fkie_cve-2010-0850
Vulnerability from fkie_nvd
Published
2010-04-01 16:30
Modified
2024-11-21 01:13
Severity ?
Summary
Unspecified vulnerability in the Java 2D component in Oracle Java SE and Java for Business 1.3.1_27 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
sun | jdk | * | |
sun | jdk | 1.3.0 | |
sun | jdk | 1.3.0_01 | |
sun | jdk | 1.3.0_02 | |
sun | jdk | 1.3.0_03 | |
sun | jdk | 1.3.0_04 | |
sun | jdk | 1.3.0_05 | |
sun | jdk | 1.3.1 | |
sun | jdk | 1.3.1_01 | |
sun | jdk | 1.3.1_01a | |
sun | jdk | 1.3.1_02 | |
sun | jdk | 1.3.1_03 | |
sun | jdk | 1.3.1_04 | |
sun | jdk | 1.3.1_05 | |
sun | jdk | 1.3.1_06 | |
sun | jdk | 1.3.1_07 | |
sun | jdk | 1.3.1_08 | |
sun | jdk | 1.3.1_09 | |
sun | jdk | 1.3.1_10 | |
sun | jdk | 1.3.1_11 | |
sun | jdk | 1.3.1_12 | |
sun | jdk | 1.3.1_13 | |
sun | jdk | 1.3.1_14 | |
sun | jdk | 1.3.1_15 | |
sun | jdk | 1.3.1_16 | |
sun | jdk | 1.3.1_17 | |
sun | jdk | 1.3.1_18 | |
sun | jdk | 1.3.1_19 | |
sun | jdk | 1.3.1_20 | |
sun | jdk | 1.3.1_21 | |
sun | jdk | 1.3.1_22 | |
sun | jdk | 1.3.1_23 | |
sun | jdk | 1.3.1_24 | |
sun | jdk | 1.3.1_25 | |
sun | jdk | 1.3.1_26 | |
sun | jre | * | |
sun | jre | 1.3.0 | |
sun | jre | 1.3.0 | |
sun | jre | 1.3.0 | |
sun | jre | 1.3.0 | |
sun | jre | 1.3.0 | |
sun | jre | 1.3.0 | |
sun | jre | 1.3.1 | |
sun | jre | 1.3.1 | |
sun | jre | 1.3.1 | |
sun | jre | 1.3.1_2 | |
sun | jre | 1.3.1_03 | |
sun | jre | 1.3.1_04 | |
sun | jre | 1.3.1_05 | |
sun | jre | 1.3.1_06 | |
sun | jre | 1.3.1_07 | |
sun | jre | 1.3.1_08 | |
sun | jre | 1.3.1_09 | |
sun | jre | 1.3.1_10 | |
sun | jre | 1.3.1_11 | |
sun | jre | 1.3.1_12 | |
sun | jre | 1.3.1_13 | |
sun | jre | 1.3.1_14 | |
sun | jre | 1.3.1_15 | |
sun | jre | 1.3.1_16 | |
sun | jre | 1.3.1_17 | |
sun | jre | 1.3.1_18 | |
sun | jre | 1.3.1_19 | |
sun | jre | 1.3.1_20 | |
sun | jre | 1.3.1_21 | |
sun | jre | 1.3.1_22 | |
sun | jre | 1.3.1_23 | |
sun | jre | 1.3.1_24 | |
sun | jre | 1.3.1_25 | |
sun | jre | 1.3.1_26 | |
sun | sdk | * | |
sun | sdk | 1.3.0 | |
sun | sdk | 1.3.0_01 | |
sun | sdk | 1.3.0_02 | |
sun | sdk | 1.3.0_03 | |
sun | sdk | 1.3.0_04 | |
sun | sdk | 1.3.0_05 | |
sun | sdk | 1.3.1 | |
sun | sdk | 1.3.1_01 | |
sun | sdk | 1.3.1_01a | |
sun | sdk | 1.3.1_02 | |
sun | sdk | 1.3.1_03 | |
sun | sdk | 1.3.1_04 | |
sun | sdk | 1.3.1_05 | |
sun | sdk | 1.3.1_06 | |
sun | sdk | 1.3.1_07 | |
sun | sdk | 1.3.1_08 | |
sun | sdk | 1.3.1_09 | |
sun | sdk | 1.3.1_10 | |
sun | sdk | 1.3.1_11 | |
sun | sdk | 1.3.1_12 | |
sun | sdk | 1.3.1_13 | |
sun | sdk | 1.3.1_14 | |
sun | sdk | 1.3.1_15 | |
sun | sdk | 1.3.1_16 | |
sun | sdk | 1.3.1_17 | |
sun | sdk | 1.3.1_18 | |
sun | sdk | 1.3.1_19 | |
sun | sdk | 1.3.1_20 | |
sun | sdk | 1.3.1_21 | |
sun | sdk | 1.3.1_22 | |
sun | sdk | 1.3.1_23 | |
sun | sdk | 1.3.1_24 | |
sun | sdk | 1.3.1_25 | |
sun | sdk | 1.3.1_26 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sun:jdk:*:*:*:*:*:*:*:*", "matchCriteriaId": "034402A4-7EF1-44BF-92DA-EE7DB4B130D1", "versionEndIncluding": "1.3.1_27", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "1AA4DE59-4CF5-49F4-8625-0F3DA2DB7020", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.3.0_01:*:*:*:*:*:*:*", "matchCriteriaId": "4BC733B9-1694-44E3-BF58-34BABBA4E08B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.3.0_02:*:*:*:*:*:*:*", "matchCriteriaId": "991AEC76-0494-4085-9427-52D8BDD75753", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.3.0_03:*:*:*:*:*:*:*", "matchCriteriaId": "12763342-3D3A-4744-941D-4DFD33F79515", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.3.0_04:*:*:*:*:*:*:*", "matchCriteriaId": "D3E28D80-D908-4F17-BF3D-62C970A4D54B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.3.0_05:*:*:*:*:*:*:*", "matchCriteriaId": "F0D8BC0C-13B8-472D-A077-F2039A637326", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "15AAA894-90A8-4B08-A392-5CB36ABE6F54", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.3.1_01:*:*:*:*:*:*:*", "matchCriteriaId": "C09F9315-CE9E-4F20-9E8A-597896057A1B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.3.1_01a:*:*:*:*:*:*:*", "matchCriteriaId": "88DB55B2-7D7F-4EB8-8E29-7D15F735A286", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.3.1_02:*:*:*:*:*:*:*", "matchCriteriaId": "38CDFAD5-389F-4F08-AF24-5D8782E86225", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.3.1_03:*:*:*:*:*:*:*", "matchCriteriaId": "EE962961-9E1D-4164-A11A-0CA6DC4FFBAA", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.3.1_04:*:*:*:*:*:*:*", "matchCriteriaId": "6E8244F8-C212-420B-BB12-F58B84B64335", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.3.1_05:*:*:*:*:*:*:*", "matchCriteriaId": "1E7BB67D-0D40-4C92-8005-C1F876629304", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.3.1_06:*:*:*:*:*:*:*", "matchCriteriaId": "926B3423-5AB8-4A7C-A83E-5C363A783AF7", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.3.1_07:*:*:*:*:*:*:*", "matchCriteriaId": "8F623253-2FF5-4398-AF23-A56F06008301", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.3.1_08:*:*:*:*:*:*:*", "matchCriteriaId": "A4EE7212-2AF1-4D10-826B-3B6EDDDA6DDE", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.3.1_09:*:*:*:*:*:*:*", "matchCriteriaId": "9B5A02FE-614B-4B8C-AB9A-57F5C32B36A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.3.1_10:*:*:*:*:*:*:*", "matchCriteriaId": "4E781B3C-EA57-4CA6-9F03-117C52552AEF", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.3.1_11:*:*:*:*:*:*:*", "matchCriteriaId": "1227F19E-5A69-422F-A2E1-5280B1836C94", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.3.1_12:*:*:*:*:*:*:*", "matchCriteriaId": "18FE8DE3-A93A-4884-9131-84715C776545", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.3.1_13:*:*:*:*:*:*:*", "matchCriteriaId": "BA3D41B2-05C4-4EB5-9124-FFC887A010F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.3.1_14:*:*:*:*:*:*:*", "matchCriteriaId": "95E09BF6-A2E4-49F3-9E8C-3C7EB5FE782B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.3.1_15:*:*:*:*:*:*:*", "matchCriteriaId": "BB23A52B-0F6E-4570-9B72-0D07CF26D536", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.3.1_16:*:*:*:*:*:*:*", "matchCriteriaId": "B0E1566F-1257-428F-8DA9-29DB0DF5D647", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.3.1_17:*:*:*:*:*:*:*", "matchCriteriaId": "A84080AF-E076-40FD-BDEB-727AAE986AA0", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.3.1_18:*:*:*:*:*:*:*", "matchCriteriaId": "6FD02135-C3C2-4FCC-A85C-353CD321B97A", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.3.1_19:*:*:*:*:*:*:*", "matchCriteriaId": "10ACCA84-F469-401B-A68F-0281E5C2D46E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.3.1_20:*:*:*:*:*:*:*", "matchCriteriaId": "03B1DA4B-CE36-4828-B10F-8A854CCB368E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.3.1_21:*:*:*:*:*:*:*", "matchCriteriaId": "55B201EA-49A8-407A-9893-B3988C936D13", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.3.1_22:*:*:*:*:*:*:*", "matchCriteriaId": "DD65ECF9-5495-4F69-B566-C1657473F08B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.3.1_23:*:*:*:*:*:*:*", "matchCriteriaId": "671EF738-7846-40A0-B070-649F637782F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.3.1_24:*:*:*:*:*:*:*", "matchCriteriaId": "7714D90D-1BF0-4388-B086-17C6D1BC9D66", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.3.1_25:*:*:*:*:*:*:*", "matchCriteriaId": "D54C9BE0-9009-41F6-B07F-855358EE5141", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.3.1_26:*:*:*:*:*:*:*", "matchCriteriaId": "9C144EF3-5228-4338-921E-547902CC6F1B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sun:jre:*:*:*:*:*:*:*:*", "matchCriteriaId": "5EA3756D-A1D8-47AE-9773-26A56E2D38C5", "versionEndIncluding": "1.3.1_27", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "AAB87D43-2860-43DD-94EE-886D7D75A351", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.0:update1:*:*:*:*:*:*", "matchCriteriaId": "7F30BCF2-E6A3-49E9-98BC-7948244C8FF7", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.0:update2:*:*:*:*:*:*", "matchCriteriaId": "8966374E-426B-42A7-9D62-9A9A14032390", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.0:update3:*:*:*:*:*:*", "matchCriteriaId": "634F8387-DFBE-4B78-9063-65737160F13A", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.0:update4:*:*:*:*:*:*", "matchCriteriaId": "923FA413-0F4E-4373-83F9-80DC9CA57D15", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.0:update5:*:*:*:*:*:*", "matchCriteriaId": "A06743B3-2637-47C2-BD1A-28D9F584ED75", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "399B06AC-E101-48EE-A362-D75F7072FF5E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1:update1:*:*:*:*:*:*", "matchCriteriaId": "F7F1CF2B-F0B6-45DD-88E1-C0BDF2B973BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1:update2:*:*:*:*:*:*", "matchCriteriaId": "9B374EB2-85DC-4539-9050-F1E99BA7B2F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_2:*:*:*:*:*:*:*", "matchCriteriaId": "0875E34D-8544-49B9-BAD9-8191CC103A07", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_03:*:*:*:*:*:*:*", "matchCriteriaId": "62E772B9-8E41-476F-81F5-87B41F1827A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_04:*:*:*:*:*:*:*", "matchCriteriaId": "7CE78463-2CE8-43C6-BB06-AA40C72B1A4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_05:*:*:*:*:*:*:*", "matchCriteriaId": "31A04480-92DF-49AD-9B36-7F1FCB29DE90", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_06:*:*:*:*:*:*:*", "matchCriteriaId": "E2FD0B72-683D-4FF6-BCF5-5DE85BF3064B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_07:*:*:*:*:*:*:*", "matchCriteriaId": "F78CD4B5-4B1D-4128-8AEA-2F967C38C6C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_08:*:*:*:*:*:*:*", "matchCriteriaId": "62CAA3E7-9D65-48F3-ACF7-9D705D94DE54", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_09:*:*:*:*:*:*:*", "matchCriteriaId": "477C310B-50AD-4D40-8EDB-4A80F0BF321D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_10:*:*:*:*:*:*:*", "matchCriteriaId": "60A1F526-6B28-47A3-8D2C-06CA067E9164", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_11:*:*:*:*:*:*:*", "matchCriteriaId": "17F09D9E-B04B-477E-86E6-E1B1F9650973", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_12:*:*:*:*:*:*:*", "matchCriteriaId": "6F929C59-9602-4962-95B4-4165D66E5935", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_13:*:*:*:*:*:*:*", "matchCriteriaId": "E8B76949-9282-44D0-8075-74E482CE9A82", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_14:*:*:*:*:*:*:*", "matchCriteriaId": "B9B072DD-FC4F-4E07-9837-0E16017CA4AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_15:*:*:*:*:*:*:*", "matchCriteriaId": "969BE4EC-4D13-4B74-8137-FA0F83F0FDC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_16:*:*:*:*:*:*:*", "matchCriteriaId": "86408019-1B53-4AA8-9F05-47EBD0466EE2", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_17:*:*:*:*:*:*:*", "matchCriteriaId": "81F47561-F59C-4904-8E05-D8A9629405A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_18:*:*:*:*:*:*:*", "matchCriteriaId": "FB067445-8EA5-460F-B625-C21251E5A8D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_19:*:*:*:*:*:*:*", "matchCriteriaId": "B4C075BC-607E-47A1-A32D-B912D2FA03BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_20:*:*:*:*:*:*:*", "matchCriteriaId": "007175B8-48DB-46BE-B971-FB57B6A33723", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_21:*:*:*:*:*:*:*", "matchCriteriaId": "D5E6F92A-FC59-4CE7-B7F8-94CBF3DC8F21", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_22:*:*:*:*:*:*:*", "matchCriteriaId": "496901D5-014D-4920-A343-91A56F6FEFA0", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_23:*:*:*:*:*:*:*", "matchCriteriaId": "B2D18FBC-4C9B-4722-90AB-028D281654F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_24:*:*:*:*:*:*:*", "matchCriteriaId": "853BC114-592C-43FE-B227-EF41C494DC98", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_25:*:*:*:*:*:*:*", "matchCriteriaId": "B1F4E031-CE92-48C4-BECC-7C1190DB477A", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1_26:*:*:*:*:*:*:*", "matchCriteriaId": "CE89CF12-7E4D-4EF3-8831-9FBC9211C18C", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sun:sdk:*:*:*:*:*:*:*:*", "matchCriteriaId": "7FA69EFB-DC0D-4F7C-8AF8-546EEE0CE55C", "versionEndIncluding": "1.3.1_27", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "6718104E-82B3-4160-9968-4980C309EC8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.0_01:*:*:*:*:*:*:*", "matchCriteriaId": "A1406B61-0BC7-4547-8D0F-562DEE3E55A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.0_02:*:*:*:*:*:*:*", "matchCriteriaId": "BE423757-A0B5-43CF-A134-80F951DD9ECE", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.0_03:*:*:*:*:*:*:*", "matchCriteriaId": "88A29EE6-22D9-47FE-9C95-CBA57FF90E0B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.0_04:*:*:*:*:*:*:*", "matchCriteriaId": "5FAEFB1C-FBAB-4D3A-A020-F217177D305B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.0_05:*:*:*:*:*:*:*", "matchCriteriaId": "807D8661-DA23-4CBB-A001-F6D93E155604", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "167D85F7-0D94-49CC-8A5E-F5FAB00ADFBC", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_01:*:*:*:*:*:*:*", "matchCriteriaId": "34710306-D6CF-4D07-84BF-71A8839BE416", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_01a:*:*:*:*:*:*:*", "matchCriteriaId": "44B93DC8-6375-4B41-B9BC-F22F592C56B9", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_02:*:*:*:*:*:*:*", "matchCriteriaId": "87BF46A9-8E4A-4583-B35F-052FD481DF66", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_03:*:*:*:*:*:*:*", "matchCriteriaId": "32B351BB-6CA6-4CEF-9F5D-ED47774FC676", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_04:*:*:*:*:*:*:*", "matchCriteriaId": "CDA40FCD-1D34-4C47-908F-697433236153", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_05:*:*:*:*:*:*:*", "matchCriteriaId": "00639A84-BD03-4BD9-A655-F806693DBC8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_06:*:*:*:*:*:*:*", "matchCriteriaId": "14824B23-FF9F-4D6D-9D02-12B79BE346A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_07:*:*:*:*:*:*:*", "matchCriteriaId": "6493744C-A69D-4377-937E-85E7F5535EA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_08:*:*:*:*:*:*:*", "matchCriteriaId": "C09019B1-B873-41CE-951E-4777F324729C", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_09:*:*:*:*:*:*:*", "matchCriteriaId": "EC4209A0-E73F-4B5A-9925-B5D20F879455", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_10:*:*:*:*:*:*:*", "matchCriteriaId": "297DF5AD-FC22-432B-AE6A-2B1E6CFE1BE4", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_11:*:*:*:*:*:*:*", "matchCriteriaId": "BFB8516D-03C4-478D-AFE2-824867FDC739", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_12:*:*:*:*:*:*:*", "matchCriteriaId": "F82AED17-FEC3-47D0-A395-26ACD07FBE52", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_13:*:*:*:*:*:*:*", "matchCriteriaId": "9630BC7B-9039-4FA6-86F8-5274783F3EB1", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_14:*:*:*:*:*:*:*", "matchCriteriaId": "F1A6A15C-216A-42B1-84EF-B3D9A313D4A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_15:*:*:*:*:*:*:*", "matchCriteriaId": "EC39C819-9439-4029-8377-F6D58B3DFDFB", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_16:*:*:*:*:*:*:*", "matchCriteriaId": "A053DEF6-1317-4DA8-91D7-E1970DA62351", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_17:*:*:*:*:*:*:*", "matchCriteriaId": "F0DBFDD8-40AE-44F2-8F02-FB7A4FAE5235", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_18:*:*:*:*:*:*:*", "matchCriteriaId": "EB0605FF-3DDC-4F3A-8171-F3A447E9C292", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_19:*:*:*:*:*:*:*", "matchCriteriaId": "801FF3B4-0729-4710-BFC2-4B078029944F", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_20:*:*:*:*:*:*:*", "matchCriteriaId": "8EB8591E-3D6E-489B-B0D6-CEBB9D09EA68", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_21:*:*:*:*:*:*:*", "matchCriteriaId": "8A411676-6666-4B54-A008-443B9B42F670", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_22:*:*:*:*:*:*:*", "matchCriteriaId": "0AEDC9B2-8AA6-4DA2-A187-49A1DD106725", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_23:*:*:*:*:*:*:*", "matchCriteriaId": "8F69BEE4-CB4B-436A-9838-13239B368CF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_24:*:*:*:*:*:*:*", "matchCriteriaId": "11AC1050-38AF-49F4-A40C-AAF9710204AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_25:*:*:*:*:*:*:*", "matchCriteriaId": "8FA939E8-8747-4532-B6B4-6E83824C7067", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_26:*:*:*:*:*:*:*", "matchCriteriaId": "8714FA4A-6D0B-4D13-93EE-8A7674DF2736", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in the Java 2D component in Oracle Java SE and Java for Business 1.3.1_27 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors." }, { "lang": "es", "value": "Vulnerabilidad no especificada en el componente Java 2D en Oracle Java SE y Java for Business 1.3.1_27 permite a atacantes remotos afectar la confidencialidad, integridad y disponibilidad mediante vectores no desconocidos." } ], "id": "CVE-2010-0850", "lastModified": "2024-11-21T01:13:05.547", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2010-04-01T16:30:01.203", "references": [ { "source": "secalert_us@oracle.com", "url": "http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751" }, { "source": "secalert_us@oracle.com", "url": "http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751" }, { "source": "secalert_us@oracle.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00001.html" }, { "source": "secalert_us@oracle.com", "url": "http://marc.info/?l=bugtraq\u0026m=134254866602253\u0026w=2" }, { "source": "secalert_us@oracle.com", "url": "http://secunia.com/advisories/39317" }, { "source": "secalert_us@oracle.com", "url": "http://secunia.com/advisories/40545" }, { "source": "secalert_us@oracle.com", "url": "http://secunia.com/advisories/43308" }, { "source": "secalert_us@oracle.com", "url": "http://www.oracle.com/technetwork/topics/security/javacpumar2010-083341.html" }, { "source": "secalert_us@oracle.com", "url": "http://www.securityfocus.com/archive/1/516397/100/0/threaded" }, { "source": "secalert_us@oracle.com", "url": "http://www.vmware.com/security/advisories/VMSA-2011-0003.html" }, { "source": "secalert_us@oracle.com", "url": "http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html" }, { "source": "secalert_us@oracle.com", "url": "http://www.vupen.com/english/advisories/2010/1793" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00001.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=134254866602253\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/39317" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/40545" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/43308" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.oracle.com/technetwork/topics/security/javacpumar2010-083341.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/516397/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vmware.com/security/advisories/VMSA-2011-0003.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2010/1793" } ], "sourceIdentifier": "secalert_us@oracle.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.