Search for vulnerabilities
Vulnerability details: VCID-283g-nyvx-aaam
Vulnerability ID VCID-283g-nyvx-aaam
Aliases CVE-2006-6737
Summary CVE-2006-6737 security flaw
Status Published
Exploitability 0.5
Weighted Severity 9.0
Risk 4.5
Affected and Fixed Packages Package Details
Weaknesses (0)
There are no known CWE.
System Score Found at
rhas Critical https://access.redhat.com/errata/RHSA-2007:0062
rhas Critical https://access.redhat.com/errata/RHSA-2007:0072
rhas Critical https://access.redhat.com/errata/RHSA-2007:0073
epss 0.00570 https://api.first.org/data/v1/epss?cve=CVE-2006-6737
epss 0.00808 https://api.first.org/data/v1/epss?cve=CVE-2006-6737
epss 0.00808 https://api.first.org/data/v1/epss?cve=CVE-2006-6737
epss 0.00808 https://api.first.org/data/v1/epss?cve=CVE-2006-6737
epss 0.00808 https://api.first.org/data/v1/epss?cve=CVE-2006-6737
epss 0.00808 https://api.first.org/data/v1/epss?cve=CVE-2006-6737
epss 0.00808 https://api.first.org/data/v1/epss?cve=CVE-2006-6737
epss 0.00808 https://api.first.org/data/v1/epss?cve=CVE-2006-6737
epss 0.00808 https://api.first.org/data/v1/epss?cve=CVE-2006-6737
epss 0.00808 https://api.first.org/data/v1/epss?cve=CVE-2006-6737
epss 0.00808 https://api.first.org/data/v1/epss?cve=CVE-2006-6737
epss 0.00808 https://api.first.org/data/v1/epss?cve=CVE-2006-6737
epss 0.0136 https://api.first.org/data/v1/epss?cve=CVE-2006-6737
epss 0.0136 https://api.first.org/data/v1/epss?cve=CVE-2006-6737
epss 0.0136 https://api.first.org/data/v1/epss?cve=CVE-2006-6737
epss 0.0136 https://api.first.org/data/v1/epss?cve=CVE-2006-6737
epss 0.0136 https://api.first.org/data/v1/epss?cve=CVE-2006-6737
epss 0.0136 https://api.first.org/data/v1/epss?cve=CVE-2006-6737
epss 0.0136 https://api.first.org/data/v1/epss?cve=CVE-2006-6737
epss 0.0136 https://api.first.org/data/v1/epss?cve=CVE-2006-6737
epss 0.0136 https://api.first.org/data/v1/epss?cve=CVE-2006-6737
epss 0.0136 https://api.first.org/data/v1/epss?cve=CVE-2006-6737
epss 0.0136 https://api.first.org/data/v1/epss?cve=CVE-2006-6737
epss 0.0136 https://api.first.org/data/v1/epss?cve=CVE-2006-6737
epss 0.0136 https://api.first.org/data/v1/epss?cve=CVE-2006-6737
epss 0.0136 https://api.first.org/data/v1/epss?cve=CVE-2006-6737
epss 0.0136 https://api.first.org/data/v1/epss?cve=CVE-2006-6737
epss 0.0136 https://api.first.org/data/v1/epss?cve=CVE-2006-6737
epss 0.0136 https://api.first.org/data/v1/epss?cve=CVE-2006-6737
epss 0.0136 https://api.first.org/data/v1/epss?cve=CVE-2006-6737
epss 0.0136 https://api.first.org/data/v1/epss?cve=CVE-2006-6737
epss 0.0136 https://api.first.org/data/v1/epss?cve=CVE-2006-6737
epss 0.0136 https://api.first.org/data/v1/epss?cve=CVE-2006-6737
epss 0.0136 https://api.first.org/data/v1/epss?cve=CVE-2006-6737
epss 0.0136 https://api.first.org/data/v1/epss?cve=CVE-2006-6737
epss 0.0136 https://api.first.org/data/v1/epss?cve=CVE-2006-6737
epss 0.0136 https://api.first.org/data/v1/epss?cve=CVE-2006-6737
epss 0.0136 https://api.first.org/data/v1/epss?cve=CVE-2006-6737
epss 0.0136 https://api.first.org/data/v1/epss?cve=CVE-2006-6737
epss 0.0136 https://api.first.org/data/v1/epss?cve=CVE-2006-6737
epss 0.0136 https://api.first.org/data/v1/epss?cve=CVE-2006-6737
epss 0.0136 https://api.first.org/data/v1/epss?cve=CVE-2006-6737
epss 0.0136 https://api.first.org/data/v1/epss?cve=CVE-2006-6737
epss 0.0136 https://api.first.org/data/v1/epss?cve=CVE-2006-6737
epss 0.0136 https://api.first.org/data/v1/epss?cve=CVE-2006-6737
epss 0.0136 https://api.first.org/data/v1/epss?cve=CVE-2006-6737
epss 0.0136 https://api.first.org/data/v1/epss?cve=CVE-2006-6737
epss 0.0136 https://api.first.org/data/v1/epss?cve=CVE-2006-6737
epss 0.0136 https://api.first.org/data/v1/epss?cve=CVE-2006-6737
epss 0.0136 https://api.first.org/data/v1/epss?cve=CVE-2006-6737
epss 0.0136 https://api.first.org/data/v1/epss?cve=CVE-2006-6737
epss 0.0136 https://api.first.org/data/v1/epss?cve=CVE-2006-6737
epss 0.0136 https://api.first.org/data/v1/epss?cve=CVE-2006-6737
epss 0.0136 https://api.first.org/data/v1/epss?cve=CVE-2006-6737
epss 0.0136 https://api.first.org/data/v1/epss?cve=CVE-2006-6737
epss 0.0136 https://api.first.org/data/v1/epss?cve=CVE-2006-6737
epss 0.0136 https://api.first.org/data/v1/epss?cve=CVE-2006-6737
epss 0.0136 https://api.first.org/data/v1/epss?cve=CVE-2006-6737
epss 0.0136 https://api.first.org/data/v1/epss?cve=CVE-2006-6737
epss 0.0136 https://api.first.org/data/v1/epss?cve=CVE-2006-6737
epss 0.0136 https://api.first.org/data/v1/epss?cve=CVE-2006-6737
epss 0.0136 https://api.first.org/data/v1/epss?cve=CVE-2006-6737
epss 0.0136 https://api.first.org/data/v1/epss?cve=CVE-2006-6737
epss 0.0136 https://api.first.org/data/v1/epss?cve=CVE-2006-6737
epss 0.0136 https://api.first.org/data/v1/epss?cve=CVE-2006-6737
epss 0.0136 https://api.first.org/data/v1/epss?cve=CVE-2006-6737
epss 0.0136 https://api.first.org/data/v1/epss?cve=CVE-2006-6737
epss 0.0136 https://api.first.org/data/v1/epss?cve=CVE-2006-6737
epss 0.0136 https://api.first.org/data/v1/epss?cve=CVE-2006-6737
epss 0.0136 https://api.first.org/data/v1/epss?cve=CVE-2006-6737
epss 0.0136 https://api.first.org/data/v1/epss?cve=CVE-2006-6737
epss 0.0136 https://api.first.org/data/v1/epss?cve=CVE-2006-6737
epss 0.0136 https://api.first.org/data/v1/epss?cve=CVE-2006-6737
epss 0.0136 https://api.first.org/data/v1/epss?cve=CVE-2006-6737
epss 0.0136 https://api.first.org/data/v1/epss?cve=CVE-2006-6737
epss 0.0136 https://api.first.org/data/v1/epss?cve=CVE-2006-6737
epss 0.0136 https://api.first.org/data/v1/epss?cve=CVE-2006-6737
epss 0.0136 https://api.first.org/data/v1/epss?cve=CVE-2006-6737
epss 0.0136 https://api.first.org/data/v1/epss?cve=CVE-2006-6737
epss 0.0136 https://api.first.org/data/v1/epss?cve=CVE-2006-6737
epss 0.0136 https://api.first.org/data/v1/epss?cve=CVE-2006-6737
epss 0.0136 https://api.first.org/data/v1/epss?cve=CVE-2006-6737
epss 0.02575 https://api.first.org/data/v1/epss?cve=CVE-2006-6737
epss 0.05071 https://api.first.org/data/v1/epss?cve=CVE-2006-6737
epss 0.05071 https://api.first.org/data/v1/epss?cve=CVE-2006-6737
epss 0.05071 https://api.first.org/data/v1/epss?cve=CVE-2006-6737
epss 0.05071 https://api.first.org/data/v1/epss?cve=CVE-2006-6737
rhbs high https://bugzilla.redhat.com/show_bug.cgi?id=1618252
cvssv2 4.3 https://nvd.nist.gov/vuln/detail/CVE-2006-6737
Reference id Reference type URL
http://lists.suse.com/archive/suse-security-announce/2007-Jan/0003.html
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-6737.json
https://api.first.org/data/v1/epss?cve=CVE-2006-6737
http://secunia.com/advisories/23398
http://secunia.com/advisories/23650
http://secunia.com/advisories/23835
http://secunia.com/advisories/24099
http://secunia.com/advisories/24189
http://secunia.com/advisories/25404
http://secunia.com/advisories/26049
http://secunia.com/advisories/26119
http://security.gentoo.org/glsa/glsa-200701-15.xml
http://security.gentoo.org/glsa/glsa-200702-08.xml
http://securitytracker.com/id?1017427
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11087
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102732-1
http://support.novell.com/techcenter/psdb/4f850d1e2b871db609de64ec70f0089c.html
http://support.novell.com/techcenter/psdb/d2f549cc040cd81ae4a268bb5edfe918.html
http://www.gentoo.org/security/en/glsa/glsa-200705-20.xml
http://www.novell.com/linux/security/advisories/2007_10_ibmjava.html
http://www.novell.com/linux/security/advisories/2007_45_java.html
http://www.redhat.com/support/errata/RHSA-2007-0062.html
http://www.redhat.com/support/errata/RHSA-2007-0072.html
http://www.redhat.com/support/errata/RHSA-2007-0073.html
http://www.securityfocus.com/bid/21674
http://www.vupen.com/english/advisories/2006/5075
1618252 https://bugzilla.redhat.com/show_bug.cgi?id=1618252
cpe:2.3:a:sun:jdk:1.5.0:-:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.5.0:-:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.5.0:update1:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update2:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.5.0:update2:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update3:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.5.0:update3:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update4:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.5.0:update4:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.5.0:update5:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.5.0:update5:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.3.1:-:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.3.1:-:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.3.1_03:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.3.1_03:*:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.3.1_04:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.3.1_04:*:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.3.1_05:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.3.1_05:*:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.3.1_06:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.3.1_06:*:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.3.1_07:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.3.1_07:*:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.3.1_08:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.3.1_08:*:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.3.1_09:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.3.1_09:*:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.3.1_10:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.3.1_10:*:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.3.1_11:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.3.1_11:*:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.3.1_12:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.3.1_12:*:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.3.1_13:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.3.1_13:*:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.3.1_14:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.3.1_14:*:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.3.1_15:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.3.1_15:*:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.3.1_16:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.3.1_16:*:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.3.1_17:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.3.1_17:*:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.3.1_18:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.3.1_18:*:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.3.1_2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.3.1_2:*:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.4.2:-:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.4.2:-:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.4.2_1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.4.2_1:*:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.4.2_10:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.4.2_10:*:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.4.2_2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.4.2_2:*:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.4.2_3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.4.2_3:*:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.4.2_4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.4.2_4:*:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.4.2_5:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.4.2_5:*:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.4.2_6:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.4.2_6:*:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.4.2_7:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.4.2_7:*:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.4.2_8:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.4.2_8:*:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.4.2_9:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.4.2_9:*:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:-:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.5.0:-:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.5.0:update1:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update2:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.5.0:update2:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update3:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.5.0:update3:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update4:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.5.0:update4:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update5:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.5.0:update5:*:*:*:*:*:*
cpe:2.3:a:sun:sdk:1.3.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:sdk:1.3.1:*:*:*:*:*:*:*
cpe:2.3:a:sun:sdk:1.3.1_01:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:sdk:1.3.1_01:*:*:*:*:*:*:*
cpe:2.3:a:sun:sdk:1.3.1_01a:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:sdk:1.3.1_01a:*:*:*:*:*:*:*
cpe:2.3:a:sun:sdk:1.3.1_02:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:sdk:1.3.1_02:*:*:*:*:*:*:*
cpe:2.3:a:sun:sdk:1.3.1_03:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:sdk:1.3.1_03:*:*:*:*:*:*:*
cpe:2.3:a:sun:sdk:1.3.1_04:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:sdk:1.3.1_04:*:*:*:*:*:*:*
cpe:2.3:a:sun:sdk:1.3.1_05:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:sdk:1.3.1_05:*:*:*:*:*:*:*
cpe:2.3:a:sun:sdk:1.3.1_06:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:sdk:1.3.1_06:*:*:*:*:*:*:*
cpe:2.3:a:sun:sdk:1.3.1_07:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:sdk:1.3.1_07:*:*:*:*:*:*:*
cpe:2.3:a:sun:sdk:1.3.1_08:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:sdk:1.3.1_08:*:*:*:*:*:*:*
cpe:2.3:a:sun:sdk:1.3.1_09:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:sdk:1.3.1_09:*:*:*:*:*:*:*
cpe:2.3:a:sun:sdk:1.3.1_10:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:sdk:1.3.1_10:*:*:*:*:*:*:*
cpe:2.3:a:sun:sdk:1.3.1_11:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:sdk:1.3.1_11:*:*:*:*:*:*:*
cpe:2.3:a:sun:sdk:1.3.1_12:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:sdk:1.3.1_12:*:*:*:*:*:*:*
cpe:2.3:a:sun:sdk:1.3.1_13:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:sdk:1.3.1_13:*:*:*:*:*:*:*
cpe:2.3:a:sun:sdk:1.3.1_14:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:sdk:1.3.1_14:*:*:*:*:*:*:*
cpe:2.3:a:sun:sdk:1.3.1_15:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:sdk:1.3.1_15:*:*:*:*:*:*:*
cpe:2.3:a:sun:sdk:1.3.1_16:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:sdk:1.3.1_16:*:*:*:*:*:*:*
cpe:2.3:a:sun:sdk:1.3.1_17:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:sdk:1.3.1_17:*:*:*:*:*:*:*
cpe:2.3:a:sun:sdk:1.3.1_18:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:sdk:1.3.1_18:*:*:*:*:*:*:*
cpe:2.3:a:sun:sdk:1.4.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:sdk:1.4.2:*:*:*:*:*:*:*
cpe:2.3:a:sun:sdk:1.4.2_1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:sdk:1.4.2_1:*:*:*:*:*:*:*
cpe:2.3:a:sun:sdk:1.4.2_10:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:sdk:1.4.2_10:*:*:*:*:*:*:*
cpe:2.3:a:sun:sdk:1.4.2_2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:sdk:1.4.2_2:*:*:*:*:*:*:*
cpe:2.3:a:sun:sdk:1.4.2_3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:sdk:1.4.2_3:*:*:*:*:*:*:*
cpe:2.3:a:sun:sdk:1.4.2_4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:sdk:1.4.2_4:*:*:*:*:*:*:*
cpe:2.3:a:sun:sdk:1.4.2_5:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:sdk:1.4.2_5:*:*:*:*:*:*:*
cpe:2.3:a:sun:sdk:1.4.2_6:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:sdk:1.4.2_6:*:*:*:*:*:*:*
cpe:2.3:a:sun:sdk:1.4.2_7:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:sdk:1.4.2_7:*:*:*:*:*:*:*
cpe:2.3:a:sun:sdk:1.4.2_8:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:sdk:1.4.2_8:*:*:*:*:*:*:*
cpe:2.3:a:sun:sdk:1.4.2_9:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:sdk:1.4.2_9:*:*:*:*:*:*:*
CVE-2006-6737 https://nvd.nist.gov/vuln/detail/CVE-2006-6737
GLSA-200701-15 https://security.gentoo.org/glsa/200701-15
GLSA-200702-08 https://security.gentoo.org/glsa/200702-08
GLSA-200705-20 https://security.gentoo.org/glsa/200705-20
RHSA-2007:0062 https://access.redhat.com/errata/RHSA-2007:0062
RHSA-2007:0072 https://access.redhat.com/errata/RHSA-2007:0072
RHSA-2007:0073 https://access.redhat.com/errata/RHSA-2007:0073
No exploits are available.
Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2006-6737
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Exploit Prediction Scoring System (EPSS)
Percentile 0.78298
EPSS Score 0.00570
Published At Nov. 1, 2024, midnight
Date Actor Action Source VulnerableCode Version
There are no relevant records.