Search for vulnerabilities
| Vulnerability ID | VCID-rrdj-ssn7-zfdj |
| Aliases |
CVE-2010-4476
GHSA-gvgc-rxmh-5hvw |
| Summary | The Double.parseDouble method in Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, 5.0 Update 27 and earlier, and 1.4.2_29 and earlier, as used in OpenJDK, Apache, JBossweb, and other products, allows remote attackers to cause a denial of service via a crafted string that triggers an infinite loop of estimations during conversion to a double-precision binary floating-point number, as demonstrated using 2.2250738585072012e-308. |
| Status | Published |
| Exploitability | 2.0 |
| Weighted Severity | 6.2 |
| Risk | 10.0 |
| Affected and Fixed Packages | Package Details |
| There are no known CWE. |
| Data source | Exploit-DB |
|---|---|
| Date added | Feb. 1, 2011 |
| Description | Oracle Java - Floating-Point Value Denial of Service |
| Ransomware campaign use | Known |
| Source publication date | Feb. 1, 2011 |
| Exploit type | dos |
| Platform | multiple |
| Source update date | Nov. 20, 2014 |
| Source URL | https://www.securityfocus.com/bid/46091/info |
| Exploitability (E) | Access Vector (AV) | Access Complexity (AC) | Authentication (Au) | Confidentiality Impact (C) | Integrity Impact (I) | Availability Impact (A) |
|---|---|---|---|---|---|---|
high functional unproven proof_of_concept not_defined |
local adjacent_network network |
high medium low |
multiple single none |
none partial complete |
none partial complete |
none partial complete |
| Percentile | 0.97576 |
| EPSS Score | 0.45147 |
| Published At | April 1, 2026, 12:55 p.m. |
| Date | Actor | Action | Source | VulnerableCode Version |
|---|---|---|---|---|
| 2026-04-01T12:38:20.644421+00:00 | ProjectKB MSRImporter | Import | https://raw.githubusercontent.com/SAP/project-kb/master/MSR2019/dataset/vulas_db_msr2019_release.csv | 38.0.0 |