Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2010-0850 (GCVE-0-2010-0850)
Vulnerability from cvelistv5 – Published: 2010-04-01 16:00 – Updated: 2024-08-07 01:06- n/a
| URL | Tags | |||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T01:06:50.608Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "HPSBMU02799",
"tags": [
"vendor-advisory",
"x_refsource_HP",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=134254866602253\u0026w=2"
},
{
"name": "39317",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/39317"
},
{
"name": "40545",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/40545"
},
{
"name": "ADV-2010-1793",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2010/1793"
},
{
"name": "43308",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/43308"
},
{
"name": "SSRT100179",
"tags": [
"vendor-advisory",
"x_refsource_HP",
"x_transferred"
],
"url": "http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.oracle.com/technetwork/topics/security/javacpumar2010-083341.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html"
},
{
"name": "SUSE-SR:2010:008",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00001.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.vmware.com/security/advisories/VMSA-2011-0003.html"
},
{
"name": "HPSBMA02547",
"tags": [
"vendor-advisory",
"x_refsource_HP",
"x_transferred"
],
"url": "http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751"
},
{
"name": "20110211 VMSA-2011-0003 Third party component updates for VMware vCenter Server, vCenter Update Manager, ESXi and ESX",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/516397/100/0/threaded"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2010-03-30T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "Unspecified vulnerability in the Java 2D component in Oracle Java SE and Java for Business 1.3.1_27 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-10-10T18:57:01.000Z",
"orgId": "43595867-4340-4103-b7a2-9a5208d29a85",
"shortName": "oracle"
},
"references": [
{
"name": "HPSBMU02799",
"tags": [
"vendor-advisory",
"x_refsource_HP"
],
"url": "http://marc.info/?l=bugtraq\u0026m=134254866602253\u0026w=2"
},
{
"name": "39317",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/39317"
},
{
"name": "40545",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/40545"
},
{
"name": "ADV-2010-1793",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2010/1793"
},
{
"name": "43308",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/43308"
},
{
"name": "SSRT100179",
"tags": [
"vendor-advisory",
"x_refsource_HP"
],
"url": "http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.oracle.com/technetwork/topics/security/javacpumar2010-083341.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html"
},
{
"name": "SUSE-SR:2010:008",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00001.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.vmware.com/security/advisories/VMSA-2011-0003.html"
},
{
"name": "HPSBMA02547",
"tags": [
"vendor-advisory",
"x_refsource_HP"
],
"url": "http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751"
},
{
"name": "20110211 VMSA-2011-0003 Third party component updates for VMware vCenter Server, vCenter Update Manager, ESXi and ESX",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/516397/100/0/threaded"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2010-0850",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Unspecified vulnerability in the Java 2D component in Oracle Java SE and Java for Business 1.3.1_27 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "HPSBMU02799",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=134254866602253\u0026w=2"
},
{
"name": "39317",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/39317"
},
{
"name": "40545",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/40545"
},
{
"name": "ADV-2010-1793",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/1793"
},
{
"name": "43308",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/43308"
},
{
"name": "SSRT100179",
"refsource": "HP",
"url": "http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/javacpumar2010-083341.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/javacpumar2010-083341.html"
},
{
"name": "http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html",
"refsource": "CONFIRM",
"url": "http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html"
},
{
"name": "SUSE-SR:2010:008",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00001.html"
},
{
"name": "http://www.vmware.com/security/advisories/VMSA-2011-0003.html",
"refsource": "CONFIRM",
"url": "http://www.vmware.com/security/advisories/VMSA-2011-0003.html"
},
{
"name": "HPSBMA02547",
"refsource": "HP",
"url": "http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751"
},
{
"name": "20110211 VMSA-2011-0003 Third party component updates for VMware vCenter Server, vCenter Update Manager, ESXi and ESX",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/516397/100/0/threaded"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "43595867-4340-4103-b7a2-9a5208d29a85",
"assignerShortName": "oracle",
"cveId": "CVE-2010-0850",
"datePublished": "2010-04-01T16:00:00.000Z",
"dateReserved": "2010-03-03T00:00:00.000Z",
"dateUpdated": "2024-08-07T01:06:50.608Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
GHSA-QC39-Q4XV-PXC8
Vulnerability from github – Published: 2022-05-02 06:16 – Updated: 2022-05-02 06:16Unspecified vulnerability in the Java 2D component in Oracle Java SE and Java for Business 1.3.1_27 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.
{
"affected": [],
"aliases": [
"CVE-2010-0850"
],
"database_specific": {
"cwe_ids": [],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2010-04-01T16:30:00Z",
"severity": "HIGH"
},
"details": "Unspecified vulnerability in the Java 2D component in Oracle Java SE and Java for Business 1.3.1_27 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.",
"id": "GHSA-qc39-q4xv-pxc8",
"modified": "2022-05-02T06:16:19Z",
"published": "2022-05-02T06:16:19Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2010-0850"
},
{
"type": "WEB",
"url": "http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00001.html"
},
{
"type": "WEB",
"url": "http://marc.info/?l=bugtraq\u0026m=134254866602253\u0026w=2"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/39317"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/40545"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/43308"
},
{
"type": "WEB",
"url": "http://www.oracle.com/technetwork/topics/security/javacpumar2010-083341.html"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/archive/1/516397/100/0/threaded"
},
{
"type": "WEB",
"url": "http://www.vmware.com/security/advisories/VMSA-2011-0003.html"
},
{
"type": "WEB",
"url": "http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2010/1793"
}
],
"schema_version": "1.4.0",
"severity": []
}
CERTA-2012-AVI-395
Vulnerability from certfr_avis - Published: 2012-07-18 - Updated: 2012-07-18
Plusieurs vulnérabilités ont été corrigées dans HP Network Node Manager i. Elles permettent à un utilisateur malintentionné de provoquer un déni de service à distance et de porter atteinte à l'intégrité et à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |
|---|---|---|---|
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "HP Network Node Manager i 9.0x ;",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "HP Network Node Manager i 9.1x.",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2010-4476",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4476"
},
{
"name": "CVE-2011-3558",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3558"
},
{
"name": "CVE-2010-4465",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4465"
},
{
"name": "CVE-2010-4470",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4470"
},
{
"name": "CVE-2012-0500",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0500"
},
{
"name": "CVE-2012-0502",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0502"
},
{
"name": "CVE-2010-4473",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4473"
},
{
"name": "CVE-2011-3556",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3556"
},
{
"name": "CVE-2011-3545",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3545"
},
{
"name": "CVE-2010-0090",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0090"
},
{
"name": "CVE-2011-3548",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3548"
},
{
"name": "CVE-2010-0840",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0840"
},
{
"name": "CVE-2011-0864",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0864"
},
{
"name": "CVE-2010-4447",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4447"
},
{
"name": "CVE-2011-0868",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0868"
},
{
"name": "CVE-2012-0507",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0507"
},
{
"name": "CVE-2010-0846",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0846"
},
{
"name": "CVE-2010-1321",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1321"
},
{
"name": "CVE-2010-4451",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4451"
},
{
"name": "CVE-2009-3871",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3871"
},
{
"name": "CVE-2012-0505",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0505"
},
{
"name": "CVE-2010-4452",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4452"
},
{
"name": "CVE-2010-4467",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4467"
},
{
"name": "CVE-2010-3552",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3552"
},
{
"name": "CVE-2010-3541",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3541"
},
{
"name": "CVE-2011-3554",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3554"
},
{
"name": "CVE-2010-4450",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4450"
},
{
"name": "CVE-2011-3555",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3555"
},
{
"name": "CVE-2010-3558",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3558"
},
{
"name": "CVE-2010-3549",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3549"
},
{
"name": "CVE-2009-3867",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3867"
},
{
"name": "CVE-2011-0866",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0866"
},
{
"name": "CVE-2010-4468",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4468"
},
{
"name": "CVE-2010-0844",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0844"
},
{
"name": "CVE-2010-0841",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0841"
},
{
"name": "CVE-2010-0845",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0845"
},
{
"name": "CVE-2010-3573",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3573"
},
{
"name": "CVE-2010-3572",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3572"
},
{
"name": "CVE-2010-3559",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3559"
},
{
"name": "CVE-2011-3552",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3552"
},
{
"name": "CVE-2010-3571",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3571"
},
{
"name": "CVE-2012-0499",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0499"
},
{
"name": "CVE-2010-0089",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0089"
},
{
"name": "CVE-2011-0871",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0871"
},
{
"name": "CVE-2010-4422",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4422"
},
{
"name": "CVE-2011-3560",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3560"
},
{
"name": "CVE-2010-0886",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0886"
},
{
"name": "CVE-2010-4448",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4448"
},
{
"name": "CVE-2010-4462",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4462"
},
{
"name": "CVE-2010-0847",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0847"
},
{
"name": "CVE-2010-3566",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3566"
},
{
"name": "CVE-2010-3560",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3560"
},
{
"name": "CVE-2009-3872",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3872"
},
{
"name": "CVE-2011-0786",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0786"
},
{
"name": "CVE-2009-3555",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3555"
},
{
"name": "CVE-2011-3544",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3544"
},
{
"name": "CVE-2010-3570",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3570"
},
{
"name": "CVE-2012-0506",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0506"
},
{
"name": "CVE-2011-0802",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0802"
},
{
"name": "CVE-2012-0503",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0503"
},
{
"name": "CVE-2010-0843",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0843"
},
{
"name": "CVE-2010-3563",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3563"
},
{
"name": "CVE-2010-3555",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3555"
},
{
"name": "CVE-2010-3556",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3556"
},
{
"name": "CVE-2010-0839",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0839"
},
{
"name": "CVE-2010-0849",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0849"
},
{
"name": "CVE-2011-3561",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3561"
},
{
"name": "CVE-2010-4471",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4471"
},
{
"name": "CVE-2010-4454",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4454"
},
{
"name": "CVE-2011-3551",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3551"
},
{
"name": "CVE-2010-0093",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0093"
},
{
"name": "CVE-2010-3569",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3569"
},
{
"name": "CVE-2010-0848",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0848"
},
{
"name": "CVE-2009-3876",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3876"
},
{
"name": "CVE-2011-3521",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3521"
},
{
"name": "CVE-2011-0862",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0862"
},
{
"name": "CVE-2010-4472",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4472"
},
{
"name": "CVE-2009-3875",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3875"
},
{
"name": "CVE-2011-3563",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3563"
},
{
"name": "CVE-2010-4463",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4463"
},
{
"name": "CVE-2011-3553",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3553"
},
{
"name": "CVE-2010-3562",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3562"
},
{
"name": "CVE-2009-3869",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3869"
},
{
"name": "CVE-2011-0865",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0865"
},
{
"name": "CVE-2010-0092",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0092"
},
{
"name": "CVE-2010-3568",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3568"
},
{
"name": "CVE-2010-3548",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3548"
},
{
"name": "CVE-2010-0085",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0085"
},
{
"name": "CVE-2010-0095",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0095"
},
{
"name": "CVE-2011-0815",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0815"
},
{
"name": "CVE-2011-0817",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0817"
},
{
"name": "CVE-2011-0863",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0863"
},
{
"name": "CVE-2010-3561",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3561"
},
{
"name": "CVE-2010-0091",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0091"
},
{
"name": "CVE-2010-4469",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4469"
},
{
"name": "CVE-2009-3873",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3873"
},
{
"name": "CVE-2012-0497",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0497"
},
{
"name": "CVE-2011-0873",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0873"
},
{
"name": "CVE-2011-3516",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3516"
},
{
"name": "CVE-2011-0814",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0814"
},
{
"name": "CVE-2010-4475",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4475"
},
{
"name": "CVE-2010-3567",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3567"
},
{
"name": "CVE-2011-0788",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0788"
},
{
"name": "CVE-2010-3550",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3550"
},
{
"name": "CVE-2011-0869",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0869"
},
{
"name": "CVE-2012-0501",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0501"
},
{
"name": "CVE-2012-0504",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0504"
},
{
"name": "CVE-2010-0084",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0084"
},
{
"name": "CVE-2010-4466",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4466"
},
{
"name": "CVE-2011-3557",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3557"
},
{
"name": "CVE-2010-0887",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0887"
},
{
"name": "CVE-2011-0867",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0867"
},
{
"name": "CVE-2011-3549",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3549"
},
{
"name": "CVE-2010-3557",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3557"
},
{
"name": "CVE-2009-3874",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3874"
},
{
"name": "CVE-2010-3565",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3565"
},
{
"name": "CVE-2010-0088",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0088"
},
{
"name": "CVE-2010-0842",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0842"
},
{
"name": "CVE-2009-3868",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3868"
},
{
"name": "CVE-2010-3574",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3574"
},
{
"name": "CVE-2011-3547",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3547"
},
{
"name": "CVE-2010-0837",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0837"
},
{
"name": "CVE-2010-4474",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4474"
},
{
"name": "CVE-2011-3550",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3550"
},
{
"name": "CVE-2009-3865",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3865"
},
{
"name": "CVE-2011-5035",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-5035"
},
{
"name": "CVE-2010-3551",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3551"
},
{
"name": "CVE-2010-3554",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3554"
},
{
"name": "CVE-2010-0094",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0094"
},
{
"name": "CVE-2012-0508",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0508"
},
{
"name": "CVE-2010-0082",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0082"
},
{
"name": "CVE-2012-0498",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0498"
},
{
"name": "CVE-2010-0087",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0087"
},
{
"name": "CVE-2011-0872",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0872"
},
{
"name": "CVE-2011-3546",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3546"
},
{
"name": "CVE-2011-3389",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3389"
},
{
"name": "CVE-2009-3866",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3866"
},
{
"name": "CVE-2010-3553",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3553"
},
{
"name": "CVE-2010-0838",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0838"
},
{
"name": "CVE-2010-0850",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0850"
}
],
"initial_release_date": "2012-07-18T00:00:00",
"last_revision_date": "2012-07-18T00:00:00",
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 HP c03358587 du 16 juillet 2012 :",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03358587"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 HP c03405642 du 16 juillet 2012 :",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03405642"
}
],
"reference": "CERTA-2012-AVI-395",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2012-07-18T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "Plusieurs vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan class=\"textit\"\u003eHP\nNetwork Node Manager i\u003c/span\u003e. Elles permettent \u00e0 un utilisateur\nmalintentionn\u00e9 de provoquer un d\u00e9ni de service \u00e0 distance et de porter\natteinte \u00e0 l\u0027int\u00e9grit\u00e9 et \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Vuln\u00e9rabilit\u00e9s dans HP Network Node Manager i",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletins de s\u00e9curit\u00e9 HP c03358587 et c03405642 du 16 juillet 2012",
"url": null
}
]
}
CERTA-2010-AVI-317
Vulnerability from certfr_avis - Published: 2010-07-16 - Updated: 2010-07-16
De nombreuses vulnérabilités dans des produits HP Insight ont été corrigées, dont certaines permettant l'exécution de code arbitraire à distance.
Description
Plusieurs vulnérabilités dans des produits HP Insight ont été corrigées. Elles sont de natures différentes pouvant aller jusqu'à l'exécution de code arbitraire à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| N/A | N/A | HP Insight Manager 4.x, 5.X et 6.x ; | ||
| N/A | N/A | HP Insight Orchestration 6.x ; | ||
| N/A | N/A | HP Insight Control Suite For Linux(ICE-Linux) 2.x et 6.x. | ||
| N/A | N/A | HP Insight Software Integrated Installer 6.x ; | ||
| N/A | N/A | HP Virtual Connect Enterprise Manager 6.x ; | ||
| N/A | N/A | HP Insight Control 6.x ; |
| Title | Publication Time | Tags | |
|---|---|---|---|
|
|
|||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "HP Insight Manager 4.x, 5.X et 6.x ;",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "HP Insight Orchestration 6.x ;",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "HP Insight Control Suite For Linux(ICE-Linux) 2.x et 6.x.",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "HP Insight Software Integrated Installer 6.x ;",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "HP Virtual Connect Enterprise Manager 6.x ;",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "HP Insight Control 6.x ;",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\nPlusieurs vuln\u00e9rabilit\u00e9s dans des produits HP Insight ont \u00e9t\u00e9 corrig\u00e9es.\nElles sont de natures diff\u00e9rentes pouvant aller jusqu\u0027\u00e0 l\u0027ex\u00e9cution de\ncode arbitraire \u00e0 distance.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2009-3793",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3793"
},
{
"name": "CVE-2010-2167",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2167"
},
{
"name": "CVE-2010-2173",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2173"
},
{
"name": "CVE-2010-1129",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1129"
},
{
"name": "CVE-2010-2163",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2163"
},
{
"name": "CVE-2009-1524",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1524"
},
{
"name": "CVE-2010-0090",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0090"
},
{
"name": "CVE-2010-0840",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0840"
},
{
"name": "CVE-2010-0846",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0846"
},
{
"name": "CVE-2010-2170",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2170"
},
{
"name": "CVE-2008-5110",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5110"
},
{
"name": "CVE-2010-0844",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0844"
},
{
"name": "CVE-2010-0841",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0841"
},
{
"name": "CVE-2010-0845",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0845"
},
{
"name": "CVE-2010-2176",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2176"
},
{
"name": "CVE-2009-0692",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0692"
},
{
"name": "CVE-2010-1967",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1967"
},
{
"name": "CVE-2010-0089",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0089"
},
{
"name": "CVE-2010-0847",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0847"
},
{
"name": "CVE-2009-3555",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3555"
},
{
"name": "CVE-2010-2162",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2162"
},
{
"name": "CVE-2010-1968",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1968"
},
{
"name": "CVE-2010-2172",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2172"
},
{
"name": "CVE-2010-2181",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2181"
},
{
"name": "CVE-2010-1969",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1969"
},
{
"name": "CVE-2010-0843",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0843"
},
{
"name": "CVE-2010-2160",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2160"
},
{
"name": "CVE-2010-0839",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0839"
},
{
"name": "CVE-2010-0849",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0849"
},
{
"name": "CVE-2010-2179",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2179"
},
{
"name": "CVE-2010-0093",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0093"
},
{
"name": "CVE-2010-0848",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0848"
},
{
"name": "CVE-2010-2165",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2165"
},
{
"name": "CVE-2010-2171",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2171"
},
{
"name": "CVE-2010-0092",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0092"
},
{
"name": "CVE-2010-2182",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2182"
},
{
"name": "CVE-2010-1971",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1971"
},
{
"name": "CVE-2007-5497",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5497"
},
{
"name": "CVE-2010-0085",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0085"
},
{
"name": "CVE-2010-0095",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0095"
},
{
"name": "CVE-2010-2175",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2175"
},
{
"name": "CVE-2010-2180",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2180"
},
{
"name": "CVE-2010-1970",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1970"
},
{
"name": "CVE-2008-4546",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-4546"
},
{
"name": "CVE-2010-1297",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1297"
},
{
"name": "CVE-2010-0091",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0091"
},
{
"name": "CVE-2010-2187",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2187"
},
{
"name": "CVE-2010-2164",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2164"
},
{
"name": "CVE-2010-1965",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1965"
},
{
"name": "CVE-2010-2161",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2161"
},
{
"name": "CVE-2010-0084",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0084"
},
{
"name": "CVE-2010-2178",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2178"
},
{
"name": "CVE-2010-2177",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2177"
},
{
"name": "CVE-2010-2166",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2166"
},
{
"name": "CVE-2010-2184",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2184"
},
{
"name": "CVE-2010-0088",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0088"
},
{
"name": "CVE-2010-0842",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0842"
},
{
"name": "CVE-2010-0837",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0837"
},
{
"name": "CVE-2010-2189",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2189"
},
{
"name": "CVE-2010-2174",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2174"
},
{
"name": "CVE-2010-2169",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2169"
},
{
"name": "CVE-2010-2188",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2188"
},
{
"name": "CVE-2010-2185",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2185"
},
{
"name": "CVE-2010-0094",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0094"
},
{
"name": "CVE-2010-0082",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0082"
},
{
"name": "CVE-2010-0087",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0087"
},
{
"name": "CVE-2007-2452",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-2452"
},
{
"name": "CVE-2010-2186",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2186"
},
{
"name": "CVE-2009-1523",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1523"
},
{
"name": "CVE-2010-2183",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2183"
},
{
"name": "CVE-2010-0838",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0838"
},
{
"name": "CVE-2010-0850",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0850"
},
{
"name": "CVE-2010-0001",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0001"
},
{
"name": "CVE-2010-1966",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1966"
}
],
"initial_release_date": "2010-07-16T00:00:00",
"last_revision_date": "2010-07-16T00:00:00",
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 HP HPSBMA02550 du 13 juillet 2010 :",
"url": "http://itrc.hp.com/service/cki/docDisplay.do?docId=HPSBMA02550"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 HP HPSBMA02551 du 13 juillet 2010 :",
"url": "http://itrc.hp.com/service/cki/docDisplay.do?docId=HPSBMA02551"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 HP HPSBMA02554 du 13 juillet 2010 :",
"url": "http://itrc.hp.com/service/cki/docDisplay.do?docId=HPSBMA02554"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 HP HPSBMA02548 du 13 juillet 2010 :",
"url": "http://itrc.hp.com/service/cki/docDisplay.do?docId=HPSBMA02548"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 HP HPSBMA02549 du 13 juillet 2010 :",
"url": "http://itrc.hp.com/service/cki/docDisplay.do?docId=HPSBMA02549"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 HP HPSBMA02547 du 13 juillet 2010 :",
"url": "http://itrc.hp.com/service/cki/docDisplay.do?docId=HPSBMA02547"
}
],
"reference": "CERTA-2010-AVI-317",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2010-07-16T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Injection de code indirecte \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De nombreuses vuln\u00e9rabilit\u00e9s dans des produits HP Insight ont \u00e9t\u00e9\ncorrig\u00e9es, dont certaines permettant l\u0027ex\u00e9cution de code arbitraire \u00e0\ndistance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans HP Insight",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletins de s\u00e9curit\u00e9 HP Insight",
"url": null
}
]
}
CERTA-2010-AVI-152
Vulnerability from certfr_avis - Published: 2010-04-01 - Updated: 2010-04-01
Plusieurs vulnérabilités découvertes dans Oracle Java peuvent être exploitées par un utilisateur malintentionné afin de compromettre le système ou d'entraver son bon fonctionnement.
Description
De multiples vulnérabilités ont été découvertes dans Oracle Java :
- une erreur dans le code de la classe HeadspaceSoundbank peut provoquer un débordement de mémoire par le biais d'un fichier Soundbank spécialement conçu ;
- une erreur dans le traitement des images peut provoquer un débordement de mémoire par le biais d'une applet Java spécialement conçue ;
- plusieurs autres vulnérabilités non précisées sont présentes dans les composants Oracle Java.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Oracle | N/A | Java for Business, JDK/JRE 6 Update 18 et antérieures pour Windows, Solaris, et Linux ; | ||
| Oracle | N/A | Java for Business, SDK/JRE 1.4.2_25 et antérieures pour Windows, Solaris, et Linux. | ||
| Oracle | Java SE | Java SE, JDK/JRE 6 Update 18 et antérieures pour Windows, Solaris, et Linux ; | ||
| Oracle | Java SE | Java SE, SDK 1.4.2_25 et antérieures pour Solaris ; | ||
| Oracle | N/A | Java for Business, JDK/JRE 5.0 Update 23 et antérieures pour Windows, Solaris, et Linux ; | ||
| Oracle | Java SE | Java SE, JDK 5.0 Update 23 et antérieures pour Solaris ; |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Java for Business, JDK/JRE 6 Update 18 et ant\u00e9rieures pour Windows, Solaris, et Linux ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Java for Business, SDK/JRE 1.4.2_25 et ant\u00e9rieures pour Windows, Solaris, et Linux.",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Java SE, JDK/JRE 6 Update 18 et ant\u00e9rieures pour Windows, Solaris, et Linux ;",
"product": {
"name": "Java SE",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Java SE, SDK 1.4.2_25 et ant\u00e9rieures pour Solaris ;",
"product": {
"name": "Java SE",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Java for Business, JDK/JRE 5.0 Update 23 et ant\u00e9rieures pour Windows, Solaris, et Linux ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Java SE, JDK 5.0 Update 23 et ant\u00e9rieures pour Solaris ;",
"product": {
"name": "Java SE",
"vendor": {
"name": "Oracle",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\nDe multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Oracle Java :\n\n- une erreur dans le code de la classe HeadspaceSoundbank peut\n provoquer un d\u00e9bordement de m\u00e9moire par le biais d\u0027un fichier\n Soundbank sp\u00e9cialement con\u00e7u ;\n- une erreur dans le traitement des images peut provoquer un\n d\u00e9bordement de m\u00e9moire par le biais d\u0027une applet Java sp\u00e9cialement\n con\u00e7ue ;\n- plusieurs autres vuln\u00e9rabilit\u00e9s non pr\u00e9cis\u00e9es sont pr\u00e9sentes dans\n les composants Oracle Java.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2010-0090",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0090"
},
{
"name": "CVE-2010-0840",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0840"
},
{
"name": "CVE-2010-0846",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0846"
},
{
"name": "CVE-2010-0844",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0844"
},
{
"name": "CVE-2010-0841",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0841"
},
{
"name": "CVE-2010-0845",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0845"
},
{
"name": "CVE-2010-0089",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0089"
},
{
"name": "CVE-2010-0847",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0847"
},
{
"name": "CVE-2009-3335",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3335"
},
{
"name": "CVE-2010-0843",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0843"
},
{
"name": "CVE-2010-0839",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0839"
},
{
"name": "CVE-2010-0849",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0849"
},
{
"name": "CVE-2010-0093",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0093"
},
{
"name": "CVE-2010-0848",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0848"
},
{
"name": "CVE-2010-0092",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0092"
},
{
"name": "CVE-2010-0085",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0085"
},
{
"name": "CVE-2010-0095",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0095"
},
{
"name": "CVE-2010-0091",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0091"
},
{
"name": "CVE-2010-0084",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0084"
},
{
"name": "CVE-2010-0088",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0088"
},
{
"name": "CVE-2010-0842",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0842"
},
{
"name": "CVE-2010-0837",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0837"
},
{
"name": "CVE-2010-0094",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0094"
},
{
"name": "CVE-2010-0082",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0082"
},
{
"name": "CVE-2010-0087",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0087"
},
{
"name": "CVE-2010-0838",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0838"
},
{
"name": "CVE-2010-0850",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0850"
}
],
"initial_release_date": "2010-04-01T00:00:00",
"last_revision_date": "2010-04-01T00:00:00",
"links": [],
"reference": "CERTA-2010-AVI-152",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2010-04-01T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "Plusieurs vuln\u00e9rabilit\u00e9s d\u00e9couvertes dans Oracle Java peuvent \u00eatre\nexploit\u00e9es par un utilisateur malintentionn\u00e9 afin de compromettre le\nsyst\u00e8me ou d\u0027entraver son bon fonctionnement.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Oracle Java",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Oracle Java de mars 2010",
"url": "http://www.oracle.com/technology/deploy/security/critical-patch-updates/javacpumar2010.html"
}
]
}
FKIE_CVE-2010-0850
Vulnerability from fkie_nvd - Published: 2010-04-01 16:30 - Updated: 2025-04-11 00:51| Vendor | Product | Version | |
|---|---|---|---|
| sun | jdk | * | |
| sun | jdk | 1.3.0 | |
| sun | jdk | 1.3.0_01 | |
| sun | jdk | 1.3.0_02 | |
| sun | jdk | 1.3.0_03 | |
| sun | jdk | 1.3.0_04 | |
| sun | jdk | 1.3.0_05 | |
| sun | jdk | 1.3.1 | |
| sun | jdk | 1.3.1_01 | |
| sun | jdk | 1.3.1_01a | |
| sun | jdk | 1.3.1_02 | |
| sun | jdk | 1.3.1_03 | |
| sun | jdk | 1.3.1_04 | |
| sun | jdk | 1.3.1_05 | |
| sun | jdk | 1.3.1_06 | |
| sun | jdk | 1.3.1_07 | |
| sun | jdk | 1.3.1_08 | |
| sun | jdk | 1.3.1_09 | |
| sun | jdk | 1.3.1_10 | |
| sun | jdk | 1.3.1_11 | |
| sun | jdk | 1.3.1_12 | |
| sun | jdk | 1.3.1_13 | |
| sun | jdk | 1.3.1_14 | |
| sun | jdk | 1.3.1_15 | |
| sun | jdk | 1.3.1_16 | |
| sun | jdk | 1.3.1_17 | |
| sun | jdk | 1.3.1_18 | |
| sun | jdk | 1.3.1_19 | |
| sun | jdk | 1.3.1_20 | |
| sun | jdk | 1.3.1_21 | |
| sun | jdk | 1.3.1_22 | |
| sun | jdk | 1.3.1_23 | |
| sun | jdk | 1.3.1_24 | |
| sun | jdk | 1.3.1_25 | |
| sun | jdk | 1.3.1_26 | |
| sun | jre | * | |
| sun | jre | 1.3.0 | |
| sun | jre | 1.3.0 | |
| sun | jre | 1.3.0 | |
| sun | jre | 1.3.0 | |
| sun | jre | 1.3.0 | |
| sun | jre | 1.3.0 | |
| sun | jre | 1.3.1 | |
| sun | jre | 1.3.1 | |
| sun | jre | 1.3.1 | |
| sun | jre | 1.3.1_2 | |
| sun | jre | 1.3.1_03 | |
| sun | jre | 1.3.1_04 | |
| sun | jre | 1.3.1_05 | |
| sun | jre | 1.3.1_06 | |
| sun | jre | 1.3.1_07 | |
| sun | jre | 1.3.1_08 | |
| sun | jre | 1.3.1_09 | |
| sun | jre | 1.3.1_10 | |
| sun | jre | 1.3.1_11 | |
| sun | jre | 1.3.1_12 | |
| sun | jre | 1.3.1_13 | |
| sun | jre | 1.3.1_14 | |
| sun | jre | 1.3.1_15 | |
| sun | jre | 1.3.1_16 | |
| sun | jre | 1.3.1_17 | |
| sun | jre | 1.3.1_18 | |
| sun | jre | 1.3.1_19 | |
| sun | jre | 1.3.1_20 | |
| sun | jre | 1.3.1_21 | |
| sun | jre | 1.3.1_22 | |
| sun | jre | 1.3.1_23 | |
| sun | jre | 1.3.1_24 | |
| sun | jre | 1.3.1_25 | |
| sun | jre | 1.3.1_26 | |
| sun | sdk | * | |
| sun | sdk | 1.3.0 | |
| sun | sdk | 1.3.0_01 | |
| sun | sdk | 1.3.0_02 | |
| sun | sdk | 1.3.0_03 | |
| sun | sdk | 1.3.0_04 | |
| sun | sdk | 1.3.0_05 | |
| sun | sdk | 1.3.1 | |
| sun | sdk | 1.3.1_01 | |
| sun | sdk | 1.3.1_01a | |
| sun | sdk | 1.3.1_02 | |
| sun | sdk | 1.3.1_03 | |
| sun | sdk | 1.3.1_04 | |
| sun | sdk | 1.3.1_05 | |
| sun | sdk | 1.3.1_06 | |
| sun | sdk | 1.3.1_07 | |
| sun | sdk | 1.3.1_08 | |
| sun | sdk | 1.3.1_09 | |
| sun | sdk | 1.3.1_10 | |
| sun | sdk | 1.3.1_11 | |
| sun | sdk | 1.3.1_12 | |
| sun | sdk | 1.3.1_13 | |
| sun | sdk | 1.3.1_14 | |
| sun | sdk | 1.3.1_15 | |
| sun | sdk | 1.3.1_16 | |
| sun | sdk | 1.3.1_17 | |
| sun | sdk | 1.3.1_18 | |
| sun | sdk | 1.3.1_19 | |
| sun | sdk | 1.3.1_20 | |
| sun | sdk | 1.3.1_21 | |
| sun | sdk | 1.3.1_22 | |
| sun | sdk | 1.3.1_23 | |
| sun | sdk | 1.3.1_24 | |
| sun | sdk | 1.3.1_25 | |
| sun | sdk | 1.3.1_26 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:sun:jdk:*:*:*:*:*:*:*:*",
"matchCriteriaId": "034402A4-7EF1-44BF-92DA-EE7DB4B130D1",
"versionEndIncluding": "1.3.1_27",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jdk:1.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1AA4DE59-4CF5-49F4-8625-0F3DA2DB7020",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jdk:1.3.0_01:*:*:*:*:*:*:*",
"matchCriteriaId": "4BC733B9-1694-44E3-BF58-34BABBA4E08B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jdk:1.3.0_02:*:*:*:*:*:*:*",
"matchCriteriaId": "991AEC76-0494-4085-9427-52D8BDD75753",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jdk:1.3.0_03:*:*:*:*:*:*:*",
"matchCriteriaId": "12763342-3D3A-4744-941D-4DFD33F79515",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jdk:1.3.0_04:*:*:*:*:*:*:*",
"matchCriteriaId": "D3E28D80-D908-4F17-BF3D-62C970A4D54B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jdk:1.3.0_05:*:*:*:*:*:*:*",
"matchCriteriaId": "F0D8BC0C-13B8-472D-A077-F2039A637326",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jdk:1.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "15AAA894-90A8-4B08-A392-5CB36ABE6F54",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jdk:1.3.1_01:*:*:*:*:*:*:*",
"matchCriteriaId": "C09F9315-CE9E-4F20-9E8A-597896057A1B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jdk:1.3.1_01a:*:*:*:*:*:*:*",
"matchCriteriaId": "88DB55B2-7D7F-4EB8-8E29-7D15F735A286",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jdk:1.3.1_02:*:*:*:*:*:*:*",
"matchCriteriaId": "38CDFAD5-389F-4F08-AF24-5D8782E86225",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jdk:1.3.1_03:*:*:*:*:*:*:*",
"matchCriteriaId": "EE962961-9E1D-4164-A11A-0CA6DC4FFBAA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jdk:1.3.1_04:*:*:*:*:*:*:*",
"matchCriteriaId": "6E8244F8-C212-420B-BB12-F58B84B64335",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jdk:1.3.1_05:*:*:*:*:*:*:*",
"matchCriteriaId": "1E7BB67D-0D40-4C92-8005-C1F876629304",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jdk:1.3.1_06:*:*:*:*:*:*:*",
"matchCriteriaId": "926B3423-5AB8-4A7C-A83E-5C363A783AF7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jdk:1.3.1_07:*:*:*:*:*:*:*",
"matchCriteriaId": "8F623253-2FF5-4398-AF23-A56F06008301",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jdk:1.3.1_08:*:*:*:*:*:*:*",
"matchCriteriaId": "A4EE7212-2AF1-4D10-826B-3B6EDDDA6DDE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jdk:1.3.1_09:*:*:*:*:*:*:*",
"matchCriteriaId": "9B5A02FE-614B-4B8C-AB9A-57F5C32B36A5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jdk:1.3.1_10:*:*:*:*:*:*:*",
"matchCriteriaId": "4E781B3C-EA57-4CA6-9F03-117C52552AEF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jdk:1.3.1_11:*:*:*:*:*:*:*",
"matchCriteriaId": "1227F19E-5A69-422F-A2E1-5280B1836C94",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jdk:1.3.1_12:*:*:*:*:*:*:*",
"matchCriteriaId": "18FE8DE3-A93A-4884-9131-84715C776545",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jdk:1.3.1_13:*:*:*:*:*:*:*",
"matchCriteriaId": "BA3D41B2-05C4-4EB5-9124-FFC887A010F3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jdk:1.3.1_14:*:*:*:*:*:*:*",
"matchCriteriaId": "95E09BF6-A2E4-49F3-9E8C-3C7EB5FE782B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jdk:1.3.1_15:*:*:*:*:*:*:*",
"matchCriteriaId": "BB23A52B-0F6E-4570-9B72-0D07CF26D536",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jdk:1.3.1_16:*:*:*:*:*:*:*",
"matchCriteriaId": "B0E1566F-1257-428F-8DA9-29DB0DF5D647",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jdk:1.3.1_17:*:*:*:*:*:*:*",
"matchCriteriaId": "A84080AF-E076-40FD-BDEB-727AAE986AA0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jdk:1.3.1_18:*:*:*:*:*:*:*",
"matchCriteriaId": "6FD02135-C3C2-4FCC-A85C-353CD321B97A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jdk:1.3.1_19:*:*:*:*:*:*:*",
"matchCriteriaId": "10ACCA84-F469-401B-A68F-0281E5C2D46E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jdk:1.3.1_20:*:*:*:*:*:*:*",
"matchCriteriaId": "03B1DA4B-CE36-4828-B10F-8A854CCB368E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jdk:1.3.1_21:*:*:*:*:*:*:*",
"matchCriteriaId": "55B201EA-49A8-407A-9893-B3988C936D13",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jdk:1.3.1_22:*:*:*:*:*:*:*",
"matchCriteriaId": "DD65ECF9-5495-4F69-B566-C1657473F08B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jdk:1.3.1_23:*:*:*:*:*:*:*",
"matchCriteriaId": "671EF738-7846-40A0-B070-649F637782F6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jdk:1.3.1_24:*:*:*:*:*:*:*",
"matchCriteriaId": "7714D90D-1BF0-4388-B086-17C6D1BC9D66",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jdk:1.3.1_25:*:*:*:*:*:*:*",
"matchCriteriaId": "D54C9BE0-9009-41F6-B07F-855358EE5141",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jdk:1.3.1_26:*:*:*:*:*:*:*",
"matchCriteriaId": "9C144EF3-5228-4338-921E-547902CC6F1B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:sun:jre:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5EA3756D-A1D8-47AE-9773-26A56E2D38C5",
"versionEndIncluding": "1.3.1_27",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jre:1.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "AAB87D43-2860-43DD-94EE-886D7D75A351",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jre:1.3.0:update1:*:*:*:*:*:*",
"matchCriteriaId": "7F30BCF2-E6A3-49E9-98BC-7948244C8FF7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jre:1.3.0:update2:*:*:*:*:*:*",
"matchCriteriaId": "8966374E-426B-42A7-9D62-9A9A14032390",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jre:1.3.0:update3:*:*:*:*:*:*",
"matchCriteriaId": "634F8387-DFBE-4B78-9063-65737160F13A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jre:1.3.0:update4:*:*:*:*:*:*",
"matchCriteriaId": "923FA413-0F4E-4373-83F9-80DC9CA57D15",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jre:1.3.0:update5:*:*:*:*:*:*",
"matchCriteriaId": "A06743B3-2637-47C2-BD1A-28D9F584ED75",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jre:1.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "399B06AC-E101-48EE-A362-D75F7072FF5E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jre:1.3.1:update1:*:*:*:*:*:*",
"matchCriteriaId": "F7F1CF2B-F0B6-45DD-88E1-C0BDF2B973BB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jre:1.3.1:update2:*:*:*:*:*:*",
"matchCriteriaId": "9B374EB2-85DC-4539-9050-F1E99BA7B2F6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jre:1.3.1_2:*:*:*:*:*:*:*",
"matchCriteriaId": "0875E34D-8544-49B9-BAD9-8191CC103A07",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jre:1.3.1_03:*:*:*:*:*:*:*",
"matchCriteriaId": "62E772B9-8E41-476F-81F5-87B41F1827A1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jre:1.3.1_04:*:*:*:*:*:*:*",
"matchCriteriaId": "7CE78463-2CE8-43C6-BB06-AA40C72B1A4F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jre:1.3.1_05:*:*:*:*:*:*:*",
"matchCriteriaId": "31A04480-92DF-49AD-9B36-7F1FCB29DE90",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jre:1.3.1_06:*:*:*:*:*:*:*",
"matchCriteriaId": "E2FD0B72-683D-4FF6-BCF5-5DE85BF3064B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jre:1.3.1_07:*:*:*:*:*:*:*",
"matchCriteriaId": "F78CD4B5-4B1D-4128-8AEA-2F967C38C6C4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jre:1.3.1_08:*:*:*:*:*:*:*",
"matchCriteriaId": "62CAA3E7-9D65-48F3-ACF7-9D705D94DE54",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jre:1.3.1_09:*:*:*:*:*:*:*",
"matchCriteriaId": "477C310B-50AD-4D40-8EDB-4A80F0BF321D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jre:1.3.1_10:*:*:*:*:*:*:*",
"matchCriteriaId": "60A1F526-6B28-47A3-8D2C-06CA067E9164",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jre:1.3.1_11:*:*:*:*:*:*:*",
"matchCriteriaId": "17F09D9E-B04B-477E-86E6-E1B1F9650973",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jre:1.3.1_12:*:*:*:*:*:*:*",
"matchCriteriaId": "6F929C59-9602-4962-95B4-4165D66E5935",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jre:1.3.1_13:*:*:*:*:*:*:*",
"matchCriteriaId": "E8B76949-9282-44D0-8075-74E482CE9A82",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jre:1.3.1_14:*:*:*:*:*:*:*",
"matchCriteriaId": "B9B072DD-FC4F-4E07-9837-0E16017CA4AB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jre:1.3.1_15:*:*:*:*:*:*:*",
"matchCriteriaId": "969BE4EC-4D13-4B74-8137-FA0F83F0FDC3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jre:1.3.1_16:*:*:*:*:*:*:*",
"matchCriteriaId": "86408019-1B53-4AA8-9F05-47EBD0466EE2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jre:1.3.1_17:*:*:*:*:*:*:*",
"matchCriteriaId": "81F47561-F59C-4904-8E05-D8A9629405A8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jre:1.3.1_18:*:*:*:*:*:*:*",
"matchCriteriaId": "FB067445-8EA5-460F-B625-C21251E5A8D1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jre:1.3.1_19:*:*:*:*:*:*:*",
"matchCriteriaId": "B4C075BC-607E-47A1-A32D-B912D2FA03BB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jre:1.3.1_20:*:*:*:*:*:*:*",
"matchCriteriaId": "007175B8-48DB-46BE-B971-FB57B6A33723",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jre:1.3.1_21:*:*:*:*:*:*:*",
"matchCriteriaId": "D5E6F92A-FC59-4CE7-B7F8-94CBF3DC8F21",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jre:1.3.1_22:*:*:*:*:*:*:*",
"matchCriteriaId": "496901D5-014D-4920-A343-91A56F6FEFA0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jre:1.3.1_23:*:*:*:*:*:*:*",
"matchCriteriaId": "B2D18FBC-4C9B-4722-90AB-028D281654F4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jre:1.3.1_24:*:*:*:*:*:*:*",
"matchCriteriaId": "853BC114-592C-43FE-B227-EF41C494DC98",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jre:1.3.1_25:*:*:*:*:*:*:*",
"matchCriteriaId": "B1F4E031-CE92-48C4-BECC-7C1190DB477A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jre:1.3.1_26:*:*:*:*:*:*:*",
"matchCriteriaId": "CE89CF12-7E4D-4EF3-8831-9FBC9211C18C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:sun:sdk:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7FA69EFB-DC0D-4F7C-8AF8-546EEE0CE55C",
"versionEndIncluding": "1.3.1_27",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:sdk:1.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "6718104E-82B3-4160-9968-4980C309EC8B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:sdk:1.3.0_01:*:*:*:*:*:*:*",
"matchCriteriaId": "A1406B61-0BC7-4547-8D0F-562DEE3E55A3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:sdk:1.3.0_02:*:*:*:*:*:*:*",
"matchCriteriaId": "BE423757-A0B5-43CF-A134-80F951DD9ECE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:sdk:1.3.0_03:*:*:*:*:*:*:*",
"matchCriteriaId": "88A29EE6-22D9-47FE-9C95-CBA57FF90E0B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:sdk:1.3.0_04:*:*:*:*:*:*:*",
"matchCriteriaId": "5FAEFB1C-FBAB-4D3A-A020-F217177D305B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:sdk:1.3.0_05:*:*:*:*:*:*:*",
"matchCriteriaId": "807D8661-DA23-4CBB-A001-F6D93E155604",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:sdk:1.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "167D85F7-0D94-49CC-8A5E-F5FAB00ADFBC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:sdk:1.3.1_01:*:*:*:*:*:*:*",
"matchCriteriaId": "34710306-D6CF-4D07-84BF-71A8839BE416",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:sdk:1.3.1_01a:*:*:*:*:*:*:*",
"matchCriteriaId": "44B93DC8-6375-4B41-B9BC-F22F592C56B9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:sdk:1.3.1_02:*:*:*:*:*:*:*",
"matchCriteriaId": "87BF46A9-8E4A-4583-B35F-052FD481DF66",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:sdk:1.3.1_03:*:*:*:*:*:*:*",
"matchCriteriaId": "32B351BB-6CA6-4CEF-9F5D-ED47774FC676",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:sdk:1.3.1_04:*:*:*:*:*:*:*",
"matchCriteriaId": "CDA40FCD-1D34-4C47-908F-697433236153",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:sdk:1.3.1_05:*:*:*:*:*:*:*",
"matchCriteriaId": "00639A84-BD03-4BD9-A655-F806693DBC8B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:sdk:1.3.1_06:*:*:*:*:*:*:*",
"matchCriteriaId": "14824B23-FF9F-4D6D-9D02-12B79BE346A0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:sdk:1.3.1_07:*:*:*:*:*:*:*",
"matchCriteriaId": "6493744C-A69D-4377-937E-85E7F5535EA9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:sdk:1.3.1_08:*:*:*:*:*:*:*",
"matchCriteriaId": "C09019B1-B873-41CE-951E-4777F324729C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:sdk:1.3.1_09:*:*:*:*:*:*:*",
"matchCriteriaId": "EC4209A0-E73F-4B5A-9925-B5D20F879455",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:sdk:1.3.1_10:*:*:*:*:*:*:*",
"matchCriteriaId": "297DF5AD-FC22-432B-AE6A-2B1E6CFE1BE4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:sdk:1.3.1_11:*:*:*:*:*:*:*",
"matchCriteriaId": "BFB8516D-03C4-478D-AFE2-824867FDC739",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:sdk:1.3.1_12:*:*:*:*:*:*:*",
"matchCriteriaId": "F82AED17-FEC3-47D0-A395-26ACD07FBE52",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:sdk:1.3.1_13:*:*:*:*:*:*:*",
"matchCriteriaId": "9630BC7B-9039-4FA6-86F8-5274783F3EB1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:sdk:1.3.1_14:*:*:*:*:*:*:*",
"matchCriteriaId": "F1A6A15C-216A-42B1-84EF-B3D9A313D4A2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:sdk:1.3.1_15:*:*:*:*:*:*:*",
"matchCriteriaId": "EC39C819-9439-4029-8377-F6D58B3DFDFB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:sdk:1.3.1_16:*:*:*:*:*:*:*",
"matchCriteriaId": "A053DEF6-1317-4DA8-91D7-E1970DA62351",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:sdk:1.3.1_17:*:*:*:*:*:*:*",
"matchCriteriaId": "F0DBFDD8-40AE-44F2-8F02-FB7A4FAE5235",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:sdk:1.3.1_18:*:*:*:*:*:*:*",
"matchCriteriaId": "EB0605FF-3DDC-4F3A-8171-F3A447E9C292",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:sdk:1.3.1_19:*:*:*:*:*:*:*",
"matchCriteriaId": "801FF3B4-0729-4710-BFC2-4B078029944F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:sdk:1.3.1_20:*:*:*:*:*:*:*",
"matchCriteriaId": "8EB8591E-3D6E-489B-B0D6-CEBB9D09EA68",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:sdk:1.3.1_21:*:*:*:*:*:*:*",
"matchCriteriaId": "8A411676-6666-4B54-A008-443B9B42F670",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:sdk:1.3.1_22:*:*:*:*:*:*:*",
"matchCriteriaId": "0AEDC9B2-8AA6-4DA2-A187-49A1DD106725",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:sdk:1.3.1_23:*:*:*:*:*:*:*",
"matchCriteriaId": "8F69BEE4-CB4B-436A-9838-13239B368CF3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:sdk:1.3.1_24:*:*:*:*:*:*:*",
"matchCriteriaId": "11AC1050-38AF-49F4-A40C-AAF9710204AB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:sdk:1.3.1_25:*:*:*:*:*:*:*",
"matchCriteriaId": "8FA939E8-8747-4532-B6B4-6E83824C7067",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:sdk:1.3.1_26:*:*:*:*:*:*:*",
"matchCriteriaId": "8714FA4A-6D0B-4D13-93EE-8A7674DF2736",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Unspecified vulnerability in the Java 2D component in Oracle Java SE and Java for Business 1.3.1_27 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors."
},
{
"lang": "es",
"value": "Vulnerabilidad no especificada en el componente Java 2D en Oracle Java SE y Java for Business 1.3.1_27 permite a atacantes remotos afectar la confidencialidad, integridad y disponibilidad mediante vectores no desconocidos."
}
],
"id": "CVE-2010-0850",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2010-04-01T16:30:01.203",
"references": [
{
"source": "secalert_us@oracle.com",
"url": "http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751"
},
{
"source": "secalert_us@oracle.com",
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00001.html"
},
{
"source": "secalert_us@oracle.com",
"url": "http://marc.info/?l=bugtraq\u0026m=134254866602253\u0026w=2"
},
{
"source": "secalert_us@oracle.com",
"url": "http://secunia.com/advisories/39317"
},
{
"source": "secalert_us@oracle.com",
"url": "http://secunia.com/advisories/40545"
},
{
"source": "secalert_us@oracle.com",
"url": "http://secunia.com/advisories/43308"
},
{
"source": "secalert_us@oracle.com",
"url": "http://www.oracle.com/technetwork/topics/security/javacpumar2010-083341.html"
},
{
"source": "secalert_us@oracle.com",
"url": "http://www.securityfocus.com/archive/1/516397/100/0/threaded"
},
{
"source": "secalert_us@oracle.com",
"url": "http://www.vmware.com/security/advisories/VMSA-2011-0003.html"
},
{
"source": "secalert_us@oracle.com",
"url": "http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html"
},
{
"source": "secalert_us@oracle.com",
"url": "http://www.vupen.com/english/advisories/2010/1793"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00001.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://marc.info/?l=bugtraq\u0026m=134254866602253\u0026w=2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/39317"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/40545"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/43308"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.oracle.com/technetwork/topics/security/javacpumar2010-083341.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/archive/1/516397/100/0/threaded"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vmware.com/security/advisories/VMSA-2011-0003.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2010/1793"
}
],
"sourceIdentifier": "secalert_us@oracle.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GSD-2010-0850
Vulnerability from gsd - Updated: 2023-12-13 01:21{
"GSD": {
"alias": "CVE-2010-0850",
"description": "Unspecified vulnerability in the Java 2D component in Oracle Java SE and Java for Business 1.3.1_27 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.",
"id": "GSD-2010-0850",
"references": [
"https://www.suse.com/security/cve/CVE-2010-0850.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2010-0850"
],
"details": "Unspecified vulnerability in the Java 2D component in Oracle Java SE and Java for Business 1.3.1_27 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.",
"id": "GSD-2010-0850",
"modified": "2023-12-13T01:21:29.396624Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2010-0850",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Unspecified vulnerability in the Java 2D component in Oracle Java SE and Java for Business 1.3.1_27 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "HPSBMU02799",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=134254866602253\u0026w=2"
},
{
"name": "39317",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/39317"
},
{
"name": "40545",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/40545"
},
{
"name": "ADV-2010-1793",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/1793"
},
{
"name": "43308",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/43308"
},
{
"name": "SSRT100179",
"refsource": "HP",
"url": "http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/javacpumar2010-083341.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/javacpumar2010-083341.html"
},
{
"name": "http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html",
"refsource": "CONFIRM",
"url": "http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html"
},
{
"name": "SUSE-SR:2010:008",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00001.html"
},
{
"name": "http://www.vmware.com/security/advisories/VMSA-2011-0003.html",
"refsource": "CONFIRM",
"url": "http://www.vmware.com/security/advisories/VMSA-2011-0003.html"
},
{
"name": "HPSBMA02547",
"refsource": "HP",
"url": "http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751"
},
{
"name": "20110211 VMSA-2011-0003 Third party component updates for VMware vCenter Server, vCenter Update Manager, ESXi and ESX",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/516397/100/0/threaded"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:sun:jdk:1.3.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jdk:1.3.1_01:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jdk:1.3.1_07:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jdk:1.3.1_08:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jdk:1.3.1_16:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jdk:1.3.1_17:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jdk:1.3.1_24:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jdk:1.3.1_25:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jdk:1.3.0_04:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jdk:1.3.0_05:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jdk:1.3.1_05:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jdk:1.3.1_06:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jdk:1.3.1_15:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jdk:1.3.1_14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jdk:1.3.1_22:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jdk:1.3.1_23:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jdk:1.3.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jdk:1.3.0_01:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jdk:1.3.1_01a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jdk:1.3.1_02:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jdk:1.3.1_09:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jdk:1.3.1_10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jdk:1.3.1_18:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jdk:1.3.1_19:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jdk:1.3.1_26:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jdk:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.3.1_27",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jdk:1.3.0_02:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jdk:1.3.0_03:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jdk:1.3.1_03:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jdk:1.3.1_04:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jdk:1.3.1_11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jdk:1.3.1_12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jdk:1.3.1_13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jdk:1.3.1_20:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jdk:1.3.1_21:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:sun:jre:1.3.0:update3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jre:1.3.0:update4:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jre:1.3.1_06:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jre:1.3.1_07:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jre:1.3.1_14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jre:1.3.1_15:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jre:1.3.1_21:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jre:1.3.1_22:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jre:1.3.0:update1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jre:1.3.0:update2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jre:1.3.1_04:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jre:1.3.1_05:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jre:1.3.1_12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jre:1.3.1_13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jre:1.3.1_2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jre:1.3.1_20:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jre:1.3.0:update5:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jre:1.3.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jre:1.3.1_08:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jre:1.3.1_09:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jre:1.3.1_16:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jre:1.3.1_17:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jre:1.3.1_23:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jre:1.3.1_24:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jre:1.3.1_25:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jre:1.3.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jre:1.3.1:update1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jre:1.3.1:update2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jre:1.3.1_03:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jre:1.3.1_10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jre:1.3.1_11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jre:1.3.1_18:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jre:1.3.1_19:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jre:1.3.1_26:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jre:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.3.1_27",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:sun:sdk:1.3.0_01:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:sdk:1.3.0_02:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:sdk:1.3.1_02:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:sdk:1.3.1_03:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:sdk:1.3.1_10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:sdk:1.3.1_11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:sdk:1.3.1_12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:sdk:1.3.1_19:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:sdk:1.3.1_20:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:sdk:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.3.1_27",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:sdk:1.3.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:sdk:1.3.1_01:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:sdk:1.3.1_01a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:sdk:1.3.1_08:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:sdk:1.3.1_09:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:sdk:1.3.1_17:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:sdk:1.3.1_18:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:sdk:1.3.1_25:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:sdk:1.3.1_26:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:sdk:1.3.0_03:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:sdk:1.3.0_04:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:sdk:1.3.1_04:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:sdk:1.3.1_05:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:sdk:1.3.1_13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:sdk:1.3.1_14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:sdk:1.3.1_21:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:sdk:1.3.1_22:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:sdk:1.3.0_05:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:sdk:1.3.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:sdk:1.3.1_06:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:sdk:1.3.1_07:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:sdk:1.3.1_15:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:sdk:1.3.1_16:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:sdk:1.3.1_23:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:sdk:1.3.1_24:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2010-0850"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "Unspecified vulnerability in the Java 2D component in Oracle Java SE and Java for Business 1.3.1_27 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "SUSE-SR:2010:008",
"refsource": "SUSE",
"tags": [],
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00001.html"
},
{
"name": "39317",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/39317"
},
{
"name": "40545",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/40545"
},
{
"name": "SSRT100179",
"refsource": "HP",
"tags": [],
"url": "http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751"
},
{
"name": "ADV-2010-1793",
"refsource": "VUPEN",
"tags": [],
"url": "http://www.vupen.com/english/advisories/2010/1793"
},
{
"name": "43308",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/43308"
},
{
"name": "http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html",
"refsource": "CONFIRM",
"tags": [],
"url": "http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html"
},
{
"name": "http://www.vmware.com/security/advisories/VMSA-2011-0003.html",
"refsource": "CONFIRM",
"tags": [],
"url": "http://www.vmware.com/security/advisories/VMSA-2011-0003.html"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/javacpumar2010-083341.html",
"refsource": "CONFIRM",
"tags": [],
"url": "http://www.oracle.com/technetwork/topics/security/javacpumar2010-083341.html"
},
{
"name": "HPSBMU02799",
"refsource": "HP",
"tags": [],
"url": "http://marc.info/?l=bugtraq\u0026m=134254866602253\u0026w=2"
},
{
"name": "20110211 VMSA-2011-0003 Third party component updates for VMware vCenter Server, vCenter Update Manager, ESXi and ESX",
"refsource": "BUGTRAQ",
"tags": [],
"url": "http://www.securityfocus.com/archive/1/516397/100/0/threaded"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": false
}
},
"lastModifiedDate": "2018-10-10T19:55Z",
"publishedDate": "2010-04-01T16:30Z"
}
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.