Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-9uxa-vqmq-kug5
Summary
Multiple vulnerabilities in the Sun JDK and JRE allow for several attacks,
    including the remote execution of arbitrary code.
Aliases
0
alias CVE-2008-3113
Fixed_packages
0
url pkg:ebuild/app-emulation/emul-linux-x86-java@1.6.0.17
purl pkg:ebuild/app-emulation/emul-linux-x86-java@1.6.0.17
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/emul-linux-x86-java@1.6.0.17
1
url pkg:ebuild/dev-java/blackdown-jdk@1.6.0.17
purl pkg:ebuild/dev-java/blackdown-jdk@1.6.0.17
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/blackdown-jdk@1.6.0.17
2
url pkg:ebuild/dev-java/blackdown-jre@1.6.0.17
purl pkg:ebuild/dev-java/blackdown-jre@1.6.0.17
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/blackdown-jre@1.6.0.17
3
url pkg:ebuild/dev-java/sun-jdk@1.6.0.17
purl pkg:ebuild/dev-java/sun-jdk@1.6.0.17
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/sun-jdk@1.6.0.17
4
url pkg:ebuild/dev-java/sun-jre-bin@1.6.0.17
purl pkg:ebuild/dev-java/sun-jre-bin@1.6.0.17
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/sun-jre-bin@1.6.0.17
Affected_packages
0
url pkg:ebuild/app-emulation/emul-linux-x86-java@1.4.2.03-r14
purl pkg:ebuild/app-emulation/emul-linux-x86-java@1.4.2.03-r14
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1c8j-4sxr-sqen
1
vulnerability VCID-1kst-h6d9-tubd
2
vulnerability VCID-285c-8ke6-zqcq
3
vulnerability VCID-2dyz-h2nf-a3bt
4
vulnerability VCID-2k56-hznp-9kgx
5
vulnerability VCID-2tme-4a1p-gyh9
6
vulnerability VCID-3des-5j3d-kya4
7
vulnerability VCID-3f5w-6rwe-9fg9
8
vulnerability VCID-4csm-tktu-1ucx
9
vulnerability VCID-52ez-4mh7-p3g3
10
vulnerability VCID-52v7-ahwt-n7bj
11
vulnerability VCID-6ddf-kp2c-7fbx
12
vulnerability VCID-6dwj-y7qv-bkah
13
vulnerability VCID-7195-18yv-p7hb
14
vulnerability VCID-743r-weqs-97hp
15
vulnerability VCID-7kec-9nbt-8qh1
16
vulnerability VCID-8dsm-695w-9yfx
17
vulnerability VCID-8mq3-1c6d-n7a9
18
vulnerability VCID-8n29-pnkv-b7df
19
vulnerability VCID-96se-jpfu-hbhm
20
vulnerability VCID-9qfc-f3y3-ufau
21
vulnerability VCID-9u4b-8cpr-ekdb
22
vulnerability VCID-9uxa-vqmq-kug5
23
vulnerability VCID-9x9b-pd18-7qgm
24
vulnerability VCID-a6gd-ytpw-duan
25
vulnerability VCID-ame4-hxp9-g7bj
26
vulnerability VCID-ax8j-bncf-8yfv
27
vulnerability VCID-c5un-z1f5-wuhd
28
vulnerability VCID-cam8-v47g-hkg1
29
vulnerability VCID-dmsh-5f5y-kugu
30
vulnerability VCID-dwzr-6mms-gufq
31
vulnerability VCID-e5nw-x67y-hyeu
32
vulnerability VCID-e7t4-rgaz-4uec
33
vulnerability VCID-ebfs-tnbj-83gy
34
vulnerability VCID-f277-9qnr-e7cn
35
vulnerability VCID-f333-eghn-wkbk
36
vulnerability VCID-f7ux-3f7x-yugw
37
vulnerability VCID-fz23-zbk9-gugq
38
vulnerability VCID-g31s-n677-kye3
39
vulnerability VCID-gs9t-z7tn-5fhn
40
vulnerability VCID-hsr2-eksc-wkbq
41
vulnerability VCID-j2hy-fkcx-fkhh
42
vulnerability VCID-j4h4-nhsd-6bed
43
vulnerability VCID-jgc1-svry-fufd
44
vulnerability VCID-jhmy-yvgv-vqak
45
vulnerability VCID-jqm5-xd64-hkf4
46
vulnerability VCID-jtjm-tsyk-tud5
47
vulnerability VCID-ju9j-bz1n-2udp
48
vulnerability VCID-k4rr-5rxv-hqe8
49
vulnerability VCID-kh2a-vqze-rfcw
50
vulnerability VCID-kn3e-pb5g-euf1
51
vulnerability VCID-ks25-kdxj-m7cr
52
vulnerability VCID-m9ts-ympf-7fe9
53
vulnerability VCID-mayf-ewpk-eqfp
54
vulnerability VCID-mvu4-7vct-13fx
55
vulnerability VCID-nc2w-crs6-hyg1
56
vulnerability VCID-nqfb-gk4v-3ugv
57
vulnerability VCID-p2fp-hr1d-ske5
58
vulnerability VCID-pj8c-99t4-8khz
59
vulnerability VCID-pw32-g64g-cygx
60
vulnerability VCID-pzcs-z6ju-qbcg
61
vulnerability VCID-qyv2-ftjt-9ba5
62
vulnerability VCID-r6zf-rqn1-3fbk
63
vulnerability VCID-r911-4n39-ekb9
64
vulnerability VCID-rbap-5tnp-x3a7
65
vulnerability VCID-sakk-3wvn-tfhe
66
vulnerability VCID-sgk6-jd6h-nbhv
67
vulnerability VCID-t9d4-xfqz-sqaj
68
vulnerability VCID-th5x-zen3-yfdy
69
vulnerability VCID-th92-rtps-jba3
70
vulnerability VCID-tkmk-1f23-ubgq
71
vulnerability VCID-tpv7-d7p6-bbe6
72
vulnerability VCID-txfj-uzzx-4ue7
73
vulnerability VCID-tymd-uw95-q7b1
74
vulnerability VCID-tz7n-mxmc-63ek
75
vulnerability VCID-u26k-fk31-wbfc
76
vulnerability VCID-uxbc-8sru-c7a6
77
vulnerability VCID-vgct-q7vz-sfgx
78
vulnerability VCID-weda-ey6f-yuc4
79
vulnerability VCID-why8-v1se-h3fj
80
vulnerability VCID-x6d7-zzg2-eugz
81
vulnerability VCID-xfk5-vwgg-3bhp
82
vulnerability VCID-xnpr-ypxh-g3bn
83
vulnerability VCID-xt9m-tfuj-6uht
84
vulnerability VCID-y12r-7vqr-wqg5
85
vulnerability VCID-ypf2-kcj7-hfh5
86
vulnerability VCID-z522-d7z2-f7dr
87
vulnerability VCID-zbsh-w7k8-f7bp
88
vulnerability VCID-zd4q-75kh-zbfb
89
vulnerability VCID-zrz9-gmhf-cyh5
90
vulnerability VCID-ztfa-8pv5-uydc
91
vulnerability VCID-zy35-gkjy-tbfw
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/emul-linux-x86-java@1.4.2.03-r14
1
url pkg:ebuild/app-emulation/emul-linux-x86-java@1.4.2.03-r16
purl pkg:ebuild/app-emulation/emul-linux-x86-java@1.4.2.03-r16
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1c8j-4sxr-sqen
1
vulnerability VCID-1kst-h6d9-tubd
2
vulnerability VCID-285c-8ke6-zqcq
3
vulnerability VCID-2dyz-h2nf-a3bt
4
vulnerability VCID-2k56-hznp-9kgx
5
vulnerability VCID-2tme-4a1p-gyh9
6
vulnerability VCID-3des-5j3d-kya4
7
vulnerability VCID-3f5w-6rwe-9fg9
8
vulnerability VCID-4csm-tktu-1ucx
9
vulnerability VCID-52ez-4mh7-p3g3
10
vulnerability VCID-52v7-ahwt-n7bj
11
vulnerability VCID-6ddf-kp2c-7fbx
12
vulnerability VCID-6dwj-y7qv-bkah
13
vulnerability VCID-7195-18yv-p7hb
14
vulnerability VCID-743r-weqs-97hp
15
vulnerability VCID-7kec-9nbt-8qh1
16
vulnerability VCID-8dsm-695w-9yfx
17
vulnerability VCID-8mq3-1c6d-n7a9
18
vulnerability VCID-8n29-pnkv-b7df
19
vulnerability VCID-96se-jpfu-hbhm
20
vulnerability VCID-9qfc-f3y3-ufau
21
vulnerability VCID-9u4b-8cpr-ekdb
22
vulnerability VCID-9uxa-vqmq-kug5
23
vulnerability VCID-9x9b-pd18-7qgm
24
vulnerability VCID-a6gd-ytpw-duan
25
vulnerability VCID-ame4-hxp9-g7bj
26
vulnerability VCID-ax8j-bncf-8yfv
27
vulnerability VCID-c5un-z1f5-wuhd
28
vulnerability VCID-cam8-v47g-hkg1
29
vulnerability VCID-dmsh-5f5y-kugu
30
vulnerability VCID-dwzr-6mms-gufq
31
vulnerability VCID-e5nw-x67y-hyeu
32
vulnerability VCID-e7t4-rgaz-4uec
33
vulnerability VCID-ebfs-tnbj-83gy
34
vulnerability VCID-f277-9qnr-e7cn
35
vulnerability VCID-f333-eghn-wkbk
36
vulnerability VCID-f7ux-3f7x-yugw
37
vulnerability VCID-fz23-zbk9-gugq
38
vulnerability VCID-g31s-n677-kye3
39
vulnerability VCID-gs9t-z7tn-5fhn
40
vulnerability VCID-hsr2-eksc-wkbq
41
vulnerability VCID-j2hy-fkcx-fkhh
42
vulnerability VCID-j4h4-nhsd-6bed
43
vulnerability VCID-jgc1-svry-fufd
44
vulnerability VCID-jhmy-yvgv-vqak
45
vulnerability VCID-jqm5-xd64-hkf4
46
vulnerability VCID-jtjm-tsyk-tud5
47
vulnerability VCID-ju9j-bz1n-2udp
48
vulnerability VCID-k4rr-5rxv-hqe8
49
vulnerability VCID-kh2a-vqze-rfcw
50
vulnerability VCID-kn3e-pb5g-euf1
51
vulnerability VCID-ks25-kdxj-m7cr
52
vulnerability VCID-m9ts-ympf-7fe9
53
vulnerability VCID-mayf-ewpk-eqfp
54
vulnerability VCID-mvu4-7vct-13fx
55
vulnerability VCID-nc2w-crs6-hyg1
56
vulnerability VCID-nqfb-gk4v-3ugv
57
vulnerability VCID-p2fp-hr1d-ske5
58
vulnerability VCID-pj8c-99t4-8khz
59
vulnerability VCID-pw32-g64g-cygx
60
vulnerability VCID-pzcs-z6ju-qbcg
61
vulnerability VCID-qyv2-ftjt-9ba5
62
vulnerability VCID-r6zf-rqn1-3fbk
63
vulnerability VCID-r911-4n39-ekb9
64
vulnerability VCID-rbap-5tnp-x3a7
65
vulnerability VCID-sakk-3wvn-tfhe
66
vulnerability VCID-sgk6-jd6h-nbhv
67
vulnerability VCID-t9d4-xfqz-sqaj
68
vulnerability VCID-th5x-zen3-yfdy
69
vulnerability VCID-th92-rtps-jba3
70
vulnerability VCID-tkmk-1f23-ubgq
71
vulnerability VCID-tpv7-d7p6-bbe6
72
vulnerability VCID-txfj-uzzx-4ue7
73
vulnerability VCID-tymd-uw95-q7b1
74
vulnerability VCID-tz7n-mxmc-63ek
75
vulnerability VCID-u26k-fk31-wbfc
76
vulnerability VCID-uxbc-8sru-c7a6
77
vulnerability VCID-vgct-q7vz-sfgx
78
vulnerability VCID-weda-ey6f-yuc4
79
vulnerability VCID-why8-v1se-h3fj
80
vulnerability VCID-x6d7-zzg2-eugz
81
vulnerability VCID-xfk5-vwgg-3bhp
82
vulnerability VCID-xnpr-ypxh-g3bn
83
vulnerability VCID-xt9m-tfuj-6uht
84
vulnerability VCID-y12r-7vqr-wqg5
85
vulnerability VCID-ypf2-kcj7-hfh5
86
vulnerability VCID-z522-d7z2-f7dr
87
vulnerability VCID-zbsh-w7k8-f7bp
88
vulnerability VCID-zd4q-75kh-zbfb
89
vulnerability VCID-zrz9-gmhf-cyh5
90
vulnerability VCID-ztfa-8pv5-uydc
91
vulnerability VCID-zy35-gkjy-tbfw
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/emul-linux-x86-java@1.4.2.03-r16
2
url pkg:ebuild/dev-java/blackdown-jdk@1.4.2.03-r14
purl pkg:ebuild/dev-java/blackdown-jdk@1.4.2.03-r14
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1c8j-4sxr-sqen
1
vulnerability VCID-1kst-h6d9-tubd
2
vulnerability VCID-285c-8ke6-zqcq
3
vulnerability VCID-2dyz-h2nf-a3bt
4
vulnerability VCID-2k56-hznp-9kgx
5
vulnerability VCID-2tme-4a1p-gyh9
6
vulnerability VCID-3des-5j3d-kya4
7
vulnerability VCID-3f5w-6rwe-9fg9
8
vulnerability VCID-4csm-tktu-1ucx
9
vulnerability VCID-52ez-4mh7-p3g3
10
vulnerability VCID-52v7-ahwt-n7bj
11
vulnerability VCID-6ddf-kp2c-7fbx
12
vulnerability VCID-6dwj-y7qv-bkah
13
vulnerability VCID-7195-18yv-p7hb
14
vulnerability VCID-743r-weqs-97hp
15
vulnerability VCID-7kec-9nbt-8qh1
16
vulnerability VCID-8dsm-695w-9yfx
17
vulnerability VCID-8mq3-1c6d-n7a9
18
vulnerability VCID-8n29-pnkv-b7df
19
vulnerability VCID-96se-jpfu-hbhm
20
vulnerability VCID-9qfc-f3y3-ufau
21
vulnerability VCID-9u4b-8cpr-ekdb
22
vulnerability VCID-9uxa-vqmq-kug5
23
vulnerability VCID-9x9b-pd18-7qgm
24
vulnerability VCID-a6gd-ytpw-duan
25
vulnerability VCID-ame4-hxp9-g7bj
26
vulnerability VCID-ax8j-bncf-8yfv
27
vulnerability VCID-c5un-z1f5-wuhd
28
vulnerability VCID-cam8-v47g-hkg1
29
vulnerability VCID-dmsh-5f5y-kugu
30
vulnerability VCID-dwzr-6mms-gufq
31
vulnerability VCID-e5nw-x67y-hyeu
32
vulnerability VCID-e7t4-rgaz-4uec
33
vulnerability VCID-ebfs-tnbj-83gy
34
vulnerability VCID-f277-9qnr-e7cn
35
vulnerability VCID-f333-eghn-wkbk
36
vulnerability VCID-f7ux-3f7x-yugw
37
vulnerability VCID-fz23-zbk9-gugq
38
vulnerability VCID-g31s-n677-kye3
39
vulnerability VCID-gs9t-z7tn-5fhn
40
vulnerability VCID-hsr2-eksc-wkbq
41
vulnerability VCID-j2hy-fkcx-fkhh
42
vulnerability VCID-j4h4-nhsd-6bed
43
vulnerability VCID-jgc1-svry-fufd
44
vulnerability VCID-jhmy-yvgv-vqak
45
vulnerability VCID-jqm5-xd64-hkf4
46
vulnerability VCID-jtjm-tsyk-tud5
47
vulnerability VCID-ju9j-bz1n-2udp
48
vulnerability VCID-k4rr-5rxv-hqe8
49
vulnerability VCID-kh2a-vqze-rfcw
50
vulnerability VCID-kn3e-pb5g-euf1
51
vulnerability VCID-ks25-kdxj-m7cr
52
vulnerability VCID-m9ts-ympf-7fe9
53
vulnerability VCID-mayf-ewpk-eqfp
54
vulnerability VCID-mvu4-7vct-13fx
55
vulnerability VCID-nc2w-crs6-hyg1
56
vulnerability VCID-nqfb-gk4v-3ugv
57
vulnerability VCID-p2fp-hr1d-ske5
58
vulnerability VCID-pj8c-99t4-8khz
59
vulnerability VCID-pw32-g64g-cygx
60
vulnerability VCID-pzcs-z6ju-qbcg
61
vulnerability VCID-qyv2-ftjt-9ba5
62
vulnerability VCID-r6zf-rqn1-3fbk
63
vulnerability VCID-r911-4n39-ekb9
64
vulnerability VCID-rbap-5tnp-x3a7
65
vulnerability VCID-sakk-3wvn-tfhe
66
vulnerability VCID-sgk6-jd6h-nbhv
67
vulnerability VCID-t9d4-xfqz-sqaj
68
vulnerability VCID-th5x-zen3-yfdy
69
vulnerability VCID-th92-rtps-jba3
70
vulnerability VCID-tkmk-1f23-ubgq
71
vulnerability VCID-tpv7-d7p6-bbe6
72
vulnerability VCID-txfj-uzzx-4ue7
73
vulnerability VCID-tymd-uw95-q7b1
74
vulnerability VCID-tz7n-mxmc-63ek
75
vulnerability VCID-u26k-fk31-wbfc
76
vulnerability VCID-uxbc-8sru-c7a6
77
vulnerability VCID-vgct-q7vz-sfgx
78
vulnerability VCID-weda-ey6f-yuc4
79
vulnerability VCID-why8-v1se-h3fj
80
vulnerability VCID-x6d7-zzg2-eugz
81
vulnerability VCID-xfk5-vwgg-3bhp
82
vulnerability VCID-xnpr-ypxh-g3bn
83
vulnerability VCID-xt9m-tfuj-6uht
84
vulnerability VCID-y12r-7vqr-wqg5
85
vulnerability VCID-ypf2-kcj7-hfh5
86
vulnerability VCID-z522-d7z2-f7dr
87
vulnerability VCID-zbsh-w7k8-f7bp
88
vulnerability VCID-zd4q-75kh-zbfb
89
vulnerability VCID-zrz9-gmhf-cyh5
90
vulnerability VCID-ztfa-8pv5-uydc
91
vulnerability VCID-zy35-gkjy-tbfw
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/blackdown-jdk@1.4.2.03-r14
3
url pkg:ebuild/dev-java/blackdown-jdk@1.4.2.03-r16
purl pkg:ebuild/dev-java/blackdown-jdk@1.4.2.03-r16
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1c8j-4sxr-sqen
1
vulnerability VCID-1kst-h6d9-tubd
2
vulnerability VCID-285c-8ke6-zqcq
3
vulnerability VCID-2dyz-h2nf-a3bt
4
vulnerability VCID-2k56-hznp-9kgx
5
vulnerability VCID-2tme-4a1p-gyh9
6
vulnerability VCID-3des-5j3d-kya4
7
vulnerability VCID-3f5w-6rwe-9fg9
8
vulnerability VCID-4csm-tktu-1ucx
9
vulnerability VCID-52ez-4mh7-p3g3
10
vulnerability VCID-52v7-ahwt-n7bj
11
vulnerability VCID-6ddf-kp2c-7fbx
12
vulnerability VCID-6dwj-y7qv-bkah
13
vulnerability VCID-7195-18yv-p7hb
14
vulnerability VCID-743r-weqs-97hp
15
vulnerability VCID-7kec-9nbt-8qh1
16
vulnerability VCID-8dsm-695w-9yfx
17
vulnerability VCID-8mq3-1c6d-n7a9
18
vulnerability VCID-8n29-pnkv-b7df
19
vulnerability VCID-96se-jpfu-hbhm
20
vulnerability VCID-9qfc-f3y3-ufau
21
vulnerability VCID-9u4b-8cpr-ekdb
22
vulnerability VCID-9uxa-vqmq-kug5
23
vulnerability VCID-9x9b-pd18-7qgm
24
vulnerability VCID-a6gd-ytpw-duan
25
vulnerability VCID-ame4-hxp9-g7bj
26
vulnerability VCID-ax8j-bncf-8yfv
27
vulnerability VCID-c5un-z1f5-wuhd
28
vulnerability VCID-cam8-v47g-hkg1
29
vulnerability VCID-dmsh-5f5y-kugu
30
vulnerability VCID-dwzr-6mms-gufq
31
vulnerability VCID-e5nw-x67y-hyeu
32
vulnerability VCID-e7t4-rgaz-4uec
33
vulnerability VCID-ebfs-tnbj-83gy
34
vulnerability VCID-f277-9qnr-e7cn
35
vulnerability VCID-f333-eghn-wkbk
36
vulnerability VCID-f7ux-3f7x-yugw
37
vulnerability VCID-fz23-zbk9-gugq
38
vulnerability VCID-g31s-n677-kye3
39
vulnerability VCID-gs9t-z7tn-5fhn
40
vulnerability VCID-hsr2-eksc-wkbq
41
vulnerability VCID-j2hy-fkcx-fkhh
42
vulnerability VCID-j4h4-nhsd-6bed
43
vulnerability VCID-jgc1-svry-fufd
44
vulnerability VCID-jhmy-yvgv-vqak
45
vulnerability VCID-jqm5-xd64-hkf4
46
vulnerability VCID-jtjm-tsyk-tud5
47
vulnerability VCID-ju9j-bz1n-2udp
48
vulnerability VCID-k4rr-5rxv-hqe8
49
vulnerability VCID-kh2a-vqze-rfcw
50
vulnerability VCID-kn3e-pb5g-euf1
51
vulnerability VCID-ks25-kdxj-m7cr
52
vulnerability VCID-m9ts-ympf-7fe9
53
vulnerability VCID-mayf-ewpk-eqfp
54
vulnerability VCID-mvu4-7vct-13fx
55
vulnerability VCID-nc2w-crs6-hyg1
56
vulnerability VCID-nqfb-gk4v-3ugv
57
vulnerability VCID-p2fp-hr1d-ske5
58
vulnerability VCID-pj8c-99t4-8khz
59
vulnerability VCID-pw32-g64g-cygx
60
vulnerability VCID-pzcs-z6ju-qbcg
61
vulnerability VCID-qyv2-ftjt-9ba5
62
vulnerability VCID-r6zf-rqn1-3fbk
63
vulnerability VCID-r911-4n39-ekb9
64
vulnerability VCID-rbap-5tnp-x3a7
65
vulnerability VCID-sakk-3wvn-tfhe
66
vulnerability VCID-sgk6-jd6h-nbhv
67
vulnerability VCID-t9d4-xfqz-sqaj
68
vulnerability VCID-th5x-zen3-yfdy
69
vulnerability VCID-th92-rtps-jba3
70
vulnerability VCID-tkmk-1f23-ubgq
71
vulnerability VCID-tpv7-d7p6-bbe6
72
vulnerability VCID-txfj-uzzx-4ue7
73
vulnerability VCID-tymd-uw95-q7b1
74
vulnerability VCID-tz7n-mxmc-63ek
75
vulnerability VCID-u26k-fk31-wbfc
76
vulnerability VCID-uxbc-8sru-c7a6
77
vulnerability VCID-vgct-q7vz-sfgx
78
vulnerability VCID-weda-ey6f-yuc4
79
vulnerability VCID-why8-v1se-h3fj
80
vulnerability VCID-x6d7-zzg2-eugz
81
vulnerability VCID-xfk5-vwgg-3bhp
82
vulnerability VCID-xnpr-ypxh-g3bn
83
vulnerability VCID-xt9m-tfuj-6uht
84
vulnerability VCID-y12r-7vqr-wqg5
85
vulnerability VCID-ypf2-kcj7-hfh5
86
vulnerability VCID-z522-d7z2-f7dr
87
vulnerability VCID-zbsh-w7k8-f7bp
88
vulnerability VCID-zd4q-75kh-zbfb
89
vulnerability VCID-zrz9-gmhf-cyh5
90
vulnerability VCID-ztfa-8pv5-uydc
91
vulnerability VCID-zy35-gkjy-tbfw
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/blackdown-jdk@1.4.2.03-r16
4
url pkg:ebuild/dev-java/blackdown-jre@1.4.2.03-r14
purl pkg:ebuild/dev-java/blackdown-jre@1.4.2.03-r14
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1c8j-4sxr-sqen
1
vulnerability VCID-1kst-h6d9-tubd
2
vulnerability VCID-285c-8ke6-zqcq
3
vulnerability VCID-2dyz-h2nf-a3bt
4
vulnerability VCID-2k56-hznp-9kgx
5
vulnerability VCID-2tme-4a1p-gyh9
6
vulnerability VCID-3des-5j3d-kya4
7
vulnerability VCID-3f5w-6rwe-9fg9
8
vulnerability VCID-4csm-tktu-1ucx
9
vulnerability VCID-52ez-4mh7-p3g3
10
vulnerability VCID-52v7-ahwt-n7bj
11
vulnerability VCID-6ddf-kp2c-7fbx
12
vulnerability VCID-6dwj-y7qv-bkah
13
vulnerability VCID-7195-18yv-p7hb
14
vulnerability VCID-743r-weqs-97hp
15
vulnerability VCID-7kec-9nbt-8qh1
16
vulnerability VCID-8dsm-695w-9yfx
17
vulnerability VCID-8mq3-1c6d-n7a9
18
vulnerability VCID-8n29-pnkv-b7df
19
vulnerability VCID-96se-jpfu-hbhm
20
vulnerability VCID-9qfc-f3y3-ufau
21
vulnerability VCID-9u4b-8cpr-ekdb
22
vulnerability VCID-9uxa-vqmq-kug5
23
vulnerability VCID-9x9b-pd18-7qgm
24
vulnerability VCID-a6gd-ytpw-duan
25
vulnerability VCID-ame4-hxp9-g7bj
26
vulnerability VCID-ax8j-bncf-8yfv
27
vulnerability VCID-c5un-z1f5-wuhd
28
vulnerability VCID-cam8-v47g-hkg1
29
vulnerability VCID-dmsh-5f5y-kugu
30
vulnerability VCID-dwzr-6mms-gufq
31
vulnerability VCID-e5nw-x67y-hyeu
32
vulnerability VCID-e7t4-rgaz-4uec
33
vulnerability VCID-ebfs-tnbj-83gy
34
vulnerability VCID-f277-9qnr-e7cn
35
vulnerability VCID-f333-eghn-wkbk
36
vulnerability VCID-f7ux-3f7x-yugw
37
vulnerability VCID-fz23-zbk9-gugq
38
vulnerability VCID-g31s-n677-kye3
39
vulnerability VCID-gs9t-z7tn-5fhn
40
vulnerability VCID-hsr2-eksc-wkbq
41
vulnerability VCID-j2hy-fkcx-fkhh
42
vulnerability VCID-j4h4-nhsd-6bed
43
vulnerability VCID-jgc1-svry-fufd
44
vulnerability VCID-jhmy-yvgv-vqak
45
vulnerability VCID-jqm5-xd64-hkf4
46
vulnerability VCID-jtjm-tsyk-tud5
47
vulnerability VCID-ju9j-bz1n-2udp
48
vulnerability VCID-k4rr-5rxv-hqe8
49
vulnerability VCID-kh2a-vqze-rfcw
50
vulnerability VCID-kn3e-pb5g-euf1
51
vulnerability VCID-ks25-kdxj-m7cr
52
vulnerability VCID-m9ts-ympf-7fe9
53
vulnerability VCID-mayf-ewpk-eqfp
54
vulnerability VCID-mvu4-7vct-13fx
55
vulnerability VCID-nc2w-crs6-hyg1
56
vulnerability VCID-nqfb-gk4v-3ugv
57
vulnerability VCID-p2fp-hr1d-ske5
58
vulnerability VCID-pj8c-99t4-8khz
59
vulnerability VCID-pw32-g64g-cygx
60
vulnerability VCID-pzcs-z6ju-qbcg
61
vulnerability VCID-qyv2-ftjt-9ba5
62
vulnerability VCID-r6zf-rqn1-3fbk
63
vulnerability VCID-r911-4n39-ekb9
64
vulnerability VCID-rbap-5tnp-x3a7
65
vulnerability VCID-sakk-3wvn-tfhe
66
vulnerability VCID-sgk6-jd6h-nbhv
67
vulnerability VCID-t9d4-xfqz-sqaj
68
vulnerability VCID-th5x-zen3-yfdy
69
vulnerability VCID-th92-rtps-jba3
70
vulnerability VCID-tkmk-1f23-ubgq
71
vulnerability VCID-tpv7-d7p6-bbe6
72
vulnerability VCID-txfj-uzzx-4ue7
73
vulnerability VCID-tymd-uw95-q7b1
74
vulnerability VCID-tz7n-mxmc-63ek
75
vulnerability VCID-u26k-fk31-wbfc
76
vulnerability VCID-uxbc-8sru-c7a6
77
vulnerability VCID-vgct-q7vz-sfgx
78
vulnerability VCID-weda-ey6f-yuc4
79
vulnerability VCID-why8-v1se-h3fj
80
vulnerability VCID-x6d7-zzg2-eugz
81
vulnerability VCID-xfk5-vwgg-3bhp
82
vulnerability VCID-xnpr-ypxh-g3bn
83
vulnerability VCID-xt9m-tfuj-6uht
84
vulnerability VCID-y12r-7vqr-wqg5
85
vulnerability VCID-ypf2-kcj7-hfh5
86
vulnerability VCID-z522-d7z2-f7dr
87
vulnerability VCID-zbsh-w7k8-f7bp
88
vulnerability VCID-zd4q-75kh-zbfb
89
vulnerability VCID-zrz9-gmhf-cyh5
90
vulnerability VCID-ztfa-8pv5-uydc
91
vulnerability VCID-zy35-gkjy-tbfw
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/blackdown-jre@1.4.2.03-r14
5
url pkg:rpm/redhat/java-1.4.2-ibm@1.4.2.12-1jpp.1?arch=el4
purl pkg:rpm/redhat/java-1.4.2-ibm@1.4.2.12-1jpp.1?arch=el4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-9uxa-vqmq-kug5
1
vulnerability VCID-sgk6-jd6h-nbhv
2
vulnerability VCID-xfk5-vwgg-3bhp
3
vulnerability VCID-ztfa-8pv5-uydc
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/java-1.4.2-ibm@1.4.2.12-1jpp.1%3Farch=el4
6
url pkg:rpm/redhat/java-1.4.2-ibm@1.4.2.12-1jpp.1?arch=el3
purl pkg:rpm/redhat/java-1.4.2-ibm@1.4.2.12-1jpp.1?arch=el3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-9uxa-vqmq-kug5
1
vulnerability VCID-sgk6-jd6h-nbhv
2
vulnerability VCID-xfk5-vwgg-3bhp
3
vulnerability VCID-ztfa-8pv5-uydc
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/java-1.4.2-ibm@1.4.2.12-1jpp.1%3Farch=el3
7
url pkg:rpm/redhat/java-1.4.2-ibm@1.4.2.12-1jpp.1?arch=el5
purl pkg:rpm/redhat/java-1.4.2-ibm@1.4.2.12-1jpp.1?arch=el5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-9uxa-vqmq-kug5
1
vulnerability VCID-sgk6-jd6h-nbhv
2
vulnerability VCID-xfk5-vwgg-3bhp
3
vulnerability VCID-ztfa-8pv5-uydc
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/java-1.4.2-ibm@1.4.2.12-1jpp.1%3Farch=el5
8
url pkg:rpm/redhat/java-1.5.0-ibm@1:1.5.0.8-1jpp.1?arch=el5
purl pkg:rpm/redhat/java-1.5.0-ibm@1:1.5.0.8-1jpp.1?arch=el5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2dyz-h2nf-a3bt
1
vulnerability VCID-9uxa-vqmq-kug5
2
vulnerability VCID-kn3e-pb5g-euf1
3
vulnerability VCID-nqfb-gk4v-3ugv
4
vulnerability VCID-sgk6-jd6h-nbhv
5
vulnerability VCID-xfk5-vwgg-3bhp
6
vulnerability VCID-ztfa-8pv5-uydc
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/java-1.5.0-ibm@1:1.5.0.8-1jpp.1%3Farch=el5
9
url pkg:rpm/redhat/java-1.5.0-ibm@1:1.5.0.8-1jpp.1?arch=el4
purl pkg:rpm/redhat/java-1.5.0-ibm@1:1.5.0.8-1jpp.1?arch=el4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1un4-qapq-sbf3
1
vulnerability VCID-2dyz-h2nf-a3bt
2
vulnerability VCID-87wm-5t49-cqgz
3
vulnerability VCID-8h6v-tdt7-kbf8
4
vulnerability VCID-9mme-h5fz-ffgx
5
vulnerability VCID-9uxa-vqmq-kug5
6
vulnerability VCID-d9fa-tvr9-gqdw
7
vulnerability VCID-ds36-fjg3-jbg7
8
vulnerability VCID-kn3e-pb5g-euf1
9
vulnerability VCID-nqfb-gk4v-3ugv
10
vulnerability VCID-pqcy-hw6d-mbh1
11
vulnerability VCID-sgk6-jd6h-nbhv
12
vulnerability VCID-u6pz-tfzh-x7g2
13
vulnerability VCID-urch-z19w-sqft
14
vulnerability VCID-xfk5-vwgg-3bhp
15
vulnerability VCID-zgxp-d9xm-8fhm
16
vulnerability VCID-ztfa-8pv5-uydc
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/java-1.5.0-ibm@1:1.5.0.8-1jpp.1%3Farch=el4
10
url pkg:rpm/redhat/java-1.5.0-sun@1.5.0.16-1jpp.2?arch=el4
purl pkg:rpm/redhat/java-1.5.0-sun@1.5.0.16-1jpp.2?arch=el4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2dyz-h2nf-a3bt
1
vulnerability VCID-9uxa-vqmq-kug5
2
vulnerability VCID-9x9b-pd18-7qgm
3
vulnerability VCID-cam8-v47g-hkg1
4
vulnerability VCID-sgk6-jd6h-nbhv
5
vulnerability VCID-xfk5-vwgg-3bhp
6
vulnerability VCID-ztfa-8pv5-uydc
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/java-1.5.0-sun@1.5.0.16-1jpp.2%3Farch=el4
11
url pkg:rpm/redhat/java-1.5.0-sun@1.5.0.16-1jpp.2?arch=el5
purl pkg:rpm/redhat/java-1.5.0-sun@1.5.0.16-1jpp.2?arch=el5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2dyz-h2nf-a3bt
1
vulnerability VCID-9uxa-vqmq-kug5
2
vulnerability VCID-9x9b-pd18-7qgm
3
vulnerability VCID-cam8-v47g-hkg1
4
vulnerability VCID-sgk6-jd6h-nbhv
5
vulnerability VCID-xfk5-vwgg-3bhp
6
vulnerability VCID-ztfa-8pv5-uydc
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/java-1.5.0-sun@1.5.0.16-1jpp.2%3Farch=el5
References
0
reference_url http://lists.apple.com/archives/security-announce//2008/Sep/msg00008.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce//2008/Sep/msg00008.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00005.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00005.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00000.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00002.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00002.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2008-12/msg00003.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2008-12/msg00003.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00000.html
6
reference_url http://marc.info/?l=bugtraq&m=122331139823057&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=122331139823057&w=2
7
reference_url http://rhn.redhat.com/errata/RHSA-2008-0955.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2008-0955.html
8
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3113.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3113.json
9
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-3113
reference_id
reference_type
scores
0
value 0.20566
scoring_system epss
scoring_elements 0.95581
published_at 2026-04-16T12:55:00Z
1
value 0.20566
scoring_system epss
scoring_elements 0.95539
published_at 2026-04-01T12:55:00Z
2
value 0.20566
scoring_system epss
scoring_elements 0.95548
published_at 2026-04-02T12:55:00Z
3
value 0.20566
scoring_system epss
scoring_elements 0.95553
published_at 2026-04-04T12:55:00Z
4
value 0.20566
scoring_system epss
scoring_elements 0.95557
published_at 2026-04-07T12:55:00Z
5
value 0.20566
scoring_system epss
scoring_elements 0.95564
published_at 2026-04-08T12:55:00Z
6
value 0.20566
scoring_system epss
scoring_elements 0.95567
published_at 2026-04-09T12:55:00Z
7
value 0.20566
scoring_system epss
scoring_elements 0.95571
published_at 2026-04-11T12:55:00Z
8
value 0.20566
scoring_system epss
scoring_elements 0.95572
published_at 2026-04-12T12:55:00Z
9
value 0.20566
scoring_system epss
scoring_elements 0.95573
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-3113
10
reference_url http://secunia.com/advisories/31010
reference_id
reference_type
scores
url http://secunia.com/advisories/31010
11
reference_url http://secunia.com/advisories/31055
reference_id
reference_type
scores
url http://secunia.com/advisories/31055
12
reference_url http://secunia.com/advisories/31320
reference_id
reference_type
scores
url http://secunia.com/advisories/31320
13
reference_url http://secunia.com/advisories/31497
reference_id
reference_type
scores
url http://secunia.com/advisories/31497
14
reference_url http://secunia.com/advisories/31600
reference_id
reference_type
scores
url http://secunia.com/advisories/31600
15
reference_url http://secunia.com/advisories/31736
reference_id
reference_type
scores
url http://secunia.com/advisories/31736
16
reference_url http://secunia.com/advisories/32018
reference_id
reference_type
scores
url http://secunia.com/advisories/32018
17
reference_url http://secunia.com/advisories/32179
reference_id
reference_type
scores
url http://secunia.com/advisories/32179
18
reference_url http://secunia.com/advisories/32180
reference_id
reference_type
scores
url http://secunia.com/advisories/32180
19
reference_url http://secunia.com/advisories/32826
reference_id
reference_type
scores
url http://secunia.com/advisories/32826
20
reference_url http://secunia.com/advisories/33194
reference_id
reference_type
scores
url http://secunia.com/advisories/33194
21
reference_url http://secunia.com/advisories/35065
reference_id
reference_type
scores
url http://secunia.com/advisories/35065
22
reference_url http://secunia.com/advisories/37386
reference_id
reference_type
scores
url http://secunia.com/advisories/37386
23
reference_url http://security.gentoo.org/glsa/glsa-200911-02.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200911-02.xml
24
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/43667
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/43667
25
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10454
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10454
26
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-66-238905-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-66-238905-1
27
reference_url http://support.apple.com/kb/HT3178
reference_id
reference_type
scores
url http://support.apple.com/kb/HT3178
28
reference_url http://support.apple.com/kb/HT3179
reference_id
reference_type
scores
url http://support.apple.com/kb/HT3179
29
reference_url http://www.redhat.com/support/errata/RHSA-2008-0595.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0595.html
30
reference_url http://www.redhat.com/support/errata/RHSA-2008-0790.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0790.html
31
reference_url http://www.securityfocus.com/archive/1/497041/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/497041/100/0/threaded
32
reference_url http://www.securityfocus.com/bid/30148
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/30148
33
reference_url http://www.securitytracker.com/id?1020452
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1020452
34
reference_url http://www.us-cert.gov/cas/techalerts/TA08-193A.html
reference_id
reference_type
scores
url http://www.us-cert.gov/cas/techalerts/TA08-193A.html
35
reference_url http://www.vmware.com/security/advisories/VMSA-2008-0016.html
reference_id
reference_type
scores
url http://www.vmware.com/security/advisories/VMSA-2008-0016.html
36
reference_url http://www.vupen.com/english/advisories/2008/2056/references
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2056/references
37
reference_url http://www.vupen.com/english/advisories/2008/2740
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2740
38
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=454607
reference_id 454607
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=454607
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:5.0:update_1:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jdk:5.0:update_1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:5.0:update_1:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:5.0:update_10:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jdk:5.0:update_10:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:5.0:update_10:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:5.0:update_11:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jdk:5.0:update_11:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:5.0:update_11:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:5.0:update_12:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jdk:5.0:update_12:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:5.0:update_12:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:5.0:update_13:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jdk:5.0:update_13:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:5.0:update_13:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:5.0:update_14:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jdk:5.0:update_14:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:5.0:update_14:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:5.0:update_2:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jdk:5.0:update_2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:5.0:update_2:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:5.0:update_3:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jdk:5.0:update_3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:5.0:update_3:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:5.0:update_4:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jdk:5.0:update_4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:5.0:update_4:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:5.0:update_5:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jdk:5.0:update_5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:5.0:update_5:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:5.0:update_6:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jdk:5.0:update_6:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:5.0:update_6:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:5.0:update_7:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jdk:5.0:update_7:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:5.0:update_7:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:5.0:update_8:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jdk:5.0:update_8:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:5.0:update_8:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:5.0:update_9:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jdk:5.0:update_9:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:5.0:update_9:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:*:update_15:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jdk:*:update_15:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:*:update_15:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jre:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:*:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jre:1.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.4.2:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.4.2_01:*:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jre:1.4.2_01:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.4.2_01:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.4.2_02:*:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jre:1.4.2_02:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.4.2_02:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.4.2_03:*:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jre:1.4.2_03:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.4.2_03:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.4.2_04:*:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jre:1.4.2_04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.4.2_04:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.4.2_05:*:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jre:1.4.2_05:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.4.2_05:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.4.2_06:*:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jre:1.4.2_06:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.4.2_06:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.4.2_07:*:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jre:1.4.2_07:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.4.2_07:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.4.2_10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jre:1.4.2_10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.4.2_10:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.4.2_11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jre:1.4.2_11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.4.2_11:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.4.2_12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jre:1.4.2_12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.4.2_12:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.4.2_13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jre:1.4.2_13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.4.2_13:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.4.2_14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jre:1.4.2_14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.4.2_14:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.4.2_15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jre:1.4.2_15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.4.2_15:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.4.2_16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jre:1.4.2_16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.4.2_16:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.4.2_8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jre:1.4.2_8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.4.2_8:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.4.2_9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jre:1.4.2_9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.4.2_9:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:5.0:update_1:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jre:5.0:update_1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:5.0:update_1:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:5.0:update_10:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jre:5.0:update_10:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:5.0:update_10:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:5.0:update_11:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jre:5.0:update_11:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:5.0:update_11:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:5.0:update_12:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jre:5.0:update_12:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:5.0:update_12:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:5.0:update_13:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jre:5.0:update_13:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:5.0:update_13:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:5.0:update_14:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jre:5.0:update_14:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:5.0:update_14:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:5.0:update_2:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jre:5.0:update_2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:5.0:update_2:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:5.0:update_3:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jre:5.0:update_3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:5.0:update_3:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:5.0:update_4:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jre:5.0:update_4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:5.0:update_4:*:*:*:*:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:5.0:update_5:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jre:5.0:update_5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:5.0:update_5:*:*:*:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:5.0:update_6:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jre:5.0:update_6:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:5.0:update_6:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:5.0:update_7:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jre:5.0:update_7:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:5.0:update_7:*:*:*:*:*:*
84
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:5.0:update_8:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jre:5.0:update_8:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:5.0:update_8:*:*:*:*:*:*
85
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:5.0:update_9:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jre:5.0:update_9:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:5.0:update_9:*:*:*:*:*:*
86
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:*:update_15:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jre:*:update_15:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:*:update_15:*:*:*:*:*:*
87
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:sdk:1.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:sdk:1.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:sdk:1.4.2:*:*:*:*:*:*:*
88
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:sdk:1.4.2_01:*:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:sdk:1.4.2_01:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:sdk:1.4.2_01:*:*:*:*:*:*:*
89
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:sdk:1.4.2_02:*:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:sdk:1.4.2_02:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:sdk:1.4.2_02:*:*:*:*:*:*:*
90
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:sdk:1.4.2_03:*:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:sdk:1.4.2_03:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:sdk:1.4.2_03:*:*:*:*:*:*:*
91
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:sdk:1.4.2_04:*:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:sdk:1.4.2_04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:sdk:1.4.2_04:*:*:*:*:*:*:*
92
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:sdk:1.4.2_05:*:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:sdk:1.4.2_05:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:sdk:1.4.2_05:*:*:*:*:*:*:*
93
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:sdk:1.4.2_06:*:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:sdk:1.4.2_06:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:sdk:1.4.2_06:*:*:*:*:*:*:*
94
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:sdk:1.4.2_07:*:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:sdk:1.4.2_07:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:sdk:1.4.2_07:*:*:*:*:*:*:*
95
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:sdk:1.4.2_08:*:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:sdk:1.4.2_08:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:sdk:1.4.2_08:*:*:*:*:*:*:*
96
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:sdk:1.4.2_09:*:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:sdk:1.4.2_09:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:sdk:1.4.2_09:*:*:*:*:*:*:*
97
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:sdk:1.4.2_10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:sdk:1.4.2_10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:sdk:1.4.2_10:*:*:*:*:*:*:*
98
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:sdk:1.4.2_11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:sdk:1.4.2_11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:sdk:1.4.2_11:*:*:*:*:*:*:*
99
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:sdk:1.4.2_12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:sdk:1.4.2_12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:sdk:1.4.2_12:*:*:*:*:*:*:*
100
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:sdk:1.4.2_13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:sdk:1.4.2_13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:sdk:1.4.2_13:*:*:*:*:*:*:*
101
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:sdk:1.4.2_14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:sdk:1.4.2_14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:sdk:1.4.2_14:*:*:*:*:*:*:*
102
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:sdk:1.4.2_15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:sdk:1.4.2_15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:sdk:1.4.2_15:*:*:*:*:*:*:*
103
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:sdk:1.4.2_16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:sdk:1.4.2_16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:sdk:1.4.2_16:*:*:*:*:*:*:*
104
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:sdk:1.4.2_17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:sdk:1.4.2_17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:sdk:1.4.2_17:*:*:*:*:*:*:*
105
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-3113
reference_id CVE-2008-3113
reference_type
scores
0
value 10.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2008-3113
106
reference_url https://security.gentoo.org/glsa/200911-02
reference_id GLSA-200911-02
reference_type
scores
url https://security.gentoo.org/glsa/200911-02
107
reference_url https://access.redhat.com/errata/RHSA-2008:0595
reference_id RHSA-2008:0595
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0595
108
reference_url https://access.redhat.com/errata/RHSA-2008:0636
reference_id RHSA-2008:0636
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0636
109
reference_url https://access.redhat.com/errata/RHSA-2008:0638
reference_id RHSA-2008:0638
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0638
110
reference_url https://access.redhat.com/errata/RHSA-2008:0790
reference_id RHSA-2008:0790
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0790
111
reference_url https://access.redhat.com/errata/RHSA-2008:0955
reference_id RHSA-2008:0955
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0955
Weaknesses
0
cwe_id 264
name Permissions, Privileges, and Access Controls
description Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Exploits
Severity_range_score10.0 - 10.0
Exploitability0.5
Weighted_severity9.0
Risk_score4.5
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-9uxa-vqmq-kug5