Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-u2yt-tapf-abhe
Summary
Multiple vulnerabilities have been found in the Oracle JRE/JDK,
    allowing attackers to cause unspecified impact.
Aliases
0
alias CVE-2010-3563
Fixed_packages
0
url pkg:ebuild/app-emulation/emul-linux-x86-java@1.6.0.29
purl pkg:ebuild/app-emulation/emul-linux-x86-java@1.6.0.29
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/emul-linux-x86-java@1.6.0.29
1
url pkg:ebuild/dev-java/sun-jdk@1.6.0.29
purl pkg:ebuild/dev-java/sun-jdk@1.6.0.29
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/sun-jdk@1.6.0.29
2
url pkg:ebuild/dev-java/sun-jre-bin@1.6.0.29
purl pkg:ebuild/dev-java/sun-jre-bin@1.6.0.29
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/sun-jre-bin@1.6.0.29
Affected_packages
0
url pkg:rpm/redhat/java-1.6.0-ibm@1:1.6.0.9.0-1jpp.3?arch=el4
purl pkg:rpm/redhat/java-1.6.0-ibm@1:1.6.0.9.0-1jpp.3?arch=el4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1yyz-wmtf-n7af
1
vulnerability VCID-36qa-spf2-hugr
2
vulnerability VCID-4g9p-kms6-33fy
3
vulnerability VCID-5uvz-3ua4-63ec
4
vulnerability VCID-6573-arns-dubp
5
vulnerability VCID-6d27-47wg-v7a2
6
vulnerability VCID-6f4g-2v9h-e3d2
7
vulnerability VCID-8y28-vhbf-pkh4
8
vulnerability VCID-bvvb-wkh7-wyhd
9
vulnerability VCID-dfrc-cgad-9bft
10
vulnerability VCID-dnjn-pxun-p7c5
11
vulnerability VCID-hff9-wv9j-ffh9
12
vulnerability VCID-jau7-gfz8-dkfa
13
vulnerability VCID-jfb1-3vg4-vbap
14
vulnerability VCID-mmrp-aqn2-nkd1
15
vulnerability VCID-mqdc-3qdf-efhs
16
vulnerability VCID-naeq-2b67-w3fs
17
vulnerability VCID-nz67-hrxz-d7g8
18
vulnerability VCID-p26v-kd5w-s3bv
19
vulnerability VCID-sn49-t5fd-u3hc
20
vulnerability VCID-u2yt-tapf-abhe
21
vulnerability VCID-ynn9-thtp-wkbh
22
vulnerability VCID-yyav-75eb-e3av
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/java-1.6.0-ibm@1:1.6.0.9.0-1jpp.3%3Farch=el4
1
url pkg:rpm/redhat/java-1.6.0-ibm@1:1.6.0.9.0-1jpp.3?arch=el5
purl pkg:rpm/redhat/java-1.6.0-ibm@1:1.6.0.9.0-1jpp.3?arch=el5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1yyz-wmtf-n7af
1
vulnerability VCID-36qa-spf2-hugr
2
vulnerability VCID-4g9p-kms6-33fy
3
vulnerability VCID-5uvz-3ua4-63ec
4
vulnerability VCID-6573-arns-dubp
5
vulnerability VCID-6d27-47wg-v7a2
6
vulnerability VCID-6f4g-2v9h-e3d2
7
vulnerability VCID-8y28-vhbf-pkh4
8
vulnerability VCID-bvvb-wkh7-wyhd
9
vulnerability VCID-dfrc-cgad-9bft
10
vulnerability VCID-dnjn-pxun-p7c5
11
vulnerability VCID-hff9-wv9j-ffh9
12
vulnerability VCID-jau7-gfz8-dkfa
13
vulnerability VCID-jfb1-3vg4-vbap
14
vulnerability VCID-mmrp-aqn2-nkd1
15
vulnerability VCID-mqdc-3qdf-efhs
16
vulnerability VCID-naeq-2b67-w3fs
17
vulnerability VCID-nz67-hrxz-d7g8
18
vulnerability VCID-p26v-kd5w-s3bv
19
vulnerability VCID-sn49-t5fd-u3hc
20
vulnerability VCID-u2yt-tapf-abhe
21
vulnerability VCID-ynn9-thtp-wkbh
22
vulnerability VCID-yyav-75eb-e3av
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/java-1.6.0-ibm@1:1.6.0.9.0-1jpp.3%3Farch=el5
2
url pkg:rpm/redhat/java-1.6.0-ibm@1:1.6.0.9.0-1jpp.4?arch=el6
purl pkg:rpm/redhat/java-1.6.0-ibm@1:1.6.0.9.0-1jpp.4?arch=el6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1yyz-wmtf-n7af
1
vulnerability VCID-36qa-spf2-hugr
2
vulnerability VCID-4g9p-kms6-33fy
3
vulnerability VCID-5uvz-3ua4-63ec
4
vulnerability VCID-6573-arns-dubp
5
vulnerability VCID-6d27-47wg-v7a2
6
vulnerability VCID-6f4g-2v9h-e3d2
7
vulnerability VCID-8y28-vhbf-pkh4
8
vulnerability VCID-bvvb-wkh7-wyhd
9
vulnerability VCID-dfrc-cgad-9bft
10
vulnerability VCID-dnjn-pxun-p7c5
11
vulnerability VCID-hff9-wv9j-ffh9
12
vulnerability VCID-jau7-gfz8-dkfa
13
vulnerability VCID-jfb1-3vg4-vbap
14
vulnerability VCID-mmrp-aqn2-nkd1
15
vulnerability VCID-mqdc-3qdf-efhs
16
vulnerability VCID-naeq-2b67-w3fs
17
vulnerability VCID-nz67-hrxz-d7g8
18
vulnerability VCID-p26v-kd5w-s3bv
19
vulnerability VCID-sn49-t5fd-u3hc
20
vulnerability VCID-u2yt-tapf-abhe
21
vulnerability VCID-ynn9-thtp-wkbh
22
vulnerability VCID-yyav-75eb-e3av
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/java-1.6.0-ibm@1:1.6.0.9.0-1jpp.4%3Farch=el6
3
url pkg:rpm/redhat/java-1.6.0-ibm@1:1.6.0.9.1-1jpp.1?arch=el5
purl pkg:rpm/redhat/java-1.6.0-ibm@1:1.6.0.9.1-1jpp.1?arch=el5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1yyz-wmtf-n7af
1
vulnerability VCID-36qa-spf2-hugr
2
vulnerability VCID-4g9p-kms6-33fy
3
vulnerability VCID-5uvz-3ua4-63ec
4
vulnerability VCID-6573-arns-dubp
5
vulnerability VCID-6d27-47wg-v7a2
6
vulnerability VCID-6f4g-2v9h-e3d2
7
vulnerability VCID-6xjz-k55c-xkey
8
vulnerability VCID-71x3-wu83-buh5
9
vulnerability VCID-8y28-vhbf-pkh4
10
vulnerability VCID-bvvb-wkh7-wyhd
11
vulnerability VCID-bw7d-a8m3-mqfn
12
vulnerability VCID-cu4d-hpxb-4kcs
13
vulnerability VCID-dfrc-cgad-9bft
14
vulnerability VCID-dnjn-pxun-p7c5
15
vulnerability VCID-dyt1-cndg-7fds
16
vulnerability VCID-hff9-wv9j-ffh9
17
vulnerability VCID-jau7-gfz8-dkfa
18
vulnerability VCID-jfb1-3vg4-vbap
19
vulnerability VCID-jt8w-fajn-2ygh
20
vulnerability VCID-k9z1-w589-ubb6
21
vulnerability VCID-mmrp-aqn2-nkd1
22
vulnerability VCID-mqdc-3qdf-efhs
23
vulnerability VCID-naeq-2b67-w3fs
24
vulnerability VCID-nz67-hrxz-d7g8
25
vulnerability VCID-p26v-kd5w-s3bv
26
vulnerability VCID-pmxa-5nps-mfdk
27
vulnerability VCID-qnjw-4czk-k7eu
28
vulnerability VCID-r992-zpw8-hke2
29
vulnerability VCID-rrdj-ssn7-zfdj
30
vulnerability VCID-sn49-t5fd-u3hc
31
vulnerability VCID-u2yt-tapf-abhe
32
vulnerability VCID-uq19-1f86-cqgk
33
vulnerability VCID-v2y8-k2t6-2uar
34
vulnerability VCID-y8am-3b4k-aqgg
35
vulnerability VCID-y8wh-2vb7-43gs
36
vulnerability VCID-ynn9-thtp-wkbh
37
vulnerability VCID-yyav-75eb-e3av
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/java-1.6.0-ibm@1:1.6.0.9.1-1jpp.1%3Farch=el5
4
url pkg:rpm/redhat/java-1.6.0-sun@1:1.6.0.22-1jpp.1?arch=el4
purl pkg:rpm/redhat/java-1.6.0-sun@1:1.6.0.22-1jpp.1?arch=el4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1yyz-wmtf-n7af
1
vulnerability VCID-36qa-spf2-hugr
2
vulnerability VCID-4g9p-kms6-33fy
3
vulnerability VCID-5uvz-3ua4-63ec
4
vulnerability VCID-6573-arns-dubp
5
vulnerability VCID-6d27-47wg-v7a2
6
vulnerability VCID-6f4g-2v9h-e3d2
7
vulnerability VCID-8y28-vhbf-pkh4
8
vulnerability VCID-96cv-7mvp-kyfn
9
vulnerability VCID-99pg-zyzv-7fdt
10
vulnerability VCID-b36c-f5yd-pbc6
11
vulnerability VCID-bnn4-y7cn-7kd4
12
vulnerability VCID-bvvb-wkh7-wyhd
13
vulnerability VCID-dfrc-cgad-9bft
14
vulnerability VCID-dnjn-pxun-p7c5
15
vulnerability VCID-hff9-wv9j-ffh9
16
vulnerability VCID-jau7-gfz8-dkfa
17
vulnerability VCID-jfb1-3vg4-vbap
18
vulnerability VCID-k4uz-574m-aqd3
19
vulnerability VCID-mmrp-aqn2-nkd1
20
vulnerability VCID-mqdc-3qdf-efhs
21
vulnerability VCID-naeq-2b67-w3fs
22
vulnerability VCID-nz67-hrxz-d7g8
23
vulnerability VCID-p26v-kd5w-s3bv
24
vulnerability VCID-sn49-t5fd-u3hc
25
vulnerability VCID-u2yt-tapf-abhe
26
vulnerability VCID-vhx7-rx69-n3hz
27
vulnerability VCID-ynn9-thtp-wkbh
28
vulnerability VCID-yyav-75eb-e3av
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/java-1.6.0-sun@1:1.6.0.22-1jpp.1%3Farch=el4
5
url pkg:rpm/redhat/java-1.6.0-sun@1:1.6.0.22-1jpp.1?arch=el5
purl pkg:rpm/redhat/java-1.6.0-sun@1:1.6.0.22-1jpp.1?arch=el5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1yyz-wmtf-n7af
1
vulnerability VCID-36qa-spf2-hugr
2
vulnerability VCID-4g9p-kms6-33fy
3
vulnerability VCID-5uvz-3ua4-63ec
4
vulnerability VCID-6573-arns-dubp
5
vulnerability VCID-6d27-47wg-v7a2
6
vulnerability VCID-6f4g-2v9h-e3d2
7
vulnerability VCID-8y28-vhbf-pkh4
8
vulnerability VCID-96cv-7mvp-kyfn
9
vulnerability VCID-99pg-zyzv-7fdt
10
vulnerability VCID-b36c-f5yd-pbc6
11
vulnerability VCID-bnn4-y7cn-7kd4
12
vulnerability VCID-bvvb-wkh7-wyhd
13
vulnerability VCID-dfrc-cgad-9bft
14
vulnerability VCID-dnjn-pxun-p7c5
15
vulnerability VCID-hff9-wv9j-ffh9
16
vulnerability VCID-jau7-gfz8-dkfa
17
vulnerability VCID-jfb1-3vg4-vbap
18
vulnerability VCID-k4uz-574m-aqd3
19
vulnerability VCID-mmrp-aqn2-nkd1
20
vulnerability VCID-mqdc-3qdf-efhs
21
vulnerability VCID-naeq-2b67-w3fs
22
vulnerability VCID-nz67-hrxz-d7g8
23
vulnerability VCID-p26v-kd5w-s3bv
24
vulnerability VCID-sn49-t5fd-u3hc
25
vulnerability VCID-u2yt-tapf-abhe
26
vulnerability VCID-vhx7-rx69-n3hz
27
vulnerability VCID-ynn9-thtp-wkbh
28
vulnerability VCID-yyav-75eb-e3av
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/java-1.6.0-sun@1:1.6.0.22-1jpp.1%3Farch=el5
References
0
reference_url http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c02616748
reference_id
reference_type
scores
url http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c02616748
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html
2
reference_url http://marc.info/?l=bugtraq&m=134254866602253&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=134254866602253&w=2
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3563.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3563.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-3563
reference_id
reference_type
scores
0
value 0.88762
scoring_system epss
scoring_elements 0.9951
published_at 2026-04-07T12:55:00Z
1
value 0.88762
scoring_system epss
scoring_elements 0.99513
published_at 2026-04-13T12:55:00Z
2
value 0.88762
scoring_system epss
scoring_elements 0.99509
published_at 2026-04-04T12:55:00Z
3
value 0.88762
scoring_system epss
scoring_elements 0.99508
published_at 2026-04-02T12:55:00Z
4
value 0.88762
scoring_system epss
scoring_elements 0.99511
published_at 2026-04-08T12:55:00Z
5
value 0.88762
scoring_system epss
scoring_elements 0.99512
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-3563
5
reference_url http://secunia.com/advisories/44954
reference_id
reference_type
scores
url http://secunia.com/advisories/44954
6
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12181
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12181
7
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12554
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12554
8
reference_url http://support.avaya.com/css/P8/documents/100114315
reference_id
reference_type
scores
url http://support.avaya.com/css/P8/documents/100114315
9
reference_url http://support.avaya.com/css/P8/documents/100123193
reference_id
reference_type
scores
url http://support.avaya.com/css/P8/documents/100123193
10
reference_url http://www.oracle.com/technetwork/topics/security/javacpuoct2010-176258.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/javacpuoct2010-176258.html
11
reference_url http://www.redhat.com/support/errata/RHSA-2010-0770.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0770.html
12
reference_url http://www.redhat.com/support/errata/RHSA-2010-0987.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0987.html
13
reference_url http://www.redhat.com/support/errata/RHSA-2011-0880.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0880.html
14
reference_url http://www.securityfocus.com/bid/43999
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/43999
15
reference_url http://www.zerodayinitiative.com/advisories/ZDI-10-202/
reference_id
reference_type
scores
url http://www.zerodayinitiative.com/advisories/ZDI-10-202/
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=642589
reference_id 642589
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=642589
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jdk:1.6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update1:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jdk:1.6.0:update1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update1:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_10:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jdk:1.6.0:update_10:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_10:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_11:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jdk:1.6.0:update_11:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_11:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_12:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jdk:1.6.0:update_12:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_12:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_13:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jdk:1.6.0:update_13:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_13:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_14:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jdk:1.6.0:update_14:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_14:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_15:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jdk:1.6.0:update_15:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_15:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_16:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jdk:1.6.0:update_16:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_16:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_17:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jdk:1.6.0:update_17:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_17:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_18:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jdk:1.6.0:update_18:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_18:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_19:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jdk:1.6.0:update_19:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_19:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update1_b06:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jdk:1.6.0:update1_b06:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update1_b06:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update2:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jdk:1.6.0:update2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update2:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_20:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jdk:1.6.0:update_20:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_20:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_3:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jdk:1.6.0:update_3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_3:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_4:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jdk:1.6.0:update_4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_4:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_5:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jdk:1.6.0:update_5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_5:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_6:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jdk:1.6.0:update_6:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_6:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_7:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jdk:1.6.0:update_7:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_7:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:*:update_21:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jdk:*:update_21:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:*:update_21:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jre:1.6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_10:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jre:1.6.0:update_10:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_10:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_11:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jre:1.6.0:update_11:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_11:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_12:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jre:1.6.0:update_12:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_12:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_13:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jre:1.6.0:update_13:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_13:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_14:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jre:1.6.0:update_14:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_14:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_15:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jre:1.6.0:update_15:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_15:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_16:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jre:1.6.0:update_16:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_16:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_17:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jre:1.6.0:update_17:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_17:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_18:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jre:1.6.0:update_18:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_18:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_19:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jre:1.6.0:update_19:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_19:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_2:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jre:1.6.0:update_2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_2:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_20:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jre:1.6.0:update_20:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_20:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_3:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jre:1.6.0:update_3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_3:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_4:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jre:1.6.0:update_4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_4:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_5:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jre:1.6.0:update_5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_5:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_6:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jre:1.6.0:update_6:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_6:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_7:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jre:1.6.0:update_7:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_7:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:*:update_21:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jre:*:update_21:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:*:update_21:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-3563
reference_id CVE-2010-3563
reference_type
scores
0
value 10.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2010-3563
59
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/16495.rb
reference_id CVE-2010-3563;OSVDB-69043
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/16495.rb
60
reference_url https://security.gentoo.org/glsa/201111-02
reference_id GLSA-201111-02
reference_type
scores
url https://security.gentoo.org/glsa/201111-02
Weaknesses
Exploits
0
date_added 2011-01-22
description Sun Java Web Start BasicServiceImpl - Remote Code Execution (Metasploit)
required_action null
due_date null
notes null
known_ransomware_campaign_use true
source_date_published 2011-01-22
exploit_type remote
platform multiple
source_date_updated 2011-03-10
data_source Exploit-DB
source_url
1
date_added null
description
This module exploits a vulnerability in Java Runtime Environment
          that allows an attacker to escape the Java Sandbox. By injecting
          a parameter into a javaws call within the BasicServiceImpl class
          the default java sandbox policy file can be therefore overwritten.
          The vulnerability affects version 6 prior to update 22.

          NOTE: Exploiting this vulnerability causes several sinister-looking
          popup windows saying that Java is "Downloading application."
required_action null
due_date null
notes
Reliability:
  - unknown-reliability
Stability:
  - unknown-stability
SideEffects:
  - unknown-side-effects
known_ransomware_campaign_use false
source_date_published 2010-10-12
exploit_type null
platform Java,Windows
source_date_updated null
data_source Metasploit
source_url https://github.com/rapid7/metasploit-framework/tree/master/modules/exploits/windows/browser/java_basicservice_impl.rb
Severity_range_score10.0 - 10.0
Exploitability2.0
Weighted_severity9.0
Risk_score10.0
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-u2yt-tapf-abhe