Search for vulnerabilities
| Vulnerability ID | VCID-99pg-zyzv-7fdt |
| Aliases |
CVE-2010-3552
|
| Summary | Multiple vulnerabilities have been found in the Oracle JRE/JDK, allowing attackers to cause unspecified impact. |
| Status | Published |
| Exploitability | 2.0 |
| Weighted Severity | 9.0 |
| Risk | 10.0 |
| Affected and Fixed Packages | Package Details |
| There are no known CWE. |
| System | Score | Found at |
|---|---|---|
| epss | 0.82665 | https://api.first.org/data/v1/epss?cve=CVE-2010-3552 |
| epss | 0.82665 | https://api.first.org/data/v1/epss?cve=CVE-2010-3552 |
| epss | 0.82665 | https://api.first.org/data/v1/epss?cve=CVE-2010-3552 |
| epss | 0.82947 | https://api.first.org/data/v1/epss?cve=CVE-2010-3552 |
| epss | 0.82947 | https://api.first.org/data/v1/epss?cve=CVE-2010-3552 |
| epss | 0.82947 | https://api.first.org/data/v1/epss?cve=CVE-2010-3552 |
| epss | 0.82947 | https://api.first.org/data/v1/epss?cve=CVE-2010-3552 |
| cvssv2 | 10.0 | https://nvd.nist.gov/vuln/detail/CVE-2010-3552 |
| Data source | Exploit-DB |
|---|---|
| Date added | Jan. 8, 2011 |
| Description | Sun Java - Runtime New Plugin docbase Buffer Overflow (Metasploit) |
| Ransomware campaign use | Known |
| Source publication date | Jan. 8, 2011 |
| Exploit type | remote |
| Platform | windows |
| Source update date | March 10, 2011 |
| Source URL | http://www.zerodayinitiative.com/advisories/ZDI-10-206/ |
| Data source | Metasploit |
|---|---|
| Description | This module exploits a flaw in the new plugin component of the Sun Java Runtime Environment before v6 Update 22. By specifying specific parameters to the new plugin, an attacker can cause a stack-based buffer overflow and execute arbitrary code. When the new plugin is invoked with a "launchjnlp" parameter, it will copy the contents of the "docbase" parameter to a stack-buffer using the "sprintf" function. A string of 396 bytes is enough to overflow the 256 byte stack buffer and overwrite some local variables as well as the saved return address. NOTE: The string being copied is first passed through the "WideCharToMultiByte". Due to this, only characters which have a valid localized multibyte representation are allowed. Invalid characters will be replaced with question marks ('?'). This vulnerability was originally discovered independently by both Stephen Fewer and Berend Jan Wever (SkyLined). Although exhaustive testing hasn't been done, all versions since version 6 Update 10 are believed to be affected by this vulnerability. This vulnerability was patched as part of the October 2010 Oracle Patch release. |
| Note | Reliability: - unknown-reliability Stability: - unknown-stability SideEffects: - unknown-side-effects |
| Ransomware campaign use | Unknown |
| Source publication date | Oct. 12, 2010 |
| Platform | Windows |
| Source URL | https://github.com/rapid7/metasploit-framework/tree/master/modules/exploits/windows/browser/java_docbase_bof.rb |
| Exploitability (E) | Access Vector (AV) | Access Complexity (AC) | Authentication (Au) | Confidentiality Impact (C) | Integrity Impact (I) | Availability Impact (A) |
|---|---|---|---|---|---|---|
high functional unproven proof_of_concept not_defined |
local adjacent_network network |
high medium low |
multiple single none |
none partial complete |
none partial complete |
none partial complete |
| Percentile | 0.99228 |
| EPSS Score | 0.82665 |
| Published At | April 1, 2026, 12:55 p.m. |
| Date | Actor | Action | Source | VulnerableCode Version |
|---|---|---|---|---|
| 2026-04-01T13:01:34.466245+00:00 | Gentoo Importer | Import | https://security.gentoo.org/glsa/201111-02 | 38.0.0 |