CVE-2010-0840

Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE and Java for Business 6 Update 18, 5.0 Update 23, and 1.4.2_25 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the March 2010 CPU. Oracle has not commented on claims from a reliable researcher that this is related to improper checks when executing privileged methods in the Java Runtime Environment (JRE), which allows attackers to execute arbitrary code via (1) an untrusted object that extends the trusted class but has not modified a certain method, or (2) "a similar trust issue with interfaces," aka "Trusted Methods Chaining Remote Code Execution Vulnerability."
References
Link Resource
http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751 Broken Link
http://lists.apple.com/archives/security-announce/2010//May/msg00001.html Mailing List Third Party Advisory
http://lists.apple.com/archives/security-announce/2010//May/msg00002.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00001.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=127557596201693&w=2 Mailing List
http://marc.info/?l=bugtraq&m=134254866602253&w=2 Mailing List
http://secunia.com/advisories/39292 Broken Link Vendor Advisory
http://secunia.com/advisories/39317 Broken Link Vendor Advisory
http://secunia.com/advisories/39659 Broken Link Vendor Advisory
http://secunia.com/advisories/39819 Broken Link Vendor Advisory
http://secunia.com/advisories/40211 Broken Link Vendor Advisory
http://secunia.com/advisories/40545 Broken Link Vendor Advisory
http://secunia.com/advisories/43308 Broken Link Vendor Advisory
http://support.apple.com/kb/HT4170 Release Notes Third Party Advisory
http://support.apple.com/kb/HT4171 Release Notes Third Party Advisory
http://ubuntu.com/usn/usn-923-1 Third Party Advisory
http://www.mandriva.com/security/advisories?name=MDVSA-2010:084 Broken Link
http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html Patch Third Party Advisory
http://www.oracle.com/technetwork/topics/security/javacpumar2010-083341.html Patch Third Party Advisory
http://www.redhat.com/support/errata/RHSA-2010-0337.html Broken Link
http://www.redhat.com/support/errata/RHSA-2010-0338.html Broken Link
http://www.redhat.com/support/errata/RHSA-2010-0339.html Broken Link
http://www.redhat.com/support/errata/RHSA-2010-0383.html Broken Link
http://www.redhat.com/support/errata/RHSA-2010-0471.html Broken Link
http://www.redhat.com/support/errata/RHSA-2010-0489.html Broken Link
http://www.securityfocus.com/archive/1/510528/100/0/threaded Broken Link Third Party Advisory VDB Entry
http://www.securityfocus.com/archive/1/516397/100/0/threaded Broken Link Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/39065 Broken Link Third Party Advisory VDB Entry
http://www.vmware.com/security/advisories/VMSA-2011-0003.html Third Party Advisory
http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html Release Notes
http://www.vupen.com/english/advisories/2010/1107 Broken Link
http://www.vupen.com/english/advisories/2010/1191 Broken Link Vendor Advisory
http://www.vupen.com/english/advisories/2010/1454 Broken Link Vendor Advisory
http://www.vupen.com/english/advisories/2010/1523 Broken Link Vendor Advisory
http://www.vupen.com/english/advisories/2010/1793 Broken Link Vendor Advisory
http://www.zerodayinitiative.com/advisories/ZDI-10-056 Third Party Advisory VDB Entry
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13971 Broken Link
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9974 Broken Link
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:oracle:jre:1.4.2_25:*:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.5.0:update23:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.6.0:update18:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*

History

28 Jun 2024, 17:36

Type Values Removed Values Added
References () http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751 - () http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751 - Broken Link
References () http://lists.apple.com/archives/security-announce/2010//May/msg00001.html - () http://lists.apple.com/archives/security-announce/2010//May/msg00001.html - Mailing List, Third Party Advisory
References () http://lists.apple.com/archives/security-announce/2010//May/msg00002.html - () http://lists.apple.com/archives/security-announce/2010//May/msg00002.html - Mailing List, Third Party Advisory
References () http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00001.html - () http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00001.html - Mailing List, Third Party Advisory
References () http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html - () http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html - Mailing List, Third Party Advisory
References () http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html - () http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html - Mailing List, Third Party Advisory
References () http://marc.info/?l=bugtraq&m=127557596201693&w=2 - () http://marc.info/?l=bugtraq&m=127557596201693&w=2 - Mailing List
References () http://marc.info/?l=bugtraq&m=134254866602253&w=2 - () http://marc.info/?l=bugtraq&m=134254866602253&w=2 - Mailing List
References () http://secunia.com/advisories/39292 - Vendor Advisory () http://secunia.com/advisories/39292 - Broken Link, Vendor Advisory
References () http://secunia.com/advisories/39317 - Vendor Advisory () http://secunia.com/advisories/39317 - Broken Link, Vendor Advisory
References () http://secunia.com/advisories/39659 - Vendor Advisory () http://secunia.com/advisories/39659 - Broken Link, Vendor Advisory
References () http://secunia.com/advisories/39819 - Vendor Advisory () http://secunia.com/advisories/39819 - Broken Link, Vendor Advisory
References () http://secunia.com/advisories/40211 - Vendor Advisory () http://secunia.com/advisories/40211 - Broken Link, Vendor Advisory
References () http://secunia.com/advisories/40545 - Vendor Advisory () http://secunia.com/advisories/40545 - Broken Link, Vendor Advisory
References () http://secunia.com/advisories/43308 - Vendor Advisory () http://secunia.com/advisories/43308 - Broken Link, Vendor Advisory
References () http://support.apple.com/kb/HT4170 - () http://support.apple.com/kb/HT4170 - Release Notes, Third Party Advisory
References () http://support.apple.com/kb/HT4171 - () http://support.apple.com/kb/HT4171 - Release Notes, Third Party Advisory
References () http://ubuntu.com/usn/usn-923-1 - () http://ubuntu.com/usn/usn-923-1 - Third Party Advisory
References () http://www.mandriva.com/security/advisories?name=MDVSA-2010:084 - () http://www.mandriva.com/security/advisories?name=MDVSA-2010:084 - Broken Link
References () http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html - () http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html - Patch, Third Party Advisory
References () http://www.oracle.com/technetwork/topics/security/javacpumar2010-083341.html - () http://www.oracle.com/technetwork/topics/security/javacpumar2010-083341.html - Patch, Third Party Advisory
References () http://www.redhat.com/support/errata/RHSA-2010-0337.html - () http://www.redhat.com/support/errata/RHSA-2010-0337.html - Broken Link
References () http://www.redhat.com/support/errata/RHSA-2010-0338.html - () http://www.redhat.com/support/errata/RHSA-2010-0338.html - Broken Link
References () http://www.redhat.com/support/errata/RHSA-2010-0339.html - () http://www.redhat.com/support/errata/RHSA-2010-0339.html - Broken Link
References () http://www.redhat.com/support/errata/RHSA-2010-0383.html - () http://www.redhat.com/support/errata/RHSA-2010-0383.html - Broken Link
References () http://www.redhat.com/support/errata/RHSA-2010-0471.html - () http://www.redhat.com/support/errata/RHSA-2010-0471.html - Broken Link
References () http://www.redhat.com/support/errata/RHSA-2010-0489.html - () http://www.redhat.com/support/errata/RHSA-2010-0489.html - Broken Link
References () http://www.securityfocus.com/archive/1/510528/100/0/threaded - () http://www.securityfocus.com/archive/1/510528/100/0/threaded - Broken Link, Third Party Advisory, VDB Entry
References () http://www.securityfocus.com/archive/1/516397/100/0/threaded - () http://www.securityfocus.com/archive/1/516397/100/0/threaded - Broken Link, Third Party Advisory, VDB Entry
References () http://www.securityfocus.com/bid/39065 - () http://www.securityfocus.com/bid/39065 - Broken Link, Third Party Advisory, VDB Entry
References () http://www.vmware.com/security/advisories/VMSA-2011-0003.html - () http://www.vmware.com/security/advisories/VMSA-2011-0003.html - Third Party Advisory
References () http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html - () http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html - Release Notes
References () http://www.vupen.com/english/advisories/2010/1107 - () http://www.vupen.com/english/advisories/2010/1107 - Broken Link
References () http://www.vupen.com/english/advisories/2010/1191 - Vendor Advisory () http://www.vupen.com/english/advisories/2010/1191 - Broken Link, Vendor Advisory
References () http://www.vupen.com/english/advisories/2010/1454 - Vendor Advisory () http://www.vupen.com/english/advisories/2010/1454 - Broken Link, Vendor Advisory
References () http://www.vupen.com/english/advisories/2010/1523 - Vendor Advisory () http://www.vupen.com/english/advisories/2010/1523 - Broken Link, Vendor Advisory
References () http://www.vupen.com/english/advisories/2010/1793 - Vendor Advisory () http://www.vupen.com/english/advisories/2010/1793 - Broken Link, Vendor Advisory
References () http://www.zerodayinitiative.com/advisories/ZDI-10-056 - () http://www.zerodayinitiative.com/advisories/ZDI-10-056 - Third Party Advisory, VDB Entry
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13971 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13971 - Broken Link
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9974 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9974 - Broken Link
CVSS v2 : 7.5
v3 : unknown
v2 : 7.5
v3 : 9.8
First Time Oracle
Canonical ubuntu Linux
Oracle jre
Canonical
Opensuse opensuse
Opensuse
CPE cpe:2.3:a:sun:jdk:1.5.0:update11:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update12:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.6.0:update_3:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:*:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.6.0:update_11:*:*:*:*:*:*
cpe:2.3:a:sun:sdk:1.4.2_22:*:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update12:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update7:*:*:*:*:*:*
cpe:2.3:a:sun:sdk:1.4.2_3:*:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update2:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.4.2_21:*:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update4:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.6.0:update_14:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.4.2_1:*:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update5:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.6.0:update_4:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.4.2_24:*:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.6.0:update_4:*:*:*:*:*:*
cpe:2.3:a:sun:sdk:1.4.2:*:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update8:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update6:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update21:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.4.2_14:*:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update4:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.4.2_20:*:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.4.2_19:*:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.6.0:update_10:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.6.0:update_7:*:*:*:*:*:*
cpe:2.3:a:sun:sdk:1.4.2_1:*:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:*:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.6.0:update_11:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.6.0:update_17:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.6.0:update1:*:*:*:*:*:*
cpe:2.3:a:sun:jre:*:update23:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.4.2_2:*:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update10:*:*:*:*:*:*
cpe:2.3:a:sun:sdk:1.4.2_24:*:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update9:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.6.0:update2:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update1:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.4.2_22:*:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.4.2_12:*:*:*:*:*:*:*
cpe:2.3:a:sun:sdk:1.4.2_13:*:*:*:*:*:*:*
cpe:2.3:a:sun:sdk:1.4.2_18:*:*:*:*:*:*:*
cpe:2.3:a:sun:sdk:1.4.2_02:*:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.4.2_5:*:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.4.2_13:*:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update8:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.6.0:update_6:*:*:*:*:*:*
cpe:2.3:a:sun:sdk:1.4.2_6:*:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:*:update23:*:*:*:*:*:*
cpe:2.3:a:sun:sdk:1.4.2_14:*:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.6.0:update_13:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.4.2_9:*:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update5:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update16:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.6.0:update_12:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update2:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update21:*:*:*:*:*:*
cpe:2.3:a:sun:sdk:1.4.2_9:*:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update14:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update7:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:*:update_18:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update19:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.6.0:update_5:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.6.0:update_16:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update17:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.4.2_8:*:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.4.2_15:*:*:*:*:*:*:*
cpe:2.3:a:sun:sdk:1.4.2_12:*:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.6.0:*:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.4.2_18:*:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update19:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update10:*:*:*:*:*:*
cpe:2.3:a:sun:sdk:1.4.2_11:*:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.6.0:update1_b06:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update20:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.4.2_10:*:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.6.0:update_5:*:*:*:*:*:*
cpe:2.3:a:sun:sdk:1.4.2_4:*:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.6.0:update_6:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.4.2_17:*:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.4.2_4:*:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.4.2_23:*:*:*:*:*:*:*
cpe:2.3:a:sun:sdk:1.4.2_20:*:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update18:*:*:*:*:*:*
cpe:2.3:a:sun:jre:*:update_18:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.4.2:*:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.4.2_6:*:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.6.0:update_15:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update3:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.6.0:update_17:*:*:*:*:*:*
cpe:2.3:a:sun:sdk:*:*:*:*:*:*:*:*
cpe:2.3:a:sun:sdk:1.4.2_17:*:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.6.0:update_13:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update20:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update9:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update14:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update16:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update1:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update3:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.6.0:update_2:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update13:*:*:*:*:*:*
cpe:2.3:a:sun:sdk:1.4.2_7:*:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.4.2_16:*:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.6.0:update_15:*:*:*:*:*:*
cpe:2.3:a:sun:sdk:1.4.2_19:*:*:*:*:*:*:*
cpe:2.3:a:sun:sdk:1.4.2_5:*:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.6.0:update_10:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.6.0:*:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update11:*:*:*:*:*:*
cpe:2.3:a:sun:sdk:1.4.2_21:*:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update13:*:*:*:*:*:*
cpe:2.3:a:sun:sdk:1.4.2_8:*:*:*:*:*:*:*
cpe:2.3:a:sun:jre:*:*:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update18:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update6:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update15:*:*:*:*:*:*
cpe:2.3:a:sun:sdk:1.4.2_10:*:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.6.0:update_7:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.4.2_3:*:*:*:*:*:*:*
cpe:2.3:a:sun:sdk:1.4.2_15:*:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.6.0:update_3:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.6.0:update_14:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.6.0:update_12:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.4.2_7:*:*:*:*:*:*:*
cpe:2.3:a:sun:sdk:1.4.2_16:*:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.4.2_11:*:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update15:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.6.0:update_16:*:*:*:*:*:*
cpe:2.3:a:sun:sdk:1.4.2_23:*:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update17:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.4.2_25:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.6.0:update18:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.5.0:update23:*:*:*:*:*:*

Information

Published : 2010-04-01 16:30

Updated : 2024-06-28 17:36


NVD link : CVE-2010-0840

Mitre link : CVE-2010-0840

CVE.ORG link : CVE-2010-0840


JSON object : View

Products Affected

canonical

  • ubuntu_linux

oracle

  • jre

opensuse

  • opensuse