ID CVE-2010-4476
Summary The Double.parseDouble method in Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, 5.0 Update 27 and earlier, and 1.4.2_29 and earlier, as used in OpenJDK, Apache, JBossweb, and other products, allows remote attackers to cause a denial of service via a crafted string that triggers an infinite loop of estimations during conversion to a double-precision binary floating-point number, as demonstrated using 2.2250738585072012e-308.
References
Vulnerable Configurations
  • cpe:2.3:a:sun:jre:1.6.0:*:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.6.0:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.6.0:update_10:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.6.0:update_10:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.6.0:update_11:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.6.0:update_11:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.6.0:update_12:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.6.0:update_12:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.6.0:update_13:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.6.0:update_13:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.6.0:update_14:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.6.0:update_14:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.6.0:update_15:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.6.0:update_15:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.6.0:update_16:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.6.0:update_16:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.6.0:update_17:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.6.0:update_17:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.6.0:update_18:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.6.0:update_18:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.6.0:update_19:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.6.0:update_19:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.6.0:update_2:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.6.0:update_2:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.6.0:update_20:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.6.0:update_20:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.6.0:update_21:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.6.0:update_21:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.6.0:update_22:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.6.0:update_22:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:*:update_23:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:*:update_23:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.6.0:update_3:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.6.0:update_3:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.6.0:update_4:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.6.0:update_4:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.6.0:update_5:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.6.0:update_5:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.6.0:update_6:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.6.0:update_6:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.6.0:update_7:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.6.0:update_7:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:1.6.0:*:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:1.6.0:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:1.6.0:update1:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:1.6.0:update1:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:1.6.0:update1_b06:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:1.6.0:update1_b06:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:1.6.0:update2:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:1.6.0:update2:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:1.6.0:update_10:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:1.6.0:update_10:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:1.6.0:update_11:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:1.6.0:update_11:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:1.6.0:update_12:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:1.6.0:update_12:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:1.6.0:update_13:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:1.6.0:update_13:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:1.6.0:update_14:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:1.6.0:update_14:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:1.6.0:update_15:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:1.6.0:update_15:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:1.6.0:update_16:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:1.6.0:update_16:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:1.6.0:update_17:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:1.6.0:update_17:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:1.6.0:update_18:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:1.6.0:update_18:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:1.6.0:update_19:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:1.6.0:update_19:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:1.6.0:update_20:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:1.6.0:update_20:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:1.6.0:update_21:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:1.6.0:update_21:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:1.6.0:update_22:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:1.6.0:update_22:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:*:update_23:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:*:update_23:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:1.6.0:update_3:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:1.6.0:update_3:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:1.6.0:update_4:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:1.6.0:update_4:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:1.6.0:update_5:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:1.6.0:update_5:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:1.6.0:update_6:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:1.6.0:update_6:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:1.6.0:update_7:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:1.6.0:update_7:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:1.5.0:*:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:1.5.0:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:1.5.0:update1:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:1.5.0:update1:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:1.5.0:update10:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:1.5.0:update10:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:1.5.0:update11:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:1.5.0:update11:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:1.5.0:update12:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:1.5.0:update12:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:1.5.0:update13:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:1.5.0:update13:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:1.5.0:update14:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:1.5.0:update14:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:1.5.0:update15:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:1.5.0:update15:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:1.5.0:update16:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:1.5.0:update16:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:1.5.0:update17:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:1.5.0:update17:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:1.5.0:update18:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:1.5.0:update18:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:1.5.0:update19:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:1.5.0:update19:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:1.5.0:update2:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:1.5.0:update2:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:1.5.0:update20:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:1.5.0:update20:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:1.5.0:update21:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:1.5.0:update21:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:1.5.0:update22:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:1.5.0:update22:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:1.5.0:update23:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:1.5.0:update23:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:1.5.0:update24:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:1.5.0:update24:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:1.5.0:update25:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:1.5.0:update25:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:1.5.0:update26:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:1.5.0:update26:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:1.5.0:update27:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:1.5.0:update27:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:1.5.0:update3:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:1.5.0:update3:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:1.5.0:update4:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:1.5.0:update4:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:1.5.0:update5:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:1.5.0:update5:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:1.5.0:update6:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:1.5.0:update6:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:1.5.0:update7:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:1.5.0:update7:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:1.5.0:update8:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:1.5.0:update8:*:*:*:*:*:*
  • cpe:2.3:a:sun:jdk:1.5.0:update9:*:*:*:*:*:*
    cpe:2.3:a:sun:jdk:1.5.0:update9:*:*:*:*:*:*
  • cpe:2.3:a:sun:sdk:1.4.2:*:*:*:*:*:*:*
    cpe:2.3:a:sun:sdk:1.4.2:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:sdk:1.4.2_1:*:*:*:*:*:*:*
    cpe:2.3:a:sun:sdk:1.4.2_1:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:sdk:1.4.2_02:*:*:*:*:*:*:*
    cpe:2.3:a:sun:sdk:1.4.2_02:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:sdk:1.4.2_3:*:*:*:*:*:*:*
    cpe:2.3:a:sun:sdk:1.4.2_3:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:sdk:1.4.2_4:*:*:*:*:*:*:*
    cpe:2.3:a:sun:sdk:1.4.2_4:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:sdk:1.4.2_5:*:*:*:*:*:*:*
    cpe:2.3:a:sun:sdk:1.4.2_5:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:sdk:1.4.2_6:*:*:*:*:*:*:*
    cpe:2.3:a:sun:sdk:1.4.2_6:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:sdk:1.4.2_7:*:*:*:*:*:*:*
    cpe:2.3:a:sun:sdk:1.4.2_7:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:sdk:1.4.2_8:*:*:*:*:*:*:*
    cpe:2.3:a:sun:sdk:1.4.2_8:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:sdk:1.4.2_9:*:*:*:*:*:*:*
    cpe:2.3:a:sun:sdk:1.4.2_9:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:sdk:1.4.2_10:*:*:*:*:*:*:*
    cpe:2.3:a:sun:sdk:1.4.2_10:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:sdk:1.4.2_11:*:*:*:*:*:*:*
    cpe:2.3:a:sun:sdk:1.4.2_11:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:sdk:1.4.2_12:*:*:*:*:*:*:*
    cpe:2.3:a:sun:sdk:1.4.2_12:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:sdk:1.4.2_13:*:*:*:*:*:*:*
    cpe:2.3:a:sun:sdk:1.4.2_13:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:sdk:1.4.2_14:*:*:*:*:*:*:*
    cpe:2.3:a:sun:sdk:1.4.2_14:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:sdk:1.4.2_15:*:*:*:*:*:*:*
    cpe:2.3:a:sun:sdk:1.4.2_15:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:sdk:1.4.2_16:*:*:*:*:*:*:*
    cpe:2.3:a:sun:sdk:1.4.2_16:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:sdk:1.4.2_17:*:*:*:*:*:*:*
    cpe:2.3:a:sun:sdk:1.4.2_17:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:sdk:1.4.2_18:*:*:*:*:*:*:*
    cpe:2.3:a:sun:sdk:1.4.2_18:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:sdk:1.4.2_19:*:*:*:*:*:*:*
    cpe:2.3:a:sun:sdk:1.4.2_19:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:sdk:1.4.2_20:*:*:*:*:*:*:*
    cpe:2.3:a:sun:sdk:1.4.2_20:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:sdk:1.4.2_21:*:*:*:*:*:*:*
    cpe:2.3:a:sun:sdk:1.4.2_21:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:sdk:1.4.2_22:*:*:*:*:*:*:*
    cpe:2.3:a:sun:sdk:1.4.2_22:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:sdk:1.4.2_23:*:*:*:*:*:*:*
    cpe:2.3:a:sun:sdk:1.4.2_23:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:sdk:1.4.2_24:*:*:*:*:*:*:*
    cpe:2.3:a:sun:sdk:1.4.2_24:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:sdk:1.4.2_25:*:*:*:*:*:*:*
    cpe:2.3:a:sun:sdk:1.4.2_25:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:sdk:1.4.2_26:*:*:*:*:*:*:*
    cpe:2.3:a:sun:sdk:1.4.2_26:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:sdk:1.4.2_27:*:*:*:*:*:*:*
    cpe:2.3:a:sun:sdk:1.4.2_27:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:sdk:1.4.2_28:*:*:*:*:*:*:*
    cpe:2.3:a:sun:sdk:1.4.2_28:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:sdk:-:*:*:*:*:*:*:*
    cpe:2.3:a:sun:sdk:-:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:sdk:1.1.3:*:*:*:*:*:*:*
    cpe:2.3:a:sun:sdk:1.1.3:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:sdk:1.1.8_007:*:*:*:*:*:*:*
    cpe:2.3:a:sun:sdk:1.1.8_007:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:sdk:1.2.2_010:*:*:*:*:*:*:*
    cpe:2.3:a:sun:sdk:1.2.2_010:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:sdk:1.2.2_14:*:*:*:*:*:*:*
    cpe:2.3:a:sun:sdk:1.2.2_14:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:sdk:1.3.0:*:*:*:*:*:*:*
    cpe:2.3:a:sun:sdk:1.3.0:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:sdk:1.3.0_01:*:*:*:*:*:*:*
    cpe:2.3:a:sun:sdk:1.3.0_01:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:sdk:1.3.0_02:*:*:*:*:*:*:*
    cpe:2.3:a:sun:sdk:1.3.0_02:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:sdk:1.3.0_03:*:*:*:*:*:*:*
    cpe:2.3:a:sun:sdk:1.3.0_03:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:sdk:1.3.0_04:*:*:*:*:*:*:*
    cpe:2.3:a:sun:sdk:1.3.0_04:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:sdk:1.3.0_05:*:*:*:*:*:*:*
    cpe:2.3:a:sun:sdk:1.3.0_05:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:sdk:1.3.1:*:*:*:*:*:*:*
    cpe:2.3:a:sun:sdk:1.3.1:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:sdk:1.3.1_01:*:*:*:*:*:*:*
    cpe:2.3:a:sun:sdk:1.3.1_01:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:sdk:1.3.1_01a:*:*:*:*:*:*:*
    cpe:2.3:a:sun:sdk:1.3.1_01a:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:sdk:1.3.1_02:*:*:*:*:*:*:*
    cpe:2.3:a:sun:sdk:1.3.1_02:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:sdk:1.3.1_03:*:*:*:*:*:*:*
    cpe:2.3:a:sun:sdk:1.3.1_03:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:sdk:1.3.1_04:*:*:*:*:*:*:*
    cpe:2.3:a:sun:sdk:1.3.1_04:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:sdk:1.3.1_05:*:*:*:*:*:*:*
    cpe:2.3:a:sun:sdk:1.3.1_05:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:sdk:1.3.1_06:*:*:*:*:*:*:*
    cpe:2.3:a:sun:sdk:1.3.1_06:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:sdk:1.3.1_07:*:*:*:*:*:*:*
    cpe:2.3:a:sun:sdk:1.3.1_07:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:sdk:1.3.1_08:*:*:*:*:*:*:*
    cpe:2.3:a:sun:sdk:1.3.1_08:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:sdk:1.3.1_09:*:*:*:*:*:*:*
    cpe:2.3:a:sun:sdk:1.3.1_09:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:sdk:1.3.1_10:*:*:*:*:*:*:*
    cpe:2.3:a:sun:sdk:1.3.1_10:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:sdk:1.3.1_11:*:*:*:*:*:*:*
    cpe:2.3:a:sun:sdk:1.3.1_11:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:sdk:1.3.1_12:*:*:*:*:*:*:*
    cpe:2.3:a:sun:sdk:1.3.1_12:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:sdk:1.3.1_13:*:*:*:*:*:*:*
    cpe:2.3:a:sun:sdk:1.3.1_13:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:sdk:1.3.1_14:*:*:*:*:*:*:*
    cpe:2.3:a:sun:sdk:1.3.1_14:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:sdk:1.3.1_15:*:*:*:*:*:*:*
    cpe:2.3:a:sun:sdk:1.3.1_15:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:sdk:1.3.1_16:*:*:*:*:*:*:*
    cpe:2.3:a:sun:sdk:1.3.1_16:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:sdk:1.3.1_17:*:*:*:*:*:*:*
    cpe:2.3:a:sun:sdk:1.3.1_17:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:sdk:1.3.1_18:*:*:*:*:*:*:*
    cpe:2.3:a:sun:sdk:1.3.1_18:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:sdk:1.3.1_19:*:*:*:*:*:*:*
    cpe:2.3:a:sun:sdk:1.3.1_19:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:sdk:1.3.1_20:*:*:*:*:*:*:*
    cpe:2.3:a:sun:sdk:1.3.1_20:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:sdk:1.3.1_21:*:*:*:*:*:*:*
    cpe:2.3:a:sun:sdk:1.3.1_21:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:sdk:1.3.1_22:*:*:*:*:*:*:*
    cpe:2.3:a:sun:sdk:1.3.1_22:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:sdk:1.3.1_23:*:*:*:*:*:*:*
    cpe:2.3:a:sun:sdk:1.3.1_23:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:sdk:1.3.1_24:*:*:*:*:*:*:*
    cpe:2.3:a:sun:sdk:1.3.1_24:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:sdk:1.3.1_25:*:*:*:*:*:*:*
    cpe:2.3:a:sun:sdk:1.3.1_25:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:sdk:1.3.1_26:*:*:*:*:*:*:*
    cpe:2.3:a:sun:sdk:1.3.1_26:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:sdk:1.3.1_27:*:*:*:*:*:*:*
    cpe:2.3:a:sun:sdk:1.3.1_27:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:sdk:1.3.1_28:*:*:*:*:*:*:*
    cpe:2.3:a:sun:sdk:1.3.1_28:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:sdk:1.3_02:*:*:*:*:*:*:*
    cpe:2.3:a:sun:sdk:1.3_02:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:sdk:1.3_05:*:*:*:*:*:*:*
    cpe:2.3:a:sun:sdk:1.3_05:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:sdk:1.4.1:*:*:*:*:*:*:*
    cpe:2.3:a:sun:sdk:1.4.1:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:sdk:1.4.2_03:*:*:*:*:*:*:*
    cpe:2.3:a:sun:sdk:1.4.2_03:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:sdk:1.4.2_04:*:*:*:*:*:*:*
    cpe:2.3:a:sun:sdk:1.4.2_04:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:sdk:1.4.2_08:*:*:*:*:*:*:*
    cpe:2.3:a:sun:sdk:1.4.2_08:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:sdk:1.4.2_09:*:*:*:*:*:*:*
    cpe:2.3:a:sun:sdk:1.4.2_09:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.5.0:*:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.5.0:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.5.0:update1:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.5.0:update1:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.5.0:update10:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.5.0:update10:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.5.0:update11:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.5.0:update11:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.5.0:update12:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.5.0:update12:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.5.0:update13:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.5.0:update13:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.5.0:update14:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.5.0:update14:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.5.0:update15:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.5.0:update15:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.5.0:update16:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.5.0:update16:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.5.0:update17:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.5.0:update17:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.5.0:update18:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.5.0:update18:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.5.0:update19:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.5.0:update19:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.5.0:update2:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.5.0:update2:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.5.0:update20:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.5.0:update20:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.5.0:update21:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.5.0:update21:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.5.0:update22:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.5.0:update22:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.5.0:update23:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.5.0:update23:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.5.0:update24:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.5.0:update24:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.5.0:update25:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.5.0:update25:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.5.0:update26:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.5.0:update26:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.5.0:update27:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.5.0:update27:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.5.0:update3:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.5.0:update3:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.5.0:update4:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.5.0:update4:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.5.0:update5:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.5.0:update5:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.5.0:update6:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.5.0:update6:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.5.0:update7:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.5.0:update7:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.5.0:update8:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.5.0:update8:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.5.0:update9:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.5.0:update9:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.4.2:*:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.4.2:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.4.2_1:*:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.4.2_1:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.4.2_2:*:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.4.2_2:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.4.2_3:*:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.4.2_3:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.4.2_4:*:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.4.2_4:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.4.2_5:*:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.4.2_5:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.4.2_6:*:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.4.2_6:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.4.2_7:*:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.4.2_7:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.4.2_8:*:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.4.2_8:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.4.2_9:*:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.4.2_9:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.4.2_10:*:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.4.2_10:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.4.2_11:*:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.4.2_11:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.4.2_12:*:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.4.2_12:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.4.2_13:*:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.4.2_13:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.4.2_14:*:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.4.2_14:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.4.2_15:*:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.4.2_15:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.4.2_16:*:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.4.2_16:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.4.2_17:*:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.4.2_17:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.4.2_18:*:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.4.2_18:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.4.2_19:*:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.4.2_19:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.4.2_20:*:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.4.2_20:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.4.2_21:*:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.4.2_21:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.4.2_22:*:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.4.2_22:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.4.2_23:*:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.4.2_23:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.4.2_24:*:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.4.2_24:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.4.2_25:*:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.4.2_25:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.4.2_26:*:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.4.2_26:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.4.2_27:*:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.4.2_27:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.4.2_28:*:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.4.2_28:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:-:*:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:-:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.1.7:*:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.1.7:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.1.8:update13:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.1.8:update13:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.1.8:update14:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.1.8:update14:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.1.8:update7:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.1.8:update7:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.1.8:update8:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.1.8:update8:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.2.2:update10:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.2.2:update10:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.3.0:*:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.3.0:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.3.0:-:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.3.0:-:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.3.0:update1:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.3.0:update1:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.3.0:update2:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.3.0:update2:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.3.0:update3:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.3.0:update3:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.3.0:update4:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.3.0:update4:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.3.0:update5:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.3.0:update5:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.3.1:*:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.3.1:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.3.1:-:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.3.1:-:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.3.1:update1:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.3.1:update1:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.3.1:update12:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.3.1:update12:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.3.1:update15:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.3.1:update15:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.3.1:update16:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.3.1:update16:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.3.1:update17:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.3.1:update17:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.3.1:update18:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.3.1:update18:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.3.1:update19:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.3.1:update19:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.3.1:update1a:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.3.1:update1a:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.3.1:update2:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.3.1:update2:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.3.1:update20:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.3.1:update20:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.3.1:update4:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.3.1:update4:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.3.1:update8:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.3.1:update8:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.3.1_2:*:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.3.1_2:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.3.1_03:*:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.3.1_03:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.3.1_04:*:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.3.1_04:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.3.1_05:*:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.3.1_05:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.3.1_06:*:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.3.1_06:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.3.1_07:*:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.3.1_07:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.3.1_08:*:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.3.1_08:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.3.1_09:*:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.3.1_09:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.3.1_10:*:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.3.1_10:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.3.1_11:*:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.3.1_11:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.3.1_12:*:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.3.1_12:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.3.1_13:*:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.3.1_13:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.3.1_14:*:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.3.1_14:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.3.1_15:*:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.3.1_15:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.3.1_16:*:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.3.1_16:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.3.1_17:*:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.3.1_17:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.3.1_18:*:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.3.1_18:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.3.1_19:*:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.3.1_19:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.3.1_20:*:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.3.1_20:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.3.1_21:*:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.3.1_21:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.3.1_22:*:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.3.1_22:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.3.1_23:*:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.3.1_23:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.3.1_24:*:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.3.1_24:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.3.1_25:*:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.3.1_25:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.3.1_26:*:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.3.1_26:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.3.1_27:*:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.3.1_27:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.3.1_28:*:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.3.1_28:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.4.1:*:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.4.1:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.4.1:-:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.4.1:-:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.4.1:update1:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.4.1:update1:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.4.1:update2:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.4.1:update2:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.4.1:update3:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.4.1:update3:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.4.1:update4:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.4.1:update4:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.4.1:update7:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.4.1:update7:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.4.2:-:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.4.2:-:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.4.2:update1:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.4.2:update1:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.4.2:update10:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.4.2:update10:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.4.2:update11:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.4.2:update11:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.4.2:update12:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.4.2:update12:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.4.2:update13:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.4.2:update13:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.4.2:update14:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.4.2:update14:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.4.2:update15:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.4.2:update15:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.4.2:update19:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.4.2:update19:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.4.2:update2:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.4.2:update2:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.4.2:update21:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.4.2:update21:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.4.2:update28:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.4.2:update28:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.4.2:update3:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.4.2:update3:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.4.2:update4:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.4.2:update4:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.4.2:update5:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.4.2:update5:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.4.2:update6:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.4.2:update6:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.4.2:update7:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.4.2:update7:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.4.2:update8:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.4.2:update8:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.4.2:update9:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.4.2:update9:*:*:*:*:*:*
  • cpe:2.3:a:sun:jre:1.4.2_29:*:*:*:*:*:*:*
    cpe:2.3:a:sun:jre:1.4.2_29:*:*:*:*:*:*:*
CVSS
Base: 5.0 (as of 30-10-2018 - 16:26)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:N/I:N/A:P
oval via4
  • accepted 2015-04-20T04:00:31.661-04:00
    class vulnerability
    contributors
    • name Yamini Mohan R
      organization Hewlett-Packard
    • name Sushant Kumar Singh
      organization Hewlett-Packard
    • name Sushant Kumar Singh
      organization Hewlett-Packard
    • name Prashant Kumar
      organization Hewlett-Packard
    • name Mike Cokus
      organization The MITRE Corporation
    description The Double.parseDouble method in Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, 5.0 Update 27 and earlier, and 1.4.2_29 and earlier, as used in OpenJDK, Apache, JBossweb, and other products, allows remote attackers to cause a denial of service via a crafted string that triggers an infinite loop of estimations during conversion to a double-precision binary floating-point number, as demonstrated using 2.2250738585072012e-308.
    family unix
    id oval:org.mitre.oval:def:12662
    status accepted
    submitted 2011-07-28T11:57:52.000-05:00
    title HP-UX Running Java, Remote Execution of Arbitrary Code, Disclosure of Information, and Other Vulnerabilities
    version 46
  • accepted 2015-04-20T04:00:32.276-04:00
    class vulnerability
    contributors
    • name Yamini Mohan R
      organization Hewlett-Packard
    • name Sushant Kumar Singh
      organization Hewlett-Packard
    • name Sushant Kumar Singh
      organization Hewlett-Packard
    • name Prashant Kumar
      organization Hewlett-Packard
    • name Mike Cokus
      organization The MITRE Corporation
    description The Double.parseDouble method in Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, 5.0 Update 27 and earlier, and 1.4.2_29 and earlier, as used in OpenJDK, Apache, JBossweb, and other products, allows remote attackers to cause a denial of service via a crafted string that triggers an infinite loop of estimations during conversion to a double-precision binary floating-point number, as demonstrated using 2.2250738585072012e-308.
    family unix
    id oval:org.mitre.oval:def:12745
    status accepted
    submitted 2011-07-28T14:46:10.000-05:00
    title HP-UX Apache Web Server, Remote Information Disclosure, Cross-Site Scripting (XSS), Denial of Service (DoS)
    version 46
  • accepted 2015-03-23T04:00:38.756-04:00
    class vulnerability
    contributors
    • name Scott Quint
      organization DTCC
    • name Dragos Prisaca
      organization G2, Inc.
    • name Maria Mikhno
      organization ALTX-SOFT
    • name Maria Mikhno
      organization ALTX-SOFT
    definition_extensions
    • comment Java SE Development Kit 6 is installed
      oval oval:org.mitre.oval:def:15831
    • comment Java SE Runtime Environment 6 is installed
      oval oval:org.mitre.oval:def:16362
    • comment Java SE Runtime Environment 5 is installed
      oval oval:org.mitre.oval:def:15748
    • comment Java SE Development Kit 5 is installed
      oval oval:org.mitre.oval:def:16292
    description The Double.parseDouble method in Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, 5.0 Update 27 and earlier, and 1.4.2_29 and earlier, as used in OpenJDK, Apache, JBossweb, and other products, allows remote attackers to cause a denial of service via a crafted string that triggers an infinite loop of estimations during conversion to a double-precision binary floating-point number, as demonstrated using 2.2250738585072012e-308.
    family windows
    id oval:org.mitre.oval:def:14328
    status accepted
    submitted 2011-11-25T18:04:28.000-05:00
    title Java for Business 6 Update 23 and earlier, 5.0 Update 27 and earlier, and 1.4.2_29 and earlier, as used in OpenJDK, Apache, JBossweb, and other products, allows remote attackers to cause a denial of service via a crafted string that triggers an infinite loop of estimations during conversion to a double-precision binary floating-point number, as demonstrated using 2.2250738585072012e-308.
    version 11
  • accepted 2015-04-20T04:00:39.920-04:00
    class vulnerability
    contributors
    • name Yamini Mohan R
      organization Hewlett-Packard
    • name Sushant Kumar Singh
      organization Hewlett-Packard
    • name Prashant Kumar
      organization Hewlett-Packard
    • name Mike Cokus
      organization The MITRE Corporation
    description The Double.parseDouble method in Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, 5.0 Update 27 and earlier, and 1.4.2_29 and earlier, as used in OpenJDK, Apache, JBossweb, and other products, allows remote attackers to cause a denial of service via a crafted string that triggers an infinite loop of estimations during conversion to a double-precision binary floating-point number, as demonstrated using 2.2250738585072012e-308.
    family unix
    id oval:org.mitre.oval:def:14589
    status accepted
    submitted 2012-01-30T11:36:29.000-05:00
    title HP-UX Apache Running Tomcat Servlet Engine, Remote Information Disclosure, Authentication Bypass, Cross-Site Scripting (XSS), Unauthorized Access, Denial of Service (DoS)
    version 44
  • accepted 2015-04-20T04:01:23.233-04:00
    class vulnerability
    contributors
    • name Ganesh Manal
      organization Hewlett-Packard
    • name Sushant Kumar Singh
      organization Hewlett-Packard
    • name Prashant Kumar
      organization Hewlett-Packard
    • name Mike Cokus
      organization The MITRE Corporation
    description The Double.parseDouble method in Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, 5.0 Update 27 and earlier, and 1.4.2_29 and earlier, as used in OpenJDK, Apache, JBossweb, and other products, allows remote attackers to cause a denial of service via a crafted string that triggers an infinite loop of estimations during conversion to a double-precision binary floating-point number, as demonstrated using 2.2250738585072012e-308.
    family unix
    id oval:org.mitre.oval:def:19493
    status accepted
    submitted 2013-11-22T11:43:28.000-05:00
    title HP-UX Apache Running Tomcat Servlet Engine, Remote Denial of Service (DoS), Access Restriction Bypass, Unauthorized Modification and Other Vulnerabilities
    version 44
redhat via4
advisories
  • bugzilla
    id 674336
    title CVE-2010-4476 JDK Double.parseDouble Denial-Of-Service
    oval
    OR
    • AND
      • OR
        • comment Red Hat Enterprise Linux 6 Client is installed
          oval oval:com.redhat.rhba:tst:20111656001
        • comment Red Hat Enterprise Linux 6 Server is installed
          oval oval:com.redhat.rhba:tst:20111656002
        • comment Red Hat Enterprise Linux 6 Workstation is installed
          oval oval:com.redhat.rhba:tst:20111656003
        • comment Red Hat Enterprise Linux 6 ComputeNode is installed
          oval oval:com.redhat.rhba:tst:20111656004
      • OR
        • AND
          • comment java-1.6.0-openjdk is earlier than 1:1.6.0.0-1.36.b17.el6_0
            oval oval:com.redhat.rhsa:tst:20110214005
          • comment java-1.6.0-openjdk is signed with Red Hat redhatrelease2 key
            oval oval:com.redhat.rhsa:tst:20100865006
        • AND
          • comment java-1.6.0-openjdk-demo is earlier than 1:1.6.0.0-1.36.b17.el6_0
            oval oval:com.redhat.rhsa:tst:20110214011
          • comment java-1.6.0-openjdk-demo is signed with Red Hat redhatrelease2 key
            oval oval:com.redhat.rhsa:tst:20100865010
        • AND
          • comment java-1.6.0-openjdk-devel is earlier than 1:1.6.0.0-1.36.b17.el6_0
            oval oval:com.redhat.rhsa:tst:20110214009
          • comment java-1.6.0-openjdk-devel is signed with Red Hat redhatrelease2 key
            oval oval:com.redhat.rhsa:tst:20100865008
        • AND
          • comment java-1.6.0-openjdk-javadoc is earlier than 1:1.6.0.0-1.36.b17.el6_0
            oval oval:com.redhat.rhsa:tst:20110214013
          • comment java-1.6.0-openjdk-javadoc is signed with Red Hat redhatrelease2 key
            oval oval:com.redhat.rhsa:tst:20100865014
        • AND
          • comment java-1.6.0-openjdk-src is earlier than 1:1.6.0.0-1.36.b17.el6_0
            oval oval:com.redhat.rhsa:tst:20110214007
          • comment java-1.6.0-openjdk-src is signed with Red Hat redhatrelease2 key
            oval oval:com.redhat.rhsa:tst:20100865012
    • AND
      • comment Red Hat Enterprise Linux 5 is installed
        oval oval:com.redhat.rhba:tst:20070331001
      • OR
        • AND
          • comment java-1.6.0-openjdk is earlier than 1:1.6.0.0-1.18.b17.el5
            oval oval:com.redhat.rhsa:tst:20110214016
          • comment java-1.6.0-openjdk is signed with Red Hat redhatrelease key
            oval oval:com.redhat.rhsa:tst:20090377003
        • AND
          • comment java-1.6.0-openjdk-demo is earlier than 1:1.6.0.0-1.18.b17.el5
            oval oval:com.redhat.rhsa:tst:20110214024
          • comment java-1.6.0-openjdk-demo is signed with Red Hat redhatrelease key
            oval oval:com.redhat.rhsa:tst:20090377011
        • AND
          • comment java-1.6.0-openjdk-devel is earlier than 1:1.6.0.0-1.18.b17.el5
            oval oval:com.redhat.rhsa:tst:20110214020
          • comment java-1.6.0-openjdk-devel is signed with Red Hat redhatrelease key
            oval oval:com.redhat.rhsa:tst:20090377005
        • AND
          • comment java-1.6.0-openjdk-javadoc is earlier than 1:1.6.0.0-1.18.b17.el5
            oval oval:com.redhat.rhsa:tst:20110214018
          • comment java-1.6.0-openjdk-javadoc is signed with Red Hat redhatrelease key
            oval oval:com.redhat.rhsa:tst:20090377007
        • AND
          • comment java-1.6.0-openjdk-src is earlier than 1:1.6.0.0-1.18.b17.el5
            oval oval:com.redhat.rhsa:tst:20110214022
          • comment java-1.6.0-openjdk-src is signed with Red Hat redhatrelease key
            oval oval:com.redhat.rhsa:tst:20090377009
    rhsa
    id RHSA-2011:0214
    released 2011-02-10
    severity Moderate
    title RHSA-2011:0214: java-1.6.0-openjdk security update (Moderate)
  • bugzilla
    id 674336
    title CVE-2010-4476 JDK Double.parseDouble Denial-Of-Service
    oval
    AND
    • comment Red Hat Enterprise Linux 5 is installed
      oval oval:com.redhat.rhba:tst:20070331001
    • OR
      • AND
        • comment tomcat5 is earlier than 0:5.5.23-0jpp.17.el5_6
          oval oval:com.redhat.rhsa:tst:20110336002
        • comment tomcat5 is signed with Red Hat redhatrelease key
          oval oval:com.redhat.rhsa:tst:20070327003
      • AND
        • comment tomcat5-admin-webapps is earlier than 0:5.5.23-0jpp.17.el5_6
          oval oval:com.redhat.rhsa:tst:20110336020
        • comment tomcat5-admin-webapps is signed with Red Hat redhatrelease key
          oval oval:com.redhat.rhsa:tst:20070327015
      • AND
        • comment tomcat5-common-lib is earlier than 0:5.5.23-0jpp.17.el5_6
          oval oval:com.redhat.rhsa:tst:20110336008
        • comment tomcat5-common-lib is signed with Red Hat redhatrelease key
          oval oval:com.redhat.rhsa:tst:20070327017
      • AND
        • comment tomcat5-jasper is earlier than 0:5.5.23-0jpp.17.el5_6
          oval oval:com.redhat.rhsa:tst:20110336022
        • comment tomcat5-jasper is signed with Red Hat redhatrelease key
          oval oval:com.redhat.rhsa:tst:20070327009
      • AND
        • comment tomcat5-jasper-javadoc is earlier than 0:5.5.23-0jpp.17.el5_6
          oval oval:com.redhat.rhsa:tst:20110336004
        • comment tomcat5-jasper-javadoc is signed with Red Hat redhatrelease key
          oval oval:com.redhat.rhsa:tst:20070327021
      • AND
        • comment tomcat5-jsp-2.0-api is earlier than 0:5.5.23-0jpp.17.el5_6
          oval oval:com.redhat.rhsa:tst:20110336012
        • comment tomcat5-jsp-2.0-api is signed with Red Hat redhatrelease key
          oval oval:com.redhat.rhsa:tst:20070327013
      • AND
        • comment tomcat5-jsp-2.0-api-javadoc is earlier than 0:5.5.23-0jpp.17.el5_6
          oval oval:com.redhat.rhsa:tst:20110336010
        • comment tomcat5-jsp-2.0-api-javadoc is signed with Red Hat redhatrelease key
          oval oval:com.redhat.rhsa:tst:20070327023
      • AND
        • comment tomcat5-server-lib is earlier than 0:5.5.23-0jpp.17.el5_6
          oval oval:com.redhat.rhsa:tst:20110336014
        • comment tomcat5-server-lib is signed with Red Hat redhatrelease key
          oval oval:com.redhat.rhsa:tst:20070327007
      • AND
        • comment tomcat5-servlet-2.4-api is earlier than 0:5.5.23-0jpp.17.el5_6
          oval oval:com.redhat.rhsa:tst:20110336016
        • comment tomcat5-servlet-2.4-api is signed with Red Hat redhatrelease key
          oval oval:com.redhat.rhsa:tst:20070327005
      • AND
        • comment tomcat5-servlet-2.4-api-javadoc is earlier than 0:5.5.23-0jpp.17.el5_6
          oval oval:com.redhat.rhsa:tst:20110336018
        • comment tomcat5-servlet-2.4-api-javadoc is signed with Red Hat redhatrelease key
          oval oval:com.redhat.rhsa:tst:20070327011
      • AND
        • comment tomcat5-webapps is earlier than 0:5.5.23-0jpp.17.el5_6
          oval oval:com.redhat.rhsa:tst:20110336006
        • comment tomcat5-webapps is signed with Red Hat redhatrelease key
          oval oval:com.redhat.rhsa:tst:20070327019
    rhsa
    id RHSA-2011:0336
    released 2011-03-09
    severity Important
    title RHSA-2011:0336: tomcat5 security update (Important)
  • rhsa
    id RHSA-2011:0210
  • rhsa
    id RHSA-2011:0211
  • rhsa
    id RHSA-2011:0212
  • rhsa
    id RHSA-2011:0213
  • rhsa
    id RHSA-2011:0282
  • rhsa
    id RHSA-2011:0333
  • rhsa
    id RHSA-2011:0334
  • rhsa
    id RHSA-2011:0880
rpms
  • java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0
  • java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0
  • java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0
  • java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0
  • java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0
  • java-1.6.0-openjdk-1:1.6.0.0-1.18.b17.el5
  • java-1.6.0-openjdk-demo-1:1.6.0.0-1.18.b17.el5
  • java-1.6.0-openjdk-devel-1:1.6.0.0-1.18.b17.el5
  • java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.18.b17.el5
  • java-1.6.0-openjdk-src-1:1.6.0.0-1.18.b17.el5
  • tomcat6-0:6.0.24-24.el6_0
  • tomcat6-admin-webapps-0:6.0.24-24.el6_0
  • tomcat6-docs-webapp-0:6.0.24-24.el6_0
  • tomcat6-el-2.1-api-0:6.0.24-24.el6_0
  • tomcat6-javadoc-0:6.0.24-24.el6_0
  • tomcat6-jsp-2.1-api-0:6.0.24-24.el6_0
  • tomcat6-lib-0:6.0.24-24.el6_0
  • tomcat6-log4j-0:6.0.24-24.el6_0
  • tomcat6-servlet-2.5-api-0:6.0.24-24.el6_0
  • tomcat6-webapps-0:6.0.24-24.el6_0
  • tomcat5-0:5.5.23-0jpp.17.el5_6
  • tomcat5-admin-webapps-0:5.5.23-0jpp.17.el5_6
  • tomcat5-common-lib-0:5.5.23-0jpp.17.el5_6
  • tomcat5-jasper-0:5.5.23-0jpp.17.el5_6
  • tomcat5-jasper-javadoc-0:5.5.23-0jpp.17.el5_6
  • tomcat5-jsp-2.0-api-0:5.5.23-0jpp.17.el5_6
  • tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.17.el5_6
  • tomcat5-server-lib-0:5.5.23-0jpp.17.el5_6
  • tomcat5-servlet-2.4-api-0:5.5.23-0jpp.17.el5_6
  • tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.17.el5_6
  • tomcat5-webapps-0:5.5.23-0jpp.17.el5_6
refmap via4
aixapar
  • IZ94423
  • PM31983
confirm
debian DSA-2161
fedora
  • FEDORA-2011-1231
  • FEDORA-2011-1263
gentoo GLSA-201406-32
hp
  • HPSBMA02642
  • HPSBMU02690
  • HPSBMU02797
  • HPSBMU02799
  • HPSBNS02633
  • HPSBOV02634
  • HPSBOV02762
  • HPSBTU02684
  • HPSBUX02633
  • HPSBUX02641
  • HPSBUX02642
  • HPSBUX02645
  • HPSBUX02725
  • HPSBUX02777
  • HPSBUX02860
  • SSRT100387
  • SSRT100390
  • SSRT100412
  • SSRT100415
  • SSRT100569
  • SSRT100627
  • SSRT100825
  • SSRT100854
  • SSRT100867
  • SSRT101146
mandriva MDVSA-2011:054
misc
sectrack 1025062
secunia
  • 43048
  • 43280
  • 43295
  • 43304
  • 43333
  • 43378
  • 43400
  • 43659
  • 44954
  • 45022
  • 45555
  • 49198
suse
  • SUSE-SA:2011:024
  • SUSE-SU-2011:0823
vupen
  • ADV-2011-0365
  • ADV-2011-0377
  • ADV-2011-0379
  • ADV-2011-0422
  • ADV-2011-0434
  • ADV-2011-0605
Last major update 30-10-2018 - 16:26
Published 17-02-2011 - 19:00
Back to Top