Show plain JSON{"id": "CVE-2009-1006", "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 10.0, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "authentication": "NONE", "integrityImpact": "COMPLETE", "accessComplexity": "LOW", "availabilityImpact": "COMPLETE", "confidentialityImpact": "COMPLETE"}, "acInsufInfo": false, "impactScore": 10.0, "baseSeverity": "HIGH", "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "published": "2009-04-15T10:30:00.920", "references": [{"url": "http://www.oracle.com/technetwork/topics/security/cpuapr2009-099563.html", "source": "secalert_us@oracle.com"}, {"url": "http://www.securityfocus.com/bid/34461", "source": "secalert_us@oracle.com"}, {"url": "http://www.securitytracker.com/id?1022059", "source": "secalert_us@oracle.com"}, {"url": "http://www.us-cert.gov/cas/techalerts/TA09-105A.html", "tags": ["US Government Resource"], "source": "secalert_us@oracle.com"}, {"url": "http://www.oracle.com/technetwork/topics/security/cpuapr2009-099563.html", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/bid/34461", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securitytracker.com/id?1022059", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.us-cert.gov/cas/techalerts/TA09-105A.html", "tags": ["US Government Resource"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "NVD-CWE-noinfo"}]}], "descriptions": [{"lang": "en", "value": "Unspecified vulnerability in the JRockit component in BEA Product Suite R27.6.2 and earlier, with SDK/JRE 1.4.2, JRE/JDK 5, and JRE/JDK 6, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors."}, {"lang": "es", "value": "Vulnerabilidad no especificada en el componente JRockit de BEA Product Suite R27.6.2 y anteriores, con SDK/JRE v1.4.2, JRE/JDK v5 y JRE/JDK v6; permite a atacantes remotos comprometer la confidencialidad, integridad y disponibilidad a trav\u00e9s de vectores desconocidos."}], "lastModified": "2024-11-21T01:01:26.880", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:oracle:jrockit:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9608B08F-67D3-45CA-9F1E-22BB6C02E6D0", "versionEndIncluding": "r27.6.2"}, {"criteria": "cpe:2.3:a:oracle:jrockit:r26.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E83DA137-A2FC-4E0F-B297-7D6FEBEF5FB2"}, {"criteria": "cpe:2.3:a:oracle:jrockit:r26.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5EDC15FE-3C16-433D-9D99-2B82727BD97F"}, {"criteria": "cpe:2.3:a:oracle:jrockit:r26.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "529D146C-4975-4A15-8818-59BE62202966"}, {"criteria": "cpe:2.3:a:oracle:jrockit:r26.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CB064B5E-06B4-48BD-9492-7BBBEDAA9978"}, {"criteria": "cpe:2.3:a:oracle:jrockit:r26.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4CC2BE68-DC4E-4B0B-85FE-27877657827D"}, {"criteria": "cpe:2.3:a:oracle:jrockit:r27.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4873B9FF-0BA4-45AE-834A-C23AE80A2B48"}, {"criteria": "cpe:2.3:a:oracle:jrockit:r27.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "39274558-2ECB-43CE-BAEF-DBD3AAC1BD05"}, {"criteria": "cpe:2.3:a:oracle:jrockit:r27.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "72DA7B82-EC3B-4458-B040-6F9D1AE23DDE"}, {"criteria": "cpe:2.3:a:oracle:jrockit:r27.3.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "267F16DF-D868-4DD9-8670-01AC3CBCE716"}, {"criteria": "cpe:2.3:a:oracle:jrockit:r27.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "164B5E91-F21A-4C99-A685-7332A85AF25B"}, {"criteria": "cpe:2.3:a:oracle:jrockit:r27.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2DD7274B-EA02-49DE-9FA5-40DA26498191"}, {"criteria": "cpe:2.3:a:oracle:jrockit:r27.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "57BCE344-59AF-404B-9BC2-095562754184"}, {"criteria": "cpe:2.3:a:oracle:jrockit:r27.6.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2D2BE6F9-6DAC-47B3-A9B6-10056E1E48F9"}, {"criteria": "cpe:2.3:a:oracle:jrockit:r27.6.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "44280B48-5ECB-47B2-AE9E-0C6189B01A27"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:sun:jdk:5.0:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "D9D9B6F3-906D-4CCC-9655-99A1496B1475"}, {"criteria": "cpe:2.3:a:sun:jdk:6:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "1264A513-5AE3-4F0E-8387-1F75EBAEA241"}, {"criteria": "cpe:2.3:a:sun:jre:1.4.2:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "63978872-E797-4F13-B0F9-98CB67D0962A"}, {"criteria": "cpe:2.3:a:sun:jre:5.0:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "3241D774-D0F4-4529-A779-2F4F11813D18"}, {"criteria": "cpe:2.3:a:sun:jre:6:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "2C502FE9-F61F-4316-AA33-B09FA8BA54DF"}, {"criteria": "cpe:2.3:a:sun:sdk:1.4.2:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "002CA86D-3090-4C7A-947A-21CB5D1ADD98"}], "operator": "OR"}], "operator": "AND"}], "sourceIdentifier": "secalert_us@oracle.com"}