Vulnerability Name: CVE-2008-1185 (CCN-41025) Assigned: 2008-03-04 Published: 2008-03-04 Updated: 2019-07-31 Summary: Unspecified vulnerability in the Virtual Machine for Sun Java Runtime Environment (JRE) and JDK 6 Update 4 and earlier, 5.0 Update 14 and earlier, and SDK/JRE 1.4.2_16 and earlier allows remote attackers to gain privileges via an untrusted application or applet, a different issue than CVE-2008-1186 , aka "the first issue." CVSS v3 Severity: 4.6 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L )Exploitability Metrics: Attack Vector (AV): NetworkAttack Complexity (AC): HighPrivileges Required (PR): LowUser Interaction (UI): RequiredScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): LowIntegrity (I): LowAvailibility (A): Low
CVSS v2 Severity: 9.3 High (CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C )6.9 Medium (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): MediumAuthentication (Au): NoneImpact Metrics: Confidentiality (C): CompleteIntegrity (I): CompleteAvailibility (A): Complete
6.0 Medium (CCN CVSS v2 Vector: AV:N/AC:M/Au:S/C:P/I:P/A:P )4.4 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:S/C:P/I:P/A:P/E:U/RL:OF/RC:C )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): MediumAthentication (Au): Single_InstanceImpact Metrics: Confidentiality (C): PartialIntegrity (I): PartialAvailibility (A): Partial
Vulnerability Type: CWE-264 Vulnerability Consequences: Gain Privileges References: Source: MITRE Type: CNACVE-2008-1185 Source: APPLE Type: Mailing List, Third Party AdvisoryAPPLE-SA-2008-09-24 Source: SUSE Type: Mailing List, Third Party AdvisorySUSE-SA:2008:018 Source: CCN Type: RHSA-2008-0186Critical: java-1.5.0-sun security update Source: CCN Type: SA29239Sun Java JDK / JRE Multiple Vulnerabilities Source: SECUNIA Type: Third Party Advisory29239 Source: SECUNIA Type: Third Party Advisory29273 Source: SECUNIA Type: Third Party Advisory29582 Source: SECUNIA Type: Third Party Advisory29858 Source: CCN Type: SA30676VMware ESX Server update for Tomcat and Java JRE Source: SECUNIA Type: Third Party Advisory30676 Source: SECUNIA Type: Third Party Advisory30780 Source: CCN Type: SA32018Mac OS X Java Multiple Vulnerabilities Source: SECUNIA Type: Third Party Advisory32018 Source: GENTOO Type: Third Party AdvisoryGLSA-200804-28 Source: CCN Type: SECTRACK ID: 1019555Java Runtime Environment Virtual Machine Lets Remote Users Access Files and Gain Privileges on the Target System Source: SECTRACK Type: Third Party Advisory, VDB Entry1019555 Source: SUNALERT Type: Patch, Third Party Advisory233321 Source: CCN Type: Sun Alert ID: 233321Two Security Vulnerabilities in the Java Runtime Environment Virtual Machine Source: CCN Type: Apple Web siteAbout the security content of Java for Mac OS X 10.4, Release 7 Source: CONFIRM Type: Third Party Advisoryhttp://support.apple.com/kb/HT3178 Source: CONFIRM Type: Third Party Advisoryhttp://support.apple.com/kb/HT3179 Source: CCN Type: ASA-2008-113java-1.5.0-sun security update (RHSA-2008-0186) Source: CCN Type: NORTEL BULLETIN ID: 2008008808, Rev 1Nortel response to Sun Java JDK / JRE Multiple Vulnerabilities Source: CCN Type: GLSA 200804-28JRockit: Multiple vulnerabilities Source: CCN Type: GLSA-200804-20Sun JDK/JRE: Multiple vulnerabilities Source: GENTOO Type: Third Party AdvisoryGLSA-200804-20 Source: GENTOO Type: Third Party AdvisoryGLSA-200806-11 Source: REDHAT Type: Third Party AdvisoryRHSA-2008:0186 Source: CCN Type: BID-28083Sun Java SE Multiple Security Vulnerabilities Source: CERT Type: Third Party Advisory, US Government ResourceTA08-066A Source: CCN Type: VMSA-2008-0010Updated Tomcat and Java JRE packages for VMware ESX 3.5 Source: CONFIRM Type: Third Party Advisoryhttp://www.vmware.com/security/advisories/VMSA-2008-0010.html Source: VUPEN Type: Third Party AdvisoryADV-2008-0770 Source: VUPEN Type: Third Party AdvisoryADV-2008-1856 Source: XF Type: Third Party Advisory, VDB Entryjava-virtualmachine-multiple-priv-escalation(41025) Source: XF Type: UNKNOWNvirtualmachine-unspecified-priv-escalation(41025) Source: XF Type: Third Party Advisory, VDB Entrysun-jre-unspecified-priv-escalation(41138) Source: OVAL Type: Third Party Advisoryoval:org.mitre.oval:def:9672 Source: SUSE Type: SUSE-SA:2008:018Sun Java Security Update Vulnerable Configuration: Configuration 1 :cpe:/a:sun:jdk:1.5.0:-:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.5.0:update1:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.5.0:update10:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.5.0:update11:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.5.0:update12:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.5.0:update13:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.5.0:update14:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.5.0:update2:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.5.0:update3:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.5.0:update4:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.5.0:update5:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.5.0:update6:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.5.0:update7:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.5.0:update8:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.5.0:update9:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.6.0:-:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.6.0:update_3:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.6.0:update_4:*:*:*:*:*:* Configuration 2 :cpe:/a:sun:jre:1.4.2:-:*:*:*:*:*:* OR cpe:/a:sun:jre:1.4.2_1:*:*:*:*:*:*:* OR cpe:/a:sun:jre:1.4.2_2:*:*:*:*:*:*:* OR cpe:/a:sun:jre:1.4.2_3:*:*:*:*:*:*:* OR cpe:/a:sun:jre:1.4.2_4:*:*:*:*:*:*:* OR cpe:/a:sun:jre:1.4.2_5:*:*:*:*:*:*:* OR cpe:/a:sun:jre:1.4.2_6:*:*:*:*:*:*:* OR cpe:/a:sun:jre:1.4.2_7:*:*:*:*:*:*:* OR cpe:/a:sun:jre:1.4.2_8:*:*:*:*:*:*:* OR cpe:/a:sun:jre:1.4.2_9:*:*:*:*:*:*:* OR cpe:/a:sun:jre:1.4.2_10:*:*:*:*:*:*:* OR cpe:/a:sun:jre:1.4.2_11:*:*:*:*:*:*:* OR cpe:/a:sun:jre:1.4.2_12:*:*:*:*:*:*:* OR cpe:/a:sun:jre:1.4.2_13:*:*:*:*:*:*:* OR cpe:/a:sun:jre:1.4.2_14:*:*:*:*:*:*:* OR cpe:/a:sun:jre:1.4.2_15:*:*:*:*:*:*:* OR cpe:/a:sun:jre:1.4.2_16:*:*:*:*:*:*:* OR cpe:/a:sun:jre:1.5.0:-:*:*:*:*:*:* OR cpe:/a:sun:jre:1.5.0:update1:*:*:*:*:*:* OR cpe:/a:sun:jre:1.5.0:update10:*:*:*:*:*:* OR cpe:/a:sun:jre:1.5.0:update11:*:*:*:*:*:* OR cpe:/a:sun:jre:1.5.0:update12:*:*:*:*:*:* OR cpe:/a:sun:jre:1.5.0:update13:*:*:*:*:*:* OR cpe:/a:sun:jre:1.5.0:update14:*:*:*:*:*:* OR cpe:/a:sun:jre:1.5.0:update2:*:*:*:*:*:* OR cpe:/a:sun:jre:1.5.0:update3:*:*:*:*:*:* OR cpe:/a:sun:jre:1.5.0:update4:*:*:*:*:*:* OR cpe:/a:sun:jre:1.5.0:update5:*:*:*:*:*:* OR cpe:/a:sun:jre:1.5.0:update6:*:*:*:*:*:* OR cpe:/a:sun:jre:1.5.0:update7:*:*:*:*:*:* OR cpe:/a:sun:jre:1.5.0:update8:*:*:*:*:*:* OR cpe:/a:sun:jre:1.5.0:update9:*:*:*:*:*:* OR cpe:/a:sun:jre:1.6.0:-:*:*:*:*:*:* OR cpe:/a:sun:jre:1.6.0:update_1:*:*:*:*:*:* OR cpe:/a:sun:jre:1.6.0:update_2:*:*:*:*:*:* OR cpe:/a:sun:jre:1.6.0:update_3:*:*:*:*:*:* OR cpe:/a:sun:jre:1.6.0:update_4:*:*:*:*:*:* Configuration 3 :cpe:/a:sun:sdk:1.4.2:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.4.2_1:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.4.2_2:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.4.2_3:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.4.2_4:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.4.2_5:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.4.2_6:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.4.2_7:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.4.2_8:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.4.2_9:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.4.2_10:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.4.2_11:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.4.2_12:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.4.2_13:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.4.2_14:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.4.2_15:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.4.2_16:*:*:*:*:*:*:* Configuration RedHat 1 :cpe:/a:redhat:rhel_extras:4:*:*:*:*:*:*:* Configuration RedHat 2 :cpe:/a:redhat:rhel_extras:5:*:*:*:*:*:*:* Configuration CCN 1 :cpe:/a:sun:jre:1.5.0:-:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.4.2:*:*:*:*:*:*:* OR cpe:/a:sun:jre:1.5.0:update3:*:*:*:*:*:* OR cpe:/a:sun:jre:1.6.0:-:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.6.0:-:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.5.0:update10:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.5.0:update11:*:*:*:*:*:* OR cpe:/a:sun:jre:1.5.0:update7:*:*:*:*:*:* OR cpe:/a:sun:jre:1.5.0:update8:*:*:*:*:*:* OR cpe:/a:sun:jre:1.5.0:update9:*:*:*:*:*:* OR cpe:/a:sun:jre:1.5.0:update10:*:*:*:*:*:* OR cpe:/a:sun:jre:1.5.0:update11:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.4.2_11:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.4.2_12:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.4.2_13:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.4.2_14:*:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.5.0:-:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.5.0:update1:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.5.0:update11_b03:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.5.0:update12:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.5.0:update2:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.5.0:update3:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.5.0:update4:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.5.0:update5:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.5.0:update6:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.5.0:update7:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.5.0:update7_b03:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.5.0:update8:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.5.0:update9:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.6.0:update1:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.6.0:update1_b06:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.6.0:update2:*:*:*:*:*:* OR cpe:/a:sun:jre:1.5.0:update1:*:*:*:*:*:* OR cpe:/a:sun:jre:1.5.0:update12:*:*:*:*:*:* OR cpe:/a:sun:jre:1.5.0:update13:*:*:*:*:*:* OR cpe:/a:sun:jre:1.5.0:update2:*:*:*:*:*:* OR cpe:/a:sun:jre:1.5.0:update4:*:*:*:*:*:* OR cpe:/a:sun:jre:1.5.0:update5:*:*:*:*:*:* OR cpe:/a:sun:jre:1.5.0:update6:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.4.2_03:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.4.2_08:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.4.2_09:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.4.2_10:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.4.2_15:*:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.6.0:update3:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.6.0:update4:*:*:*:*:*:* OR cpe:/a:sun:jre:1.6.0:update4:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.5.0:update14:*:*:*:*:*:* OR cpe:/a:sun:jre:1.5.0:update14:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.4.2_04:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.4.2_02:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.4.2_16:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.4.2_05:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.4.2_06:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.4.2_07:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.4.2_01:*:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.5.0:update13:*:*:*:*:*:* AND cpe:/o:gentoo:linux:*:*:*:*:*:*:*:* OR cpe:/o:novell:linux_desktop:9:*:*:*:*:*:*:* OR cpe:/o:apple:mac_os_x:10.4:*:*:*:*:*:*:* OR cpe:/o:apple:mac_os_x:10.4.1:*:*:*:*:*:*:* OR cpe:/o:apple:mac_os_x_server:10.4.1:*:*:*:*:*:*:* OR cpe:/o:apple:mac_os_x_server:10.4:*:*:*:*:*:*:* OR cpe:/a:novell:open_enterprise_server:*:*:*:*:*:*:*:* OR cpe:/o:apple:mac_os_x_server:10.4.2:*:*:*:*:*:*:* OR cpe:/o:apple:mac_os_x:10.4.2:*:*:*:*:*:*:* OR cpe:/o:apple:mac_os_x:10.4.4:*:*:*:*:*:*:* OR cpe:/o:apple:mac_os_x:10.4.3:*:*:*:*:*:*:* OR cpe:/o:apple:mac_os_x_server:10.4.3:*:*:*:*:*:*:* OR cpe:/o:apple:mac_os_x_server:10.4.4:*:*:*:*:*:*:* OR cpe:/o:apple:mac_os_x:10.4.5:*:*:*:*:*:*:* OR cpe:/o:apple:mac_os_x_server:10.4.5:*:*:*:*:*:*:* OR cpe:/o:apple:mac_os_x:10.4.6:*:*:*:*:*:*:* OR cpe:/a:redhat:rhel_extras:4:*:*:*:*:*:*:* OR cpe:/o:apple:mac_os_x_server:10.4.6:*:*:*:*:*:*:* OR cpe:/o:apple:mac_os_x:10.4.7:*:*:*:*:*:*:* OR cpe:/o:apple:mac_os_x_server:10.4.7:*:*:*:*:*:*:* OR cpe:/o:novell:suse_linux_enterprise_server:10:*:*:*:*:*:*:* OR cpe:/o:apple:mac_os_x_server:10.4.8:*:*:*:*:*:*:* OR cpe:/o:apple:mac_os_x:10.4.8:*:*:*:*:*:*:* OR cpe:/o:apple:mac_os_x_server:10.4.9:*:*:*:*:*:*:* OR cpe:/o:apple:mac_os_x:10.4.9:*:*:*:*:*:*:* OR cpe:/o:apple:mac_os_x:10.4.10:*:*:*:*:*:*:* OR cpe:/o:apple:mac_os_x_server:10.4.10:*:*:*:*:*:*:* OR cpe:/o:apple:mac_os_x:10.5:*:*:*:*:*:*:* OR cpe:/o:apple:mac_os_x_server:10.5:*:*:*:*:*:*:* OR cpe:/o:apple:mac_os_x:10.5.1:*:*:*:*:*:*:* OR cpe:/o:apple:mac_os_x_server:10.5.1:*:*:*:*:*:*:* OR cpe:/o:apple:mac_os_x:10.5.2:*:*:*:*:*:*:* OR cpe:/o:apple:mac_os_x_server:10.5.2:*:*:*:*:*:*:* OR cpe:/a:novell:open_enterprise_server:*:*:*:*:*:*:*:* OR cpe:/o:opensuse:opensuse:10.2:*:*:*:*:*:*:* OR cpe:/o:opensuse:opensuse:10.3:*:*:*:*:*:*:* OR cpe:/a:vmware:esx_server:3.5:*:*:*:*:*:*:* OR cpe:/o:apple:mac_os_x_server:10.5.3:*:*:*:*:*:*:* OR cpe:/o:apple:mac_os_x:10.5.3:*:*:*:*:*:*:* Denotes that component is vulnerable Oval Definitions Definition ID Class Title Last Modified oval:org.opensuse.security:def:20081185 V CVE-2008-1185 2015-11-16 oval:org.mitre.oval:def:22449 P ELSA-2008:0186: java-1.5.0-sun security update (Critical) 2014-05-26 oval:org.mitre.oval:def:9672 V Unspecified vulnerability in the Virtual Machine for Sun Java Runtime Environment (JRE) and JDK 6 Update 4 and earlier, 5.0 Update 14 and earlier, and SDK/JRE 1.4.2_16 and earlier allows remote attackers to gain privileges via an untrusted application or applet, a different issue than CVE-2008-1186, aka "the first issue." 2010-09-06 oval:com.redhat.rhsa:def:20080186 P RHSA-2008:0186: java-1.5.0-sun security update (Critical) 2008-03-06
BACK
sun jdk 1.5.0
sun jdk 1.5.0 update1
sun jdk 1.5.0 update10
sun jdk 1.5.0 update11
sun jdk 1.5.0 update12
sun jdk 1.5.0 update13
sun jdk 1.5.0 update14
sun jdk 1.5.0 update2
sun jdk 1.5.0 update3
sun jdk 1.5.0 update4
sun jdk 1.5.0 update5
sun jdk 1.5.0 update6
sun jdk 1.5.0 update7
sun jdk 1.5.0 update8
sun jdk 1.5.0 update9
sun jdk 1.6.0
sun jdk 1.6.0 update_3
sun jdk 1.6.0 update_4
sun jre 1.4.2
sun jre 1.4.2_1
sun jre 1.4.2_2
sun jre 1.4.2_3
sun jre 1.4.2_4
sun jre 1.4.2_5
sun jre 1.4.2_6
sun jre 1.4.2_7
sun jre 1.4.2_8
sun jre 1.4.2_9
sun jre 1.4.2_10
sun jre 1.4.2_11
sun jre 1.4.2_12
sun jre 1.4.2_13
sun jre 1.4.2_14
sun jre 1.4.2_15
sun jre 1.4.2_16
sun jre 1.5.0
sun jre 1.5.0 update1
sun jre 1.5.0 update10
sun jre 1.5.0 update11
sun jre 1.5.0 update12
sun jre 1.5.0 update13
sun jre 1.5.0 update14
sun jre 1.5.0 update2
sun jre 1.5.0 update3
sun jre 1.5.0 update4
sun jre 1.5.0 update5
sun jre 1.5.0 update6
sun jre 1.5.0 update7
sun jre 1.5.0 update8
sun jre 1.5.0 update9
sun jre 1.6.0
sun jre 1.6.0 update_1
sun jre 1.6.0 update_2
sun jre 1.6.0 update_3
sun jre 1.6.0 update_4
sun sdk 1.4.2
sun sdk 1.4.2_1
sun sdk 1.4.2_2
sun sdk 1.4.2_3
sun sdk 1.4.2_4
sun sdk 1.4.2_5
sun sdk 1.4.2_6
sun sdk 1.4.2_7
sun sdk 1.4.2_8
sun sdk 1.4.2_9
sun sdk 1.4.2_10
sun sdk 1.4.2_11
sun sdk 1.4.2_12
sun sdk 1.4.2_13
sun sdk 1.4.2_14
sun sdk 1.4.2_15
sun sdk 1.4.2_16
sun jre 1.5.0
sun sdk 1.4.2
sun jre 1.5.0 update3
sun jre 1.6.0
sun jdk 1.6.0
sun jdk 1.5.0 update10
sun jdk 1.5.0 update11
sun jre 1.5.0 update7
sun jre 1.5.0 update8
sun jre 1.5.0 update9
sun jre 1.5.0 update10
sun jre 1.5.0 update11
sun sdk 1.4.2_11
sun sdk 1.4.2_12
sun sdk 1.4.2_13
sun sdk 1.4.2_14
sun jdk 1.5.0
sun jdk 1.5.0 update1
sun jdk 1.5.0 update11_b03
sun jdk 1.5.0 update12
sun jdk 1.5.0 update2
sun jdk 1.5.0 update3
sun jdk 1.5.0 update4
sun jdk 1.5.0 update5
sun jdk 1.5.0 update6
sun jdk 1.5.0 update7
sun jdk 1.5.0 update7_b03
sun jdk 1.5.0 update8
sun jdk 1.5.0 update9
sun jdk 1.6.0 update1
sun jdk 1.6.0 update1_b06
sun jdk 1.6.0 update2
sun jre 1.5.0 update1
sun jre 1.5.0 update12
sun jre 1.5.0 update13
sun jre 1.5.0 update2
sun jre 1.5.0 update4
sun jre 1.5.0 update5
sun jre 1.5.0 update6
sun sdk 1.4.2_03
sun sdk 1.4.2_08
sun sdk 1.4.2_09
sun sdk 1.4.2_10
sun sdk 1.4.2_15
sun jdk 1.6.0 update3
sun jdk 1.6.0 update4
sun jre 1.6.0 update4
sun jdk 1.5.0 update14
sun jre 1.5.0 update14
sun sdk 1.4.2_04
sun sdk 1.4.2_02
sun sdk 1.4.2_16
sun sdk 1.4.2_05
sun sdk 1.4.2_06
sun sdk 1.4.2_07
sun sdk 1.4.2_01
sun jdk 1.5.0 update13
gentoo linux *
novell linux desktop 9
apple mac os x 10.4
apple mac os x 10.4.1
apple mac os x server 10.4.1
apple mac os x server 10.4
novell open enterprise server *
apple mac os x server 10.4.2
apple mac os x 10.4.2
apple mac os x 10.4.4
apple mac os x 10.4.3
apple mac os x server 10.4.3
apple mac os x server 10.4.4
apple mac os x 10.4.5
apple mac os x server 10.4.5
apple mac os x 10.4.6
redhat rhel extras 4
apple mac os x server 10.4.6
apple mac os x 10.4.7
apple mac os x server 10.4.7
novell suse linux enterprise server 10
apple mac os x server 10.4.8
apple mac os x 10.4.8
apple mac os x server 10.4.9
apple mac os x 10.4.9
apple mac os x 10.4.10
apple mac os x server 10.4.10
apple mac os x 10.5
apple mac os x server 10.5
apple mac os x 10.5.1
apple mac os x server 10.5.1
apple mac os x 10.5.2
apple mac os x server 10.5.2
novell open enterprise server *
novell opensuse 10.2
novell opensuse 10.3
vmware esx server 3.5
apple mac os x server 10.5.3
apple mac os x 10.5.3