Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-9qfc-f3y3-ufau
Summary
Multiple vulnerabilities in the Sun JDK and JRE allow for several attacks,
    including the remote execution of arbitrary code.
Aliases
0
alias CVE-2008-3115
Fixed_packages
0
url pkg:ebuild/app-emulation/emul-linux-x86-java@1.6.0.17
purl pkg:ebuild/app-emulation/emul-linux-x86-java@1.6.0.17
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/emul-linux-x86-java@1.6.0.17
1
url pkg:ebuild/dev-java/blackdown-jdk@1.6.0.17
purl pkg:ebuild/dev-java/blackdown-jdk@1.6.0.17
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/blackdown-jdk@1.6.0.17
2
url pkg:ebuild/dev-java/blackdown-jre@1.6.0.17
purl pkg:ebuild/dev-java/blackdown-jre@1.6.0.17
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/blackdown-jre@1.6.0.17
3
url pkg:ebuild/dev-java/sun-jdk@1.6.0.17
purl pkg:ebuild/dev-java/sun-jdk@1.6.0.17
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/sun-jdk@1.6.0.17
4
url pkg:ebuild/dev-java/sun-jre-bin@1.6.0.17
purl pkg:ebuild/dev-java/sun-jre-bin@1.6.0.17
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/sun-jre-bin@1.6.0.17
Affected_packages
0
url pkg:ebuild/app-emulation/emul-linux-x86-java@1.4.2.03-r14
purl pkg:ebuild/app-emulation/emul-linux-x86-java@1.4.2.03-r14
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1c8j-4sxr-sqen
1
vulnerability VCID-1kst-h6d9-tubd
2
vulnerability VCID-285c-8ke6-zqcq
3
vulnerability VCID-2dyz-h2nf-a3bt
4
vulnerability VCID-2k56-hznp-9kgx
5
vulnerability VCID-2tme-4a1p-gyh9
6
vulnerability VCID-3des-5j3d-kya4
7
vulnerability VCID-3f5w-6rwe-9fg9
8
vulnerability VCID-4csm-tktu-1ucx
9
vulnerability VCID-52ez-4mh7-p3g3
10
vulnerability VCID-52v7-ahwt-n7bj
11
vulnerability VCID-6ddf-kp2c-7fbx
12
vulnerability VCID-6dwj-y7qv-bkah
13
vulnerability VCID-7195-18yv-p7hb
14
vulnerability VCID-743r-weqs-97hp
15
vulnerability VCID-7kec-9nbt-8qh1
16
vulnerability VCID-8dsm-695w-9yfx
17
vulnerability VCID-8mq3-1c6d-n7a9
18
vulnerability VCID-8n29-pnkv-b7df
19
vulnerability VCID-96se-jpfu-hbhm
20
vulnerability VCID-9qfc-f3y3-ufau
21
vulnerability VCID-9u4b-8cpr-ekdb
22
vulnerability VCID-9uxa-vqmq-kug5
23
vulnerability VCID-9x9b-pd18-7qgm
24
vulnerability VCID-a6gd-ytpw-duan
25
vulnerability VCID-ame4-hxp9-g7bj
26
vulnerability VCID-ax8j-bncf-8yfv
27
vulnerability VCID-c5un-z1f5-wuhd
28
vulnerability VCID-cam8-v47g-hkg1
29
vulnerability VCID-dmsh-5f5y-kugu
30
vulnerability VCID-dwzr-6mms-gufq
31
vulnerability VCID-e5nw-x67y-hyeu
32
vulnerability VCID-e7t4-rgaz-4uec
33
vulnerability VCID-ebfs-tnbj-83gy
34
vulnerability VCID-f277-9qnr-e7cn
35
vulnerability VCID-f333-eghn-wkbk
36
vulnerability VCID-f7ux-3f7x-yugw
37
vulnerability VCID-fz23-zbk9-gugq
38
vulnerability VCID-g31s-n677-kye3
39
vulnerability VCID-gs9t-z7tn-5fhn
40
vulnerability VCID-hsr2-eksc-wkbq
41
vulnerability VCID-j2hy-fkcx-fkhh
42
vulnerability VCID-j4h4-nhsd-6bed
43
vulnerability VCID-jgc1-svry-fufd
44
vulnerability VCID-jhmy-yvgv-vqak
45
vulnerability VCID-jqm5-xd64-hkf4
46
vulnerability VCID-jtjm-tsyk-tud5
47
vulnerability VCID-ju9j-bz1n-2udp
48
vulnerability VCID-k4rr-5rxv-hqe8
49
vulnerability VCID-kh2a-vqze-rfcw
50
vulnerability VCID-kn3e-pb5g-euf1
51
vulnerability VCID-ks25-kdxj-m7cr
52
vulnerability VCID-m9ts-ympf-7fe9
53
vulnerability VCID-mayf-ewpk-eqfp
54
vulnerability VCID-mvu4-7vct-13fx
55
vulnerability VCID-nc2w-crs6-hyg1
56
vulnerability VCID-nqfb-gk4v-3ugv
57
vulnerability VCID-p2fp-hr1d-ske5
58
vulnerability VCID-pj8c-99t4-8khz
59
vulnerability VCID-pw32-g64g-cygx
60
vulnerability VCID-pzcs-z6ju-qbcg
61
vulnerability VCID-qyv2-ftjt-9ba5
62
vulnerability VCID-r6zf-rqn1-3fbk
63
vulnerability VCID-r911-4n39-ekb9
64
vulnerability VCID-rbap-5tnp-x3a7
65
vulnerability VCID-sakk-3wvn-tfhe
66
vulnerability VCID-sgk6-jd6h-nbhv
67
vulnerability VCID-t9d4-xfqz-sqaj
68
vulnerability VCID-th5x-zen3-yfdy
69
vulnerability VCID-th92-rtps-jba3
70
vulnerability VCID-tkmk-1f23-ubgq
71
vulnerability VCID-tpv7-d7p6-bbe6
72
vulnerability VCID-txfj-uzzx-4ue7
73
vulnerability VCID-tymd-uw95-q7b1
74
vulnerability VCID-tz7n-mxmc-63ek
75
vulnerability VCID-u26k-fk31-wbfc
76
vulnerability VCID-uxbc-8sru-c7a6
77
vulnerability VCID-vgct-q7vz-sfgx
78
vulnerability VCID-weda-ey6f-yuc4
79
vulnerability VCID-why8-v1se-h3fj
80
vulnerability VCID-x6d7-zzg2-eugz
81
vulnerability VCID-xfk5-vwgg-3bhp
82
vulnerability VCID-xnpr-ypxh-g3bn
83
vulnerability VCID-xt9m-tfuj-6uht
84
vulnerability VCID-y12r-7vqr-wqg5
85
vulnerability VCID-ypf2-kcj7-hfh5
86
vulnerability VCID-z522-d7z2-f7dr
87
vulnerability VCID-zbsh-w7k8-f7bp
88
vulnerability VCID-zd4q-75kh-zbfb
89
vulnerability VCID-zrz9-gmhf-cyh5
90
vulnerability VCID-ztfa-8pv5-uydc
91
vulnerability VCID-zy35-gkjy-tbfw
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/emul-linux-x86-java@1.4.2.03-r14
1
url pkg:ebuild/app-emulation/emul-linux-x86-java@1.4.2.03-r16
purl pkg:ebuild/app-emulation/emul-linux-x86-java@1.4.2.03-r16
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1c8j-4sxr-sqen
1
vulnerability VCID-1kst-h6d9-tubd
2
vulnerability VCID-285c-8ke6-zqcq
3
vulnerability VCID-2dyz-h2nf-a3bt
4
vulnerability VCID-2k56-hznp-9kgx
5
vulnerability VCID-2tme-4a1p-gyh9
6
vulnerability VCID-3des-5j3d-kya4
7
vulnerability VCID-3f5w-6rwe-9fg9
8
vulnerability VCID-4csm-tktu-1ucx
9
vulnerability VCID-52ez-4mh7-p3g3
10
vulnerability VCID-52v7-ahwt-n7bj
11
vulnerability VCID-6ddf-kp2c-7fbx
12
vulnerability VCID-6dwj-y7qv-bkah
13
vulnerability VCID-7195-18yv-p7hb
14
vulnerability VCID-743r-weqs-97hp
15
vulnerability VCID-7kec-9nbt-8qh1
16
vulnerability VCID-8dsm-695w-9yfx
17
vulnerability VCID-8mq3-1c6d-n7a9
18
vulnerability VCID-8n29-pnkv-b7df
19
vulnerability VCID-96se-jpfu-hbhm
20
vulnerability VCID-9qfc-f3y3-ufau
21
vulnerability VCID-9u4b-8cpr-ekdb
22
vulnerability VCID-9uxa-vqmq-kug5
23
vulnerability VCID-9x9b-pd18-7qgm
24
vulnerability VCID-a6gd-ytpw-duan
25
vulnerability VCID-ame4-hxp9-g7bj
26
vulnerability VCID-ax8j-bncf-8yfv
27
vulnerability VCID-c5un-z1f5-wuhd
28
vulnerability VCID-cam8-v47g-hkg1
29
vulnerability VCID-dmsh-5f5y-kugu
30
vulnerability VCID-dwzr-6mms-gufq
31
vulnerability VCID-e5nw-x67y-hyeu
32
vulnerability VCID-e7t4-rgaz-4uec
33
vulnerability VCID-ebfs-tnbj-83gy
34
vulnerability VCID-f277-9qnr-e7cn
35
vulnerability VCID-f333-eghn-wkbk
36
vulnerability VCID-f7ux-3f7x-yugw
37
vulnerability VCID-fz23-zbk9-gugq
38
vulnerability VCID-g31s-n677-kye3
39
vulnerability VCID-gs9t-z7tn-5fhn
40
vulnerability VCID-hsr2-eksc-wkbq
41
vulnerability VCID-j2hy-fkcx-fkhh
42
vulnerability VCID-j4h4-nhsd-6bed
43
vulnerability VCID-jgc1-svry-fufd
44
vulnerability VCID-jhmy-yvgv-vqak
45
vulnerability VCID-jqm5-xd64-hkf4
46
vulnerability VCID-jtjm-tsyk-tud5
47
vulnerability VCID-ju9j-bz1n-2udp
48
vulnerability VCID-k4rr-5rxv-hqe8
49
vulnerability VCID-kh2a-vqze-rfcw
50
vulnerability VCID-kn3e-pb5g-euf1
51
vulnerability VCID-ks25-kdxj-m7cr
52
vulnerability VCID-m9ts-ympf-7fe9
53
vulnerability VCID-mayf-ewpk-eqfp
54
vulnerability VCID-mvu4-7vct-13fx
55
vulnerability VCID-nc2w-crs6-hyg1
56
vulnerability VCID-nqfb-gk4v-3ugv
57
vulnerability VCID-p2fp-hr1d-ske5
58
vulnerability VCID-pj8c-99t4-8khz
59
vulnerability VCID-pw32-g64g-cygx
60
vulnerability VCID-pzcs-z6ju-qbcg
61
vulnerability VCID-qyv2-ftjt-9ba5
62
vulnerability VCID-r6zf-rqn1-3fbk
63
vulnerability VCID-r911-4n39-ekb9
64
vulnerability VCID-rbap-5tnp-x3a7
65
vulnerability VCID-sakk-3wvn-tfhe
66
vulnerability VCID-sgk6-jd6h-nbhv
67
vulnerability VCID-t9d4-xfqz-sqaj
68
vulnerability VCID-th5x-zen3-yfdy
69
vulnerability VCID-th92-rtps-jba3
70
vulnerability VCID-tkmk-1f23-ubgq
71
vulnerability VCID-tpv7-d7p6-bbe6
72
vulnerability VCID-txfj-uzzx-4ue7
73
vulnerability VCID-tymd-uw95-q7b1
74
vulnerability VCID-tz7n-mxmc-63ek
75
vulnerability VCID-u26k-fk31-wbfc
76
vulnerability VCID-uxbc-8sru-c7a6
77
vulnerability VCID-vgct-q7vz-sfgx
78
vulnerability VCID-weda-ey6f-yuc4
79
vulnerability VCID-why8-v1se-h3fj
80
vulnerability VCID-x6d7-zzg2-eugz
81
vulnerability VCID-xfk5-vwgg-3bhp
82
vulnerability VCID-xnpr-ypxh-g3bn
83
vulnerability VCID-xt9m-tfuj-6uht
84
vulnerability VCID-y12r-7vqr-wqg5
85
vulnerability VCID-ypf2-kcj7-hfh5
86
vulnerability VCID-z522-d7z2-f7dr
87
vulnerability VCID-zbsh-w7k8-f7bp
88
vulnerability VCID-zd4q-75kh-zbfb
89
vulnerability VCID-zrz9-gmhf-cyh5
90
vulnerability VCID-ztfa-8pv5-uydc
91
vulnerability VCID-zy35-gkjy-tbfw
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/emul-linux-x86-java@1.4.2.03-r16
2
url pkg:ebuild/dev-java/blackdown-jdk@1.4.2.03-r14
purl pkg:ebuild/dev-java/blackdown-jdk@1.4.2.03-r14
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1c8j-4sxr-sqen
1
vulnerability VCID-1kst-h6d9-tubd
2
vulnerability VCID-285c-8ke6-zqcq
3
vulnerability VCID-2dyz-h2nf-a3bt
4
vulnerability VCID-2k56-hznp-9kgx
5
vulnerability VCID-2tme-4a1p-gyh9
6
vulnerability VCID-3des-5j3d-kya4
7
vulnerability VCID-3f5w-6rwe-9fg9
8
vulnerability VCID-4csm-tktu-1ucx
9
vulnerability VCID-52ez-4mh7-p3g3
10
vulnerability VCID-52v7-ahwt-n7bj
11
vulnerability VCID-6ddf-kp2c-7fbx
12
vulnerability VCID-6dwj-y7qv-bkah
13
vulnerability VCID-7195-18yv-p7hb
14
vulnerability VCID-743r-weqs-97hp
15
vulnerability VCID-7kec-9nbt-8qh1
16
vulnerability VCID-8dsm-695w-9yfx
17
vulnerability VCID-8mq3-1c6d-n7a9
18
vulnerability VCID-8n29-pnkv-b7df
19
vulnerability VCID-96se-jpfu-hbhm
20
vulnerability VCID-9qfc-f3y3-ufau
21
vulnerability VCID-9u4b-8cpr-ekdb
22
vulnerability VCID-9uxa-vqmq-kug5
23
vulnerability VCID-9x9b-pd18-7qgm
24
vulnerability VCID-a6gd-ytpw-duan
25
vulnerability VCID-ame4-hxp9-g7bj
26
vulnerability VCID-ax8j-bncf-8yfv
27
vulnerability VCID-c5un-z1f5-wuhd
28
vulnerability VCID-cam8-v47g-hkg1
29
vulnerability VCID-dmsh-5f5y-kugu
30
vulnerability VCID-dwzr-6mms-gufq
31
vulnerability VCID-e5nw-x67y-hyeu
32
vulnerability VCID-e7t4-rgaz-4uec
33
vulnerability VCID-ebfs-tnbj-83gy
34
vulnerability VCID-f277-9qnr-e7cn
35
vulnerability VCID-f333-eghn-wkbk
36
vulnerability VCID-f7ux-3f7x-yugw
37
vulnerability VCID-fz23-zbk9-gugq
38
vulnerability VCID-g31s-n677-kye3
39
vulnerability VCID-gs9t-z7tn-5fhn
40
vulnerability VCID-hsr2-eksc-wkbq
41
vulnerability VCID-j2hy-fkcx-fkhh
42
vulnerability VCID-j4h4-nhsd-6bed
43
vulnerability VCID-jgc1-svry-fufd
44
vulnerability VCID-jhmy-yvgv-vqak
45
vulnerability VCID-jqm5-xd64-hkf4
46
vulnerability VCID-jtjm-tsyk-tud5
47
vulnerability VCID-ju9j-bz1n-2udp
48
vulnerability VCID-k4rr-5rxv-hqe8
49
vulnerability VCID-kh2a-vqze-rfcw
50
vulnerability VCID-kn3e-pb5g-euf1
51
vulnerability VCID-ks25-kdxj-m7cr
52
vulnerability VCID-m9ts-ympf-7fe9
53
vulnerability VCID-mayf-ewpk-eqfp
54
vulnerability VCID-mvu4-7vct-13fx
55
vulnerability VCID-nc2w-crs6-hyg1
56
vulnerability VCID-nqfb-gk4v-3ugv
57
vulnerability VCID-p2fp-hr1d-ske5
58
vulnerability VCID-pj8c-99t4-8khz
59
vulnerability VCID-pw32-g64g-cygx
60
vulnerability VCID-pzcs-z6ju-qbcg
61
vulnerability VCID-qyv2-ftjt-9ba5
62
vulnerability VCID-r6zf-rqn1-3fbk
63
vulnerability VCID-r911-4n39-ekb9
64
vulnerability VCID-rbap-5tnp-x3a7
65
vulnerability VCID-sakk-3wvn-tfhe
66
vulnerability VCID-sgk6-jd6h-nbhv
67
vulnerability VCID-t9d4-xfqz-sqaj
68
vulnerability VCID-th5x-zen3-yfdy
69
vulnerability VCID-th92-rtps-jba3
70
vulnerability VCID-tkmk-1f23-ubgq
71
vulnerability VCID-tpv7-d7p6-bbe6
72
vulnerability VCID-txfj-uzzx-4ue7
73
vulnerability VCID-tymd-uw95-q7b1
74
vulnerability VCID-tz7n-mxmc-63ek
75
vulnerability VCID-u26k-fk31-wbfc
76
vulnerability VCID-uxbc-8sru-c7a6
77
vulnerability VCID-vgct-q7vz-sfgx
78
vulnerability VCID-weda-ey6f-yuc4
79
vulnerability VCID-why8-v1se-h3fj
80
vulnerability VCID-x6d7-zzg2-eugz
81
vulnerability VCID-xfk5-vwgg-3bhp
82
vulnerability VCID-xnpr-ypxh-g3bn
83
vulnerability VCID-xt9m-tfuj-6uht
84
vulnerability VCID-y12r-7vqr-wqg5
85
vulnerability VCID-ypf2-kcj7-hfh5
86
vulnerability VCID-z522-d7z2-f7dr
87
vulnerability VCID-zbsh-w7k8-f7bp
88
vulnerability VCID-zd4q-75kh-zbfb
89
vulnerability VCID-zrz9-gmhf-cyh5
90
vulnerability VCID-ztfa-8pv5-uydc
91
vulnerability VCID-zy35-gkjy-tbfw
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/blackdown-jdk@1.4.2.03-r14
3
url pkg:ebuild/dev-java/blackdown-jdk@1.4.2.03-r16
purl pkg:ebuild/dev-java/blackdown-jdk@1.4.2.03-r16
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1c8j-4sxr-sqen
1
vulnerability VCID-1kst-h6d9-tubd
2
vulnerability VCID-285c-8ke6-zqcq
3
vulnerability VCID-2dyz-h2nf-a3bt
4
vulnerability VCID-2k56-hznp-9kgx
5
vulnerability VCID-2tme-4a1p-gyh9
6
vulnerability VCID-3des-5j3d-kya4
7
vulnerability VCID-3f5w-6rwe-9fg9
8
vulnerability VCID-4csm-tktu-1ucx
9
vulnerability VCID-52ez-4mh7-p3g3
10
vulnerability VCID-52v7-ahwt-n7bj
11
vulnerability VCID-6ddf-kp2c-7fbx
12
vulnerability VCID-6dwj-y7qv-bkah
13
vulnerability VCID-7195-18yv-p7hb
14
vulnerability VCID-743r-weqs-97hp
15
vulnerability VCID-7kec-9nbt-8qh1
16
vulnerability VCID-8dsm-695w-9yfx
17
vulnerability VCID-8mq3-1c6d-n7a9
18
vulnerability VCID-8n29-pnkv-b7df
19
vulnerability VCID-96se-jpfu-hbhm
20
vulnerability VCID-9qfc-f3y3-ufau
21
vulnerability VCID-9u4b-8cpr-ekdb
22
vulnerability VCID-9uxa-vqmq-kug5
23
vulnerability VCID-9x9b-pd18-7qgm
24
vulnerability VCID-a6gd-ytpw-duan
25
vulnerability VCID-ame4-hxp9-g7bj
26
vulnerability VCID-ax8j-bncf-8yfv
27
vulnerability VCID-c5un-z1f5-wuhd
28
vulnerability VCID-cam8-v47g-hkg1
29
vulnerability VCID-dmsh-5f5y-kugu
30
vulnerability VCID-dwzr-6mms-gufq
31
vulnerability VCID-e5nw-x67y-hyeu
32
vulnerability VCID-e7t4-rgaz-4uec
33
vulnerability VCID-ebfs-tnbj-83gy
34
vulnerability VCID-f277-9qnr-e7cn
35
vulnerability VCID-f333-eghn-wkbk
36
vulnerability VCID-f7ux-3f7x-yugw
37
vulnerability VCID-fz23-zbk9-gugq
38
vulnerability VCID-g31s-n677-kye3
39
vulnerability VCID-gs9t-z7tn-5fhn
40
vulnerability VCID-hsr2-eksc-wkbq
41
vulnerability VCID-j2hy-fkcx-fkhh
42
vulnerability VCID-j4h4-nhsd-6bed
43
vulnerability VCID-jgc1-svry-fufd
44
vulnerability VCID-jhmy-yvgv-vqak
45
vulnerability VCID-jqm5-xd64-hkf4
46
vulnerability VCID-jtjm-tsyk-tud5
47
vulnerability VCID-ju9j-bz1n-2udp
48
vulnerability VCID-k4rr-5rxv-hqe8
49
vulnerability VCID-kh2a-vqze-rfcw
50
vulnerability VCID-kn3e-pb5g-euf1
51
vulnerability VCID-ks25-kdxj-m7cr
52
vulnerability VCID-m9ts-ympf-7fe9
53
vulnerability VCID-mayf-ewpk-eqfp
54
vulnerability VCID-mvu4-7vct-13fx
55
vulnerability VCID-nc2w-crs6-hyg1
56
vulnerability VCID-nqfb-gk4v-3ugv
57
vulnerability VCID-p2fp-hr1d-ske5
58
vulnerability VCID-pj8c-99t4-8khz
59
vulnerability VCID-pw32-g64g-cygx
60
vulnerability VCID-pzcs-z6ju-qbcg
61
vulnerability VCID-qyv2-ftjt-9ba5
62
vulnerability VCID-r6zf-rqn1-3fbk
63
vulnerability VCID-r911-4n39-ekb9
64
vulnerability VCID-rbap-5tnp-x3a7
65
vulnerability VCID-sakk-3wvn-tfhe
66
vulnerability VCID-sgk6-jd6h-nbhv
67
vulnerability VCID-t9d4-xfqz-sqaj
68
vulnerability VCID-th5x-zen3-yfdy
69
vulnerability VCID-th92-rtps-jba3
70
vulnerability VCID-tkmk-1f23-ubgq
71
vulnerability VCID-tpv7-d7p6-bbe6
72
vulnerability VCID-txfj-uzzx-4ue7
73
vulnerability VCID-tymd-uw95-q7b1
74
vulnerability VCID-tz7n-mxmc-63ek
75
vulnerability VCID-u26k-fk31-wbfc
76
vulnerability VCID-uxbc-8sru-c7a6
77
vulnerability VCID-vgct-q7vz-sfgx
78
vulnerability VCID-weda-ey6f-yuc4
79
vulnerability VCID-why8-v1se-h3fj
80
vulnerability VCID-x6d7-zzg2-eugz
81
vulnerability VCID-xfk5-vwgg-3bhp
82
vulnerability VCID-xnpr-ypxh-g3bn
83
vulnerability VCID-xt9m-tfuj-6uht
84
vulnerability VCID-y12r-7vqr-wqg5
85
vulnerability VCID-ypf2-kcj7-hfh5
86
vulnerability VCID-z522-d7z2-f7dr
87
vulnerability VCID-zbsh-w7k8-f7bp
88
vulnerability VCID-zd4q-75kh-zbfb
89
vulnerability VCID-zrz9-gmhf-cyh5
90
vulnerability VCID-ztfa-8pv5-uydc
91
vulnerability VCID-zy35-gkjy-tbfw
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/blackdown-jdk@1.4.2.03-r16
4
url pkg:ebuild/dev-java/blackdown-jre@1.4.2.03-r14
purl pkg:ebuild/dev-java/blackdown-jre@1.4.2.03-r14
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1c8j-4sxr-sqen
1
vulnerability VCID-1kst-h6d9-tubd
2
vulnerability VCID-285c-8ke6-zqcq
3
vulnerability VCID-2dyz-h2nf-a3bt
4
vulnerability VCID-2k56-hznp-9kgx
5
vulnerability VCID-2tme-4a1p-gyh9
6
vulnerability VCID-3des-5j3d-kya4
7
vulnerability VCID-3f5w-6rwe-9fg9
8
vulnerability VCID-4csm-tktu-1ucx
9
vulnerability VCID-52ez-4mh7-p3g3
10
vulnerability VCID-52v7-ahwt-n7bj
11
vulnerability VCID-6ddf-kp2c-7fbx
12
vulnerability VCID-6dwj-y7qv-bkah
13
vulnerability VCID-7195-18yv-p7hb
14
vulnerability VCID-743r-weqs-97hp
15
vulnerability VCID-7kec-9nbt-8qh1
16
vulnerability VCID-8dsm-695w-9yfx
17
vulnerability VCID-8mq3-1c6d-n7a9
18
vulnerability VCID-8n29-pnkv-b7df
19
vulnerability VCID-96se-jpfu-hbhm
20
vulnerability VCID-9qfc-f3y3-ufau
21
vulnerability VCID-9u4b-8cpr-ekdb
22
vulnerability VCID-9uxa-vqmq-kug5
23
vulnerability VCID-9x9b-pd18-7qgm
24
vulnerability VCID-a6gd-ytpw-duan
25
vulnerability VCID-ame4-hxp9-g7bj
26
vulnerability VCID-ax8j-bncf-8yfv
27
vulnerability VCID-c5un-z1f5-wuhd
28
vulnerability VCID-cam8-v47g-hkg1
29
vulnerability VCID-dmsh-5f5y-kugu
30
vulnerability VCID-dwzr-6mms-gufq
31
vulnerability VCID-e5nw-x67y-hyeu
32
vulnerability VCID-e7t4-rgaz-4uec
33
vulnerability VCID-ebfs-tnbj-83gy
34
vulnerability VCID-f277-9qnr-e7cn
35
vulnerability VCID-f333-eghn-wkbk
36
vulnerability VCID-f7ux-3f7x-yugw
37
vulnerability VCID-fz23-zbk9-gugq
38
vulnerability VCID-g31s-n677-kye3
39
vulnerability VCID-gs9t-z7tn-5fhn
40
vulnerability VCID-hsr2-eksc-wkbq
41
vulnerability VCID-j2hy-fkcx-fkhh
42
vulnerability VCID-j4h4-nhsd-6bed
43
vulnerability VCID-jgc1-svry-fufd
44
vulnerability VCID-jhmy-yvgv-vqak
45
vulnerability VCID-jqm5-xd64-hkf4
46
vulnerability VCID-jtjm-tsyk-tud5
47
vulnerability VCID-ju9j-bz1n-2udp
48
vulnerability VCID-k4rr-5rxv-hqe8
49
vulnerability VCID-kh2a-vqze-rfcw
50
vulnerability VCID-kn3e-pb5g-euf1
51
vulnerability VCID-ks25-kdxj-m7cr
52
vulnerability VCID-m9ts-ympf-7fe9
53
vulnerability VCID-mayf-ewpk-eqfp
54
vulnerability VCID-mvu4-7vct-13fx
55
vulnerability VCID-nc2w-crs6-hyg1
56
vulnerability VCID-nqfb-gk4v-3ugv
57
vulnerability VCID-p2fp-hr1d-ske5
58
vulnerability VCID-pj8c-99t4-8khz
59
vulnerability VCID-pw32-g64g-cygx
60
vulnerability VCID-pzcs-z6ju-qbcg
61
vulnerability VCID-qyv2-ftjt-9ba5
62
vulnerability VCID-r6zf-rqn1-3fbk
63
vulnerability VCID-r911-4n39-ekb9
64
vulnerability VCID-rbap-5tnp-x3a7
65
vulnerability VCID-sakk-3wvn-tfhe
66
vulnerability VCID-sgk6-jd6h-nbhv
67
vulnerability VCID-t9d4-xfqz-sqaj
68
vulnerability VCID-th5x-zen3-yfdy
69
vulnerability VCID-th92-rtps-jba3
70
vulnerability VCID-tkmk-1f23-ubgq
71
vulnerability VCID-tpv7-d7p6-bbe6
72
vulnerability VCID-txfj-uzzx-4ue7
73
vulnerability VCID-tymd-uw95-q7b1
74
vulnerability VCID-tz7n-mxmc-63ek
75
vulnerability VCID-u26k-fk31-wbfc
76
vulnerability VCID-uxbc-8sru-c7a6
77
vulnerability VCID-vgct-q7vz-sfgx
78
vulnerability VCID-weda-ey6f-yuc4
79
vulnerability VCID-why8-v1se-h3fj
80
vulnerability VCID-x6d7-zzg2-eugz
81
vulnerability VCID-xfk5-vwgg-3bhp
82
vulnerability VCID-xnpr-ypxh-g3bn
83
vulnerability VCID-xt9m-tfuj-6uht
84
vulnerability VCID-y12r-7vqr-wqg5
85
vulnerability VCID-ypf2-kcj7-hfh5
86
vulnerability VCID-z522-d7z2-f7dr
87
vulnerability VCID-zbsh-w7k8-f7bp
88
vulnerability VCID-zd4q-75kh-zbfb
89
vulnerability VCID-zrz9-gmhf-cyh5
90
vulnerability VCID-ztfa-8pv5-uydc
91
vulnerability VCID-zy35-gkjy-tbfw
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/blackdown-jre@1.4.2.03-r14
References
0
reference_url http://lists.apple.com/archives/security-announce//2008/Sep/msg00008.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce//2008/Sep/msg00008.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00005.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00005.html
2
reference_url http://marc.info/?l=bugtraq&m=122331139823057&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=122331139823057&w=2
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-3115
reference_id
reference_type
scores
0
value 0.2557
scoring_system epss
scoring_elements 0.96229
published_at 2026-04-13T12:55:00Z
1
value 0.2557
scoring_system epss
scoring_elements 0.96191
published_at 2026-04-01T12:55:00Z
2
value 0.2557
scoring_system epss
scoring_elements 0.96199
published_at 2026-04-02T12:55:00Z
3
value 0.2557
scoring_system epss
scoring_elements 0.96206
published_at 2026-04-04T12:55:00Z
4
value 0.2557
scoring_system epss
scoring_elements 0.96211
published_at 2026-04-07T12:55:00Z
5
value 0.2557
scoring_system epss
scoring_elements 0.9622
published_at 2026-04-08T12:55:00Z
6
value 0.2557
scoring_system epss
scoring_elements 0.96224
published_at 2026-04-09T12:55:00Z
7
value 0.2557
scoring_system epss
scoring_elements 0.96228
published_at 2026-04-11T12:55:00Z
8
value 0.2557
scoring_system epss
scoring_elements 0.96227
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-3115
4
reference_url http://secunia.com/advisories/31010
reference_id
reference_type
scores
url http://secunia.com/advisories/31010
5
reference_url http://secunia.com/advisories/31600
reference_id
reference_type
scores
url http://secunia.com/advisories/31600
6
reference_url http://secunia.com/advisories/32018
reference_id
reference_type
scores
url http://secunia.com/advisories/32018
7
reference_url http://secunia.com/advisories/32179
reference_id
reference_type
scores
url http://secunia.com/advisories/32179
8
reference_url http://secunia.com/advisories/32180
reference_id
reference_type
scores
url http://secunia.com/advisories/32180
9
reference_url http://secunia.com/advisories/37386
reference_id
reference_type
scores
url http://secunia.com/advisories/37386
10
reference_url http://security.gentoo.org/glsa/glsa-200911-02.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200911-02.xml
11
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/43665
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/43665
12
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-66-238966-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-66-238966-1
13
reference_url http://support.apple.com/kb/HT3178
reference_id
reference_type
scores
url http://support.apple.com/kb/HT3178
14
reference_url http://support.apple.com/kb/HT3179
reference_id
reference_type
scores
url http://support.apple.com/kb/HT3179
15
reference_url http://www.securityfocus.com/archive/1/497041/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/497041/100/0/threaded
16
reference_url http://www.securityfocus.com/bid/30142
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/30142
17
reference_url http://www.securitytracker.com/id?1020460
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1020460
18
reference_url http://www.us-cert.gov/cas/techalerts/TA08-193A.html
reference_id
reference_type
scores
url http://www.us-cert.gov/cas/techalerts/TA08-193A.html
19
reference_url http://www.vmware.com/security/advisories/VMSA-2008-0016.html
reference_id
reference_type
scores
url http://www.vmware.com/security/advisories/VMSA-2008-0016.html
20
reference_url http://www.vupen.com/english/advisories/2008/2056/references
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2056/references
21
reference_url http://www.vupen.com/english/advisories/2008/2740
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2740
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:5.0:update_10:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jdk:5.0:update_10:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:5.0:update_10:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:5.0:update_11:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jdk:5.0:update_11:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:5.0:update_11:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:5.0:update_12:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jdk:5.0:update_12:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:5.0:update_12:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:5.0:update_13:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jdk:5.0:update_13:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:5.0:update_13:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:5.0:update_14:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jdk:5.0:update_14:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:5.0:update_14:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:5.0:update_15:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jdk:5.0:update_15:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:5.0:update_15:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:5.0:update_6:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jdk:5.0:update_6:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:5.0:update_6:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:5.0:update_7:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jdk:5.0:update_7:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:5.0:update_7:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:5.0:update_8:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jdk:5.0:update_8:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:5.0:update_8:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:5.0:update_9:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jdk:5.0:update_9:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:5.0:update_9:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:6:update_1:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jdk:6:update_1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:6:update_1:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:6:update_2:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jdk:6:update_2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:6:update_2:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:6:update_3:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jdk:6:update_3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:6:update_3:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:6:update_4:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jdk:6:update_4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:6:update_4:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:6:update_5:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jdk:6:update_5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:6:update_5:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:*:update_6:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jdk:*:update_6:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:*:update_6:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:5.0:update_10:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jre:5.0:update_10:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:5.0:update_10:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:5.0:update_11:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jre:5.0:update_11:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:5.0:update_11:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:5.0:update_12:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jre:5.0:update_12:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:5.0:update_12:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:5.0:update_13:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jre:5.0:update_13:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:5.0:update_13:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:5.0:update_14:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jre:5.0:update_14:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:5.0:update_14:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:5.0:update_15:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jre:5.0:update_15:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:5.0:update_15:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:5.0:update_6:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jre:5.0:update_6:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:5.0:update_6:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:5.0:update_7:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jre:5.0:update_7:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:5.0:update_7:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:5.0:update_8:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jre:5.0:update_8:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:5.0:update_8:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:5.0:update_9:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jre:5.0:update_9:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:5.0:update_9:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:6:update_1:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jre:6:update_1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:6:update_1:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:6:update_2:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jre:6:update_2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:6:update_2:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:6:update_3:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jre:6:update_3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:6:update_3:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:6:update_4:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jre:6:update_4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:6:update_4:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:6:update_5:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jre:6:update_5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:6:update_5:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:*:update_6:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:jre:*:update_6:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:*:update_6:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-3115
reference_id CVE-2008-3115
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2008-3115
55
reference_url https://security.gentoo.org/glsa/200911-02
reference_id GLSA-200911-02
reference_type
scores
url https://security.gentoo.org/glsa/200911-02
Weaknesses
0
cwe_id 16
name Configuration
description Weaknesses in this category are typically introduced during the configuration of the software.
Exploits
Severity_range_score7.5 - 7.5
Exploitability0.5
Weighted_severity6.8
Risk_score3.4
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-9qfc-f3y3-ufau