Vulnerability Details : CVE-2010-0088
Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE and Java for Business 6 Update 18, 5.0 Update 23, 1.4.2_25, and 1.3.1_27 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors, a different vulnerability than CVE-2010-0085.
Products affected by CVE-2010-0088
- cpe:2.3:a:sun:jdk:*:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:*:update23:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:*:update_18:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.0:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.5.0:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.5.0:update6:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.5.0:update1:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.5.0:update3:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.5.0:update2:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.5.0:update4:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.5.0:update5:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.5.0:update7:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.5.0:update8:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.5.0:update9:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.5.0:update10:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.6.0:update1:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.5.0:update11:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.5.0:update12:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.6.0:update2:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.5.0:update13:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.5.0:update14:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.6.0:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.6.0:update_4:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.6.0:update_3:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.5.0:update15:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.5.0:update16:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.6.0:update_7:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.6.0:update_10:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.6.0:update_5:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.6.0:update_6:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.6.0:update_11:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.6.0:update1_b06:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.6.0:update_12:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.1_11:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.1_12:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.1_13:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.1_06:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.1_05:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.0_05:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.0_04:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.1_14:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.0_01:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.1_04:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.1_03:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.0_03:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.0_02:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.1_24:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.1_23:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.1_21:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.1_19:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.1_20:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.1_25:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.5.0:update21:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.5.0:update20:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.1_10:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.1_09:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.1_02:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.1_01:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.1_16:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.1_17:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.1_18:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.5.0:update19:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.5.0:update17:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.1_15:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.1_08:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.1_07:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.1_01a:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.1:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.1_22:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.1_26:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.5.0:update18:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.6.0:update_13:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.6.0:update_16:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.6.0:update_14:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.6.0:update_15:*:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.6.0:update_17:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:*:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:*:update23:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:*:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:*:update_18:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.0:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.0:update2:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.0:update5:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.1:update1:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.4.2_6:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.4.2_7:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.5.0:update4:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.5.0:update5:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.4.2_2:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.4.2_3:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.5.0:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.5.0:update1:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.4.2:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.4.2_1:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.4.2_10:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.4.2_8:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.4.2_9:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.4.2_4:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.4.2_5:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.5.0:update2:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.5.0:update3:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.4.2_12:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.4.2_13:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.4.2_21:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.4.2_11:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.4.2_14:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.4.2_15:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.1:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.0:update3:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.0:update4:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.0:update1:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.5.0:update6:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.5.0:update8:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.1_03:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.1_10:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.1_12:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.1_17:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.1_19:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.1_05:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.1_06:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.1_07:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.1_08:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.1_13:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.1_14:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.1_15:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.1_16:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.5.0:update7:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.1_2:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.1_04:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.1_09:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.1_11:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.1_18:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.5.0:update9:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.5.0:update10:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.1_20:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.5.0:update11:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.6.0:update_2:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.5.0:update12:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.4.2_17:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.4.2_16:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.5.0:update13:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.5.0:update14:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.6.0:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.6.0:update_4:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.6.0:update_3:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.1_21:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.1_22:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.5.0:update15:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.5.0:update16:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.1_23:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.4.2_18:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.6.0:update_10:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.6.0:update_5:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.6.0:update_6:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.6.0:update_7:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.6.0:update_11:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.6.0:update_12:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.5.0:update17:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.6.0:update_13:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.5.0:update18:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.5.0:update19:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.5.0:update21:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.5.0:update20:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.6.0:update_15:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.6.0:update_14:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.6.0:update_16:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.4.2_20:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.4.2_19:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.4.2_22:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.1_24:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.1_25:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.4.2_23:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.6.0:update_17:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.4.2_24:*:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.1:update2:*:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.1_26:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:*:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:*:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.3.0:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.3.1_01:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.3.1_01a:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.4.2:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.4.2_02:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.4.2_9:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.4.2_3:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.4.2_8:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.4.2_1:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.4.2_5:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.4.2_6:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.4.2_7:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.4.2_4:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.3.1_02:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.3.1_07:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.3.1_09:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.3.1_11:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.3.1_16:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.3.1_18:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.3.1_03:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.3.1_04:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.3.1_05:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.3.1_06:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.4.2_10:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.4.2_11:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.4.2_12:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.3.1_12:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.3.1_13:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.3.1_14:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.3.1_15:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.3.1:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.3.1_08:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.3.1_10:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.3.1_17:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.3.1_19:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.4.2_14:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.3.1_20:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.4.2_13:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.4.2_15:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.4.2_17:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.4.2_16:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.3.1_21:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.3.1_22:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.4.2_18:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.3.1_23:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.4.2_19:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.4.2_20:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.4.2_21:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.4.2_22:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.3.1_24:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.3.1_25:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.4.2_23:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.4.2_24:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.3.0_04:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.3.0_05:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.3.0_01:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.3.1_26:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.3.0_02:*:*:*:*:*:*:*
- cpe:2.3:a:sun:sdk:1.3.0_03:*:*:*:*:*:*:*
Threat overview for CVE-2010-0088
Top countries where our scanners detected CVE-2010-0088
Top open port discovered on systems with this issue
80
IPs affected by CVE-2010-0088 719
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2010-0088!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2010-0088
3.77%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 91 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2010-0088
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.8
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:P/A:P |
8.6
|
6.4
|
NIST |
References for CVE-2010-0088
-
http://www.oracle.com/technetwork/topics/security/javacpumar2010-083341.html
Oracle Java SE and Java for Business Critical Patch Update - March 2010
-
http://www.vupen.com/english/advisories/2010/1793
Webmail | OVH- OVH
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11173
Repository / Oval Repository
-
http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751
-
http://www.redhat.com/support/errata/RHSA-2010-0338.html
Support
-
http://www.vupen.com/english/advisories/2010/1107
Webmail | OVH- OVH
-
http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html
Oracle Critical Patch Update - October 2010
-
http://www.redhat.com/support/errata/RHSA-2010-0471.html
Support
-
http://www.vupen.com/english/advisories/2010/1191
Webmail | OVH- OVH
-
http://www.mandriva.com/security/advisories?name=MDVSA-2010:084
mandriva.com
-
http://ubuntu.com/usn/usn-923-1
USN-923-1: OpenJDK vulnerabilities | Ubuntu security notices
-
http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html
[security-announce] SUSE Security Summary Report: SUSE-SR:2010:017
-
http://www.vmware.com/security/advisories/VMSA-2011-0003.html
VMSA-2011-0003.2
-
http://www.redhat.com/support/errata/RHSA-2010-0339.html
Support
-
http://lists.apple.com/archives/security-announce/2010//May/msg00001.html
Apple - Lists.apple.com
-
http://support.apple.com/kb/HT4171
About the security content of Java for Mac OS X 10.6 Update 2 - Apple Support
-
http://marc.info/?l=bugtraq&m=127557596201693&w=2
'[security bulletin] HPSBUX02524 SSRT100089 rev.1 - HP-UX Running Java, Remote Execution of Arbitrary' - MARC
-
http://lists.apple.com/archives/security-announce/2010//May/msg00002.html
Apple - Lists.apple.com
-
http://www.redhat.com/support/errata/RHSA-2010-0383.html
Support
-
http://support.apple.com/kb/HT4170
About the security content of Java for Mac OS X 10.5 Update 7 - Apple Support
-
http://www.redhat.com/support/errata/RHSA-2010-0337.html
Support
-
http://www.vupen.com/english/advisories/2010/1454
Webmail | OVH- OVH
-
http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html
[security-announce] SUSE Security Summary Report: SUSE-SR:2010:011
-
http://marc.info/?l=bugtraq&m=134254866602253&w=2
'[security bulletin] HPSBMU02799 SSRT100867 rev.1 - HP Network Node Manager i (NNMi) v9.0x Running JD' - MARC
-
http://www.securityfocus.com/archive/1/516397/100/0/threaded
SecurityFocus
-
http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00001.html
[security-announce] SUSE Security Summary Report: SUSE-SR:2010:008
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14321
Repository / Oval Repository
-
http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html
VMware vCenter Server 4.1 Update 1 Release Notes
Jump to