Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-99pg-zyzv-7fdt
Summary
Multiple vulnerabilities have been found in the Oracle JRE/JDK,
    allowing attackers to cause unspecified impact.
Aliases
0
alias CVE-2010-3552
Fixed_packages
0
url pkg:ebuild/app-emulation/emul-linux-x86-java@1.6.0.29
purl pkg:ebuild/app-emulation/emul-linux-x86-java@1.6.0.29
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/emul-linux-x86-java@1.6.0.29
1
url pkg:ebuild/dev-java/sun-jdk@1.6.0.29
purl pkg:ebuild/dev-java/sun-jdk@1.6.0.29
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/sun-jdk@1.6.0.29
2
url pkg:ebuild/dev-java/sun-jre-bin@1.6.0.29
purl pkg:ebuild/dev-java/sun-jre-bin@1.6.0.29
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/sun-jre-bin@1.6.0.29
Affected_packages
0
url pkg:rpm/redhat/java-1.6.0-sun@1:1.6.0.22-1jpp.1?arch=el4
purl pkg:rpm/redhat/java-1.6.0-sun@1:1.6.0.22-1jpp.1?arch=el4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1yyz-wmtf-n7af
1
vulnerability VCID-36qa-spf2-hugr
2
vulnerability VCID-4g9p-kms6-33fy
3
vulnerability VCID-5uvz-3ua4-63ec
4
vulnerability VCID-6573-arns-dubp
5
vulnerability VCID-6d27-47wg-v7a2
6
vulnerability VCID-6f4g-2v9h-e3d2
7
vulnerability VCID-8y28-vhbf-pkh4
8
vulnerability VCID-96cv-7mvp-kyfn
9
vulnerability VCID-99pg-zyzv-7fdt
10
vulnerability VCID-b36c-f5yd-pbc6
11
vulnerability VCID-bnn4-y7cn-7kd4
12
vulnerability VCID-bvvb-wkh7-wyhd
13
vulnerability VCID-dfrc-cgad-9bft
14
vulnerability VCID-dnjn-pxun-p7c5
15
vulnerability VCID-hff9-wv9j-ffh9
16
vulnerability VCID-jau7-gfz8-dkfa
17
vulnerability VCID-jfb1-3vg4-vbap
18
vulnerability VCID-k4uz-574m-aqd3
19
vulnerability VCID-mmrp-aqn2-nkd1
20
vulnerability VCID-mqdc-3qdf-efhs
21
vulnerability VCID-naeq-2b67-w3fs
22
vulnerability VCID-nz67-hrxz-d7g8
23
vulnerability VCID-p26v-kd5w-s3bv
24
vulnerability VCID-sn49-t5fd-u3hc
25
vulnerability VCID-u2yt-tapf-abhe
26
vulnerability VCID-vhx7-rx69-n3hz
27
vulnerability VCID-ynn9-thtp-wkbh
28
vulnerability VCID-yyav-75eb-e3av
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/java-1.6.0-sun@1:1.6.0.22-1jpp.1%3Farch=el4
1
url pkg:rpm/redhat/java-1.6.0-sun@1:1.6.0.22-1jpp.1?arch=el5
purl pkg:rpm/redhat/java-1.6.0-sun@1:1.6.0.22-1jpp.1?arch=el5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1yyz-wmtf-n7af
1
vulnerability VCID-36qa-spf2-hugr
2
vulnerability VCID-4g9p-kms6-33fy
3
vulnerability VCID-5uvz-3ua4-63ec
4
vulnerability VCID-6573-arns-dubp
5
vulnerability VCID-6d27-47wg-v7a2
6
vulnerability VCID-6f4g-2v9h-e3d2
7
vulnerability VCID-8y28-vhbf-pkh4
8
vulnerability VCID-96cv-7mvp-kyfn
9
vulnerability VCID-99pg-zyzv-7fdt
10
vulnerability VCID-b36c-f5yd-pbc6
11
vulnerability VCID-bnn4-y7cn-7kd4
12
vulnerability VCID-bvvb-wkh7-wyhd
13
vulnerability VCID-dfrc-cgad-9bft
14
vulnerability VCID-dnjn-pxun-p7c5
15
vulnerability VCID-hff9-wv9j-ffh9
16
vulnerability VCID-jau7-gfz8-dkfa
17
vulnerability VCID-jfb1-3vg4-vbap
18
vulnerability VCID-k4uz-574m-aqd3
19
vulnerability VCID-mmrp-aqn2-nkd1
20
vulnerability VCID-mqdc-3qdf-efhs
21
vulnerability VCID-naeq-2b67-w3fs
22
vulnerability VCID-nz67-hrxz-d7g8
23
vulnerability VCID-p26v-kd5w-s3bv
24
vulnerability VCID-sn49-t5fd-u3hc
25
vulnerability VCID-u2yt-tapf-abhe
26
vulnerability VCID-vhx7-rx69-n3hz
27
vulnerability VCID-ynn9-thtp-wkbh
28
vulnerability VCID-yyav-75eb-e3av
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/java-1.6.0-sun@1:1.6.0.22-1jpp.1%3Farch=el5
References
0
reference_url http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c02616748
reference_id
reference_type
scores
url http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c02616748
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html
2
reference_url http://marc.info/?l=bugtraq&m=134254866602253&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=134254866602253&w=2
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3552.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3552.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-3552
reference_id
reference_type
scores
0
value 0.82665
scoring_system epss
scoring_elements 0.99228
published_at 2026-04-01T12:55:00Z
1
value 0.82665
scoring_system epss
scoring_elements 0.9923
published_at 2026-04-02T12:55:00Z
2
value 0.82665
scoring_system epss
scoring_elements 0.99233
published_at 2026-04-04T12:55:00Z
3
value 0.82947
scoring_system epss
scoring_elements 0.99252
published_at 2026-04-13T12:55:00Z
4
value 0.82947
scoring_system epss
scoring_elements 0.99253
published_at 2026-04-16T12:55:00Z
5
value 0.82947
scoring_system epss
scoring_elements 0.9925
published_at 2026-04-07T12:55:00Z
6
value 0.82947
scoring_system epss
scoring_elements 0.99251
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-3552
5
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11829
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11829
6
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12004
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12004
7
reference_url http://support.avaya.com/css/P8/documents/100114315
reference_id
reference_type
scores
url http://support.avaya.com/css/P8/documents/100114315
8
reference_url http://support.avaya.com/css/P8/documents/100123193
reference_id
reference_type
scores
url http://support.avaya.com/css/P8/documents/100123193
9
reference_url http://www.oracle.com/technetwork/topics/security/javacpuoct2010-176258.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/javacpuoct2010-176258.html
10
reference_url http://www.redhat.com/support/errata/RHSA-2010-0770.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0770.html
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=642600
reference_id 642600
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=642600
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jdk:1.6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update1:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jdk:1.6.0:update1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update1:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_10:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jdk:1.6.0:update_10:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_10:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_11:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jdk:1.6.0:update_11:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_11:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_12:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jdk:1.6.0:update_12:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_12:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_13:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jdk:1.6.0:update_13:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_13:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_14:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jdk:1.6.0:update_14:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_14:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_15:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jdk:1.6.0:update_15:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_15:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_16:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jdk:1.6.0:update_16:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_16:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_17:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jdk:1.6.0:update_17:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_17:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_18:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jdk:1.6.0:update_18:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_18:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_19:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jdk:1.6.0:update_19:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_19:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update1_b06:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jdk:1.6.0:update1_b06:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update1_b06:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update2:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jdk:1.6.0:update2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update2:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_20:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jdk:1.6.0:update_20:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_20:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_3:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jdk:1.6.0:update_3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_3:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_4:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jdk:1.6.0:update_4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_4:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_5:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jdk:1.6.0:update_5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_5:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_6:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jdk:1.6.0:update_6:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_6:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_7:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jdk:1.6.0:update_7:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_7:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:*:update_21:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jdk:*:update_21:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:*:update_21:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jre:1.6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_10:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jre:1.6.0:update_10:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_10:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_11:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jre:1.6.0:update_11:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_11:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_12:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jre:1.6.0:update_12:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_12:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_13:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jre:1.6.0:update_13:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_13:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_14:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jre:1.6.0:update_14:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_14:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_15:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jre:1.6.0:update_15:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_15:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_16:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jre:1.6.0:update_16:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_16:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_17:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jre:1.6.0:update_17:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_17:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_18:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jre:1.6.0:update_18:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_18:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_19:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jre:1.6.0:update_19:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_19:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_2:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jre:1.6.0:update_2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_2:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_20:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jre:1.6.0:update_20:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_20:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_3:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jre:1.6.0:update_3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_3:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_4:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jre:1.6.0:update_4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_4:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_5:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jre:1.6.0:update_5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_5:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_6:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jre:1.6.0:update_6:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_6:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_7:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jre:1.6.0:update_7:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_7:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:*:update_21:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jre:*:update_21:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:*:update_21:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-3552
reference_id CVE-2010-3552
reference_type
scores
0
value 10.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2010-3552
54
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/remote/15241.txt
reference_id CVE-2010-3552;OSVDB-68873
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/remote/15241.txt
55
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/remote/16587.rb
reference_id CVE-2010-3552;OSVDB-68873
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/remote/16587.rb
56
reference_url http://www.zerodayinitiative.com/advisories/ZDI-10-206/
reference_id CVE-2010-3552;OSVDB-68873
reference_type exploit
scores
url http://www.zerodayinitiative.com/advisories/ZDI-10-206/
57
reference_url https://security.gentoo.org/glsa/201111-02
reference_id GLSA-201111-02
reference_type
scores
url https://security.gentoo.org/glsa/201111-02
Weaknesses
Exploits
0
date_added 2011-01-08
description Sun Java - Runtime New Plugin docbase Buffer Overflow (Metasploit)
required_action null
due_date null
notes null
known_ransomware_campaign_use true
source_date_published 2011-01-08
exploit_type remote
platform windows
source_date_updated 2011-03-10
data_source Exploit-DB
source_url http://www.zerodayinitiative.com/advisories/ZDI-10-206/
1
date_added null
description
This module exploits a flaw in the new plugin component of the Sun Java
          Runtime Environment before v6 Update 22. By specifying specific parameters
          to the new plugin, an attacker can cause a stack-based buffer overflow and
          execute arbitrary code.

          When the new plugin is invoked with a "launchjnlp" parameter, it will
          copy the contents of the "docbase" parameter to a stack-buffer using the
          "sprintf" function. A string of 396 bytes is enough to overflow the 256
          byte stack buffer and overwrite some local variables as well as the saved
          return address.

          NOTE: The string being copied is first passed through the "WideCharToMultiByte".
          Due to this, only characters which have a valid localized multibyte
          representation are allowed. Invalid characters will be replaced with
          question marks ('?').

          This vulnerability was originally discovered independently by both Stephen
          Fewer and Berend Jan Wever (SkyLined). Although exhaustive testing hasn't
          been done, all versions since version 6 Update 10 are believed to be affected
          by this vulnerability.

          This vulnerability was patched as part of the October 2010 Oracle Patch
          release.
required_action null
due_date null
notes
Reliability:
  - unknown-reliability
Stability:
  - unknown-stability
SideEffects:
  - unknown-side-effects
known_ransomware_campaign_use false
source_date_published 2010-10-12
exploit_type null
platform Windows
source_date_updated null
data_source Metasploit
source_url https://github.com/rapid7/metasploit-framework/tree/master/modules/exploits/windows/browser/java_docbase_bof.rb
Severity_range_score10.0 - 10.0
Exploitability2.0
Weighted_severity9.0
Risk_score10.0
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-99pg-zyzv-7fdt