPSS-1.77% / 82.32%
||
7 Day CHG~0.00%
Published-01 May, 2015 | 10:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Use-after-free vulnerability in the MutationObserver::disconnect function in core/dom/MutationObserver.cpp in the DOM implementation in Blink, as used in Google Chrome before 42.0.2311.135, allows remote attackers to cause a denial of service or possibly have unspecified other impact by triggering an attempt to unregister a MutationObserver object that is not currently registered.

Action-Not Available
Vendor-n/aRed Hat, Inc.Google LLCDebian GNU/LinuxCanonical Ltd.
Product-debian_linuxenterprise_linux_workstation_supplementaryubuntu_linuxenterprise_linux_server_supplementarychromeenterprise_linux_server_supplementary_eusenterprise_linux_desktop_supplementaryn/a
CVE-2015-0860
Matching Score-8
Assigner-Debian GNU/Linux
ShareView Details
Matching Score-8
Assigner-Debian GNU/Linux
CVSS Score-7.5||HIGH
EPSS-4.91% / 89.39%
||
7 Day CHG~0.00%
Published-03 Dec, 2015 | 20:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Off-by-one error in the extracthalf function in dpkg-deb/extract.c in the dpkg-deb component in Debian dpkg 1.16.x before 1.16.17 and 1.17.x before 1.17.26 allows remote attackers to execute arbitrary code via the archive magic version number in an "old-style" Debian binary package, which triggers a stack-based buffer overflow.

Action-Not Available
Vendor-n/aDebian GNU/LinuxCanonical Ltd.
Product-dpkgubuntu_linuxn/a
CVE-2015-1272
Matching Score-8
Assigner-Chrome
ShareView Details
Matching Score-8
Assigner-Chrome
CVSS Score-7.5||HIGH
EPSS-2.13% / 83.86%
||
7 Day CHG~0.00%
Published-23 Jul, 2015 | 00:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Use-after-free vulnerability in the GPU process implementation in Google Chrome before 44.0.2403.89 allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging the continued availability of a GPUChannelHost data structure during Blink shutdown, related to content/browser/gpu/browser_gpu_channel_host_factory.cc and content/renderer/render_thread_impl.cc.

Action-Not Available
Vendor-n/aopenSUSERed Hat, Inc.Google LLCDebian GNU/Linux
Product-debian_linuxenterprise_linux_workstation_supplementaryopensuseenterprise_linux_server_supplementarychromeenterprise_linux_server_supplementary_eusenterprise_linux_desktop_supplementaryn/a
CVE-2015-1231
Matching Score-8
Assigner-Chrome
ShareView Details
Matching Score-8
Assigner-Chrome
CVSS Score-7.5||HIGH
EPSS-1.16% / 78.24%
||
7 Day CHG~0.00%
Published-09 Mar, 2015 | 00:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple unspecified vulnerabilities in Google Chrome before 41.0.2272.76 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.

Action-Not Available
Vendor-n/aRed Hat, Inc.Google LLCCanonical Ltd.
Product-enterprise_linux_serverenterprise_linux_workstation_supplementaryubuntu_linuxchromeenterprise_linux_server_supplementary_eusenterprise_linux_desktop_supplementaryn/a
CVE-2015-1218
Matching Score-8
Assigner-Chrome
ShareView Details
Matching Score-8
Assigner-Chrome
CVSS Score-7.5||HIGH
EPSS-1.07% / 77.40%
||
7 Day CHG~0.00%
Published-09 Mar, 2015 | 00:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple use-after-free vulnerabilities in the DOM implementation in Blink, as used in Google Chrome before 41.0.2272.76, allow remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger movement of a SCRIPT element to different documents, related to (1) the HTMLScriptElement::didMoveToNewDocument function in core/html/HTMLScriptElement.cpp and (2) the SVGScriptElement::didMoveToNewDocument function in core/svg/SVGScriptElement.cpp.

Action-Not Available
Vendor-n/aRed Hat, Inc.Google LLCCanonical Ltd.
Product-enterprise_linux_workstation_supplementaryubuntu_linuxenterprise_linux_server_supplementarychromeenterprise_linux_server_supplementary_eusenterprise_linux_desktop_supplementaryn/a
CVE-2015-1351
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-19.13% / 95.20%
||
7 Day CHG~0.00%
Published-30 Mar, 2015 | 10:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Use-after-free vulnerability in the _zend_shared_memdup function in zend_shared_alloc.c in the OPcache extension in PHP through 5.6.7 allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.

Action-Not Available
Vendor-n/aThe PHP GroupApple Inc.Oracle Corporation
Product-solarisphplinuxmac_os_xsecure_backupn/a
CWE ID-CWE-416
Use After Free
CVE-2015-1276
Matching Score-8
Assigner-Chrome
ShareView Details
Matching Score-8
Assigner-Chrome
CVSS Score-9.8||CRITICAL
EPSS-2.78% / 85.76%
||
7 Day CHG~0.00%
Published-23 Jul, 2015 | 00:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Use-after-free vulnerability in content/browser/indexed_db/indexed_db_backing_store.cc in the IndexedDB implementation in Google Chrome before 44.0.2403.89 allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging an abort action before a certain write operation.

Action-Not Available
Vendor-n/aopenSUSERed Hat, Inc.Google LLCDebian GNU/Linux
Product-debian_linuxenterprise_linux_workstation_supplementaryopensuseenterprise_linux_server_supplementarychromeenterprise_linux_server_supplementary_eusenterprise_linux_desktop_supplementaryn/a
CVE-2015-1205
Matching Score-8
Assigner-Chrome
ShareView Details
Matching Score-8
Assigner-Chrome
CVSS Score-7.5||HIGH
EPSS-1.00% / 76.59%
||
7 Day CHG~0.00%
Published-22 Jan, 2015 | 22:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple unspecified vulnerabilities in Google Chrome before 40.0.2214.91 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.

Action-Not Available
Vendor-chromiumn/aGoogle LLCCanonical Ltd.
Product-ubuntu_linuxchromiumchromen/a
CVE-2015-1280
Matching Score-8
Assigner-Chrome
ShareView Details
Matching Score-8
Assigner-Chrome
CVSS Score-7.5||HIGH
EPSS-2.17% / 84.01%
||
7 Day CHG~0.00%
Published-23 Jul, 2015 | 00:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

SkPictureShader.cpp in Skia, as used in Google Chrome before 44.0.2403.89, allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging access to a renderer process and providing crafted serialized data.

Action-Not Available
Vendor-n/aopenSUSERed Hat, Inc.Google LLCDebian GNU/Linux
Product-enterprise_linux_workstation_supplementaryopensuseenterprise_linux_server_supplementaryenterprise_linux_server_supplementary_euschromedebian_linuxenterprise_linux_desktop_supplementaryn/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2015-1237
Matching Score-8
Assigner-Chrome
ShareView Details
Matching Score-8
Assigner-Chrome
CVSS Score-7.5||HIGH
EPSS-1.83% / 82.61%
||
7 Day CHG~0.00%
Published-19 Apr, 2015 | 10:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Use-after-free vulnerability in the RenderFrameImpl::OnMessageReceived function in content/renderer/render_frame_impl.cc in Google Chrome before 42.0.2311.90 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger renderer IPC messages during a detach operation.

Action-Not Available
Vendor-n/aGoogle LLCDebian GNU/LinuxCanonical Ltd.
Product-debian_linuxubuntu_linuxchromen/a
CVE-2015-1230
Matching Score-8
Assigner-Chrome
ShareView Details
Matching Score-8
Assigner-Chrome
CVSS Score-7.5||HIGH
EPSS-1.73% / 82.11%
||
7 Day CHG~0.00%
Published-09 Mar, 2015 | 00:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The getHiddenProperty function in bindings/core/v8/V8EventListenerList.h in Blink, as used in Google Chrome before 41.0.2272.76, has a name conflict with the AudioContext class, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via JavaScript code that adds an AudioContext event listener and triggers "type confusion."

Action-Not Available
Vendor-n/aRed Hat, Inc.Google LLCCanonical Ltd.
Product-enterprise_linux_workstation_supplementaryubuntu_linuxenterprise_linux_server_supplementarychromeenterprise_linux_server_supplementary_eusenterprise_linux_desktop_supplementaryn/a
CVE-2015-1216
Matching Score-8
Assigner-Chrome
ShareView Details
Matching Score-8
Assigner-Chrome
CVSS Score-7.5||HIGH
EPSS-1.07% / 77.40%
||
7 Day CHG~0.00%
Published-09 Mar, 2015 | 00:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Use-after-free vulnerability in the V8Window::namedPropertyGetterCustom function in bindings/core/v8/custom/V8WindowCustom.cpp in the V8 bindings in Blink, as used in Google Chrome before 41.0.2272.76, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger a frame detachment.

Action-Not Available
Vendor-n/aRed Hat, Inc.Google LLCCanonical Ltd.
Product-enterprise_linux_workstation_supplementaryubuntu_linuxenterprise_linux_server_supplementarychromeenterprise_linux_server_supplementary_eusenterprise_linux_desktop_supplementaryn/a
CVE-2015-0803
Matching Score-8
Assigner-Mozilla Corporation
ShareView Details
Matching Score-8
Assigner-Mozilla Corporation
CVSS Score-7.5||HIGH
EPSS-1.67% / 81.84%
||
7 Day CHG~0.00%
Published-01 Apr, 2015 | 10:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The HTMLSourceElement::AfterSetAttr function in Mozilla Firefox before 37.0 does not properly constrain the original data type of a casted value during the setting of a SOURCE element's attributes, which allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free) via a crafted HTML document.

Action-Not Available
Vendor-n/aMozilla CorporationopenSUSECanonical Ltd.
Product-firefoxopensuseubuntu_linuxn/a
CVE-2015-1250
Matching Score-8
Assigner-Chrome
ShareView Details
Matching Score-8
Assigner-Chrome
CVSS Score-7.5||HIGH
EPSS-1.08% / 77.50%
||
7 Day CHG~0.00%
Published-01 May, 2015 | 10:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple unspecified vulnerabilities in Google Chrome before 42.0.2311.135 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.

Action-Not Available
Vendor-n/aRed Hat, Inc.Google LLCDebian GNU/LinuxCanonical Ltd.
Product-enterprise_linux_workstation_supplementaryubuntu_linuxenterprise_linux_server_supplementaryenterprise_linux_server_supplementary_euschromedebian_linuxenterprise_linux_desktop_supplementaryn/a
CVE-2015-1315
Matching Score-8
Assigner-Canonical Ltd.
ShareView Details
Matching Score-8
Assigner-Canonical Ltd.
CVSS Score-7.5||HIGH
EPSS-12.10% / 93.64%
||
7 Day CHG~0.00%
Published-23 Feb, 2015 | 17:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in the charset_to_intern function in unix/unix.c in Info-Zip UnZip 6.10b allows remote attackers to execute arbitrary code via a crafted string, as demonstrated by converting a string from CP866 to UTF-8.

Action-Not Available
Vendor-info-zipn/aCanonical Ltd.
Product-unzipubuntu_linuxn/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2015-1219
Matching Score-8
Assigner-Chrome
ShareView Details
Matching Score-8
Assigner-Chrome
CVSS Score-7.5||HIGH
EPSS-0.90% / 75.25%
||
7 Day CHG~0.00%
Published-09 Mar, 2015 | 00:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Integer overflow in the SkMallocPixelRef::NewAllocate function in core/SkMallocPixelRef.cpp in Skia, as used in Google Chrome before 41.0.2272.76, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger an attempted allocation of a large amount of memory during WebGL rendering.

Action-Not Available
Vendor-n/aRed Hat, Inc.Google LLCCanonical Ltd.
Product-enterprise_linux_workstation_supplementaryubuntu_linuxenterprise_linux_server_supplementarychromeenterprise_linux_server_supplementary_eusenterprise_linux_desktop_supplementaryn/a
CVE-2015-0778
Matching Score-8
Assigner-OpenText (formerly Micro Focus)
ShareView Details
Matching Score-8
Assigner-OpenText (formerly Micro Focus)
CVSS Score-7.5||HIGH
EPSS-0.90% / 75.23%
||
7 Day CHG~0.00%
Published-16 Mar, 2015 | 14:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

osc before 0.151.0 allows remote attackers to execute arbitrary commands via shell metacharacters in a _service file.

Action-Not Available
Vendor-n/aFedora ProjectopenSUSESUSE
Product-fedoraopensuseopensuse_oscn/a
CWE ID-CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
CVE-2015-0973
Matching Score-8
Assigner-CERT/CC
ShareView Details
Matching Score-8
Assigner-CERT/CC
CVSS Score-8.8||HIGH
EPSS-2.01% / 83.39%
||
7 Day CHG~0.00%
Published-18 Jan, 2015 | 18:00
Updated-09 Jun, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in the png_read_IDAT_data function in pngrutil.c in libpng before 1.5.21 and 1.6.x before 1.6.16 allows context-dependent attackers to execute arbitrary code via IDAT data with a large width, a different vulnerability than CVE-2014-9495.

Action-Not Available
Vendor-libpngn/aOracle CorporationApple Inc.
Product-mac_os_xsolarislibpngn/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2024-21181
Matching Score-8
Assigner-Oracle
ShareView Details
Matching Score-8
Assigner-Oracle
CVSS Score-9.8||CRITICAL
EPSS-1.71% / 82.01%
||
7 Day CHG~0.00%
Published-16 Jul, 2024 | 22:40
Updated-27 Mar, 2025 | 16:53
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Core). Supported versions that are affected are 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via T3, IIOP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).

Action-Not Available
Vendor-Oracle Corporation
Product-weblogic_serverWebLogic Serverweblogic_server
CVE-2015-1209
Matching Score-8
Assigner-Chrome
ShareView Details
Matching Score-8
Assigner-Chrome
CVSS Score-7.5||HIGH
EPSS-1.05% / 77.20%
||
7 Day CHG~0.00%
Published-06 Feb, 2015 | 11:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Use-after-free vulnerability in the VisibleSelection::nonBoundaryShadowTreeRootNode function in core/editing/VisibleSelection.cpp in the DOM implementation in Blink, as used in Google Chrome before 40.0.2214.111 on Windows, OS X, and Linux and before 40.0.2214.109 on Android, allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted JavaScript code that triggers improper handling of a shadow-root anchor.

Action-Not Available
Vendor-n/aopenSUSELinux Kernel Organization, IncRed Hat, Inc.Google LLCApple Inc.Canonical Ltd.Microsoft Corporation
Product-enterprise_linux_serverenterprise_linux_server_auslinux_kernelenterprise_linux_eusopensusemacosubuntu_linuxenterprise_linux_desktopenterprise_linux_workstationchromewindowsn/a
CWE ID-CWE-416
Use After Free
CVE-2015-1211
Matching Score-8
Assigner-Chrome
ShareView Details
Matching Score-8
Assigner-Chrome
CVSS Score-7.5||HIGH
EPSS-0.75% / 72.80%
||
7 Day CHG~0.00%
Published-06 Feb, 2015 | 11:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The OriginCanAccessServiceWorkers function in content/browser/service_worker/service_worker_dispatcher_host.cc in Google Chrome before 40.0.2214.111 on Windows, OS X, and Linux and before 40.0.2214.109 on Android does not properly restrict the URI scheme during a ServiceWorker registration, which allows remote attackers to gain privileges via a filesystem: URI.

Action-Not Available
Vendor-n/aopenSUSELinux Kernel Organization, IncRed Hat, Inc.Google LLCApple Inc.Canonical Ltd.Microsoft Corporation
Product-enterprise_linux_serverenterprise_linux_server_auslinux_kernelenterprise_linux_eusopensusemacosubuntu_linuxenterprise_linux_desktopenterprise_linux_workstationchromewindowsn/a
CVE-2015-0823
Matching Score-8
Assigner-Mozilla Corporation
ShareView Details
Matching Score-8
Assigner-Mozilla Corporation
CVSS Score-7.5||HIGH
EPSS-1.71% / 82.02%
||
7 Day CHG~0.00%
Published-25 Feb, 2015 | 11:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple use-after-free vulnerabilities in OpenType Sanitiser, as used in Mozilla Firefox before 36.0, might allow remote attackers to trigger problematic Developer Console information or possibly have unspecified other impact by leveraging incorrect macro expansion, related to the ots::ots_gasp_parse function.

Action-Not Available
Vendor-opentype_sanitiser_projectn/aMozilla CorporationopenSUSECanonical Ltd.
Product-opentype_sanitiserfirefoxopensuseubuntu_linuxn/a
  • Previous
  • 1
  • 2
  • 3
  • 4
  • ...
  • 24
  • 25
  • Next
Details not found