Vulnerability Name:

CVE-2010-3574 (CCN-62518)

Assigned:2010-10-12
Published:2010-10-12
Updated:2018-10-30
Summary:Unspecified vulnerability in the Networking component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, 1.4.2_27, and 1.3.1_28 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.
Note: the previous information was obtained from the October 2010 CPU. Oracle has not commented on claims from a reliable downstream vendor that HttpURLConnection does not properly check for the allowHttpTrace permission, which allows untrusted code to perform HTTP TRACE requests.
CVSS v3 Severity:5.6 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): High
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:10.0 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)
7.4 High (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): 
Access Complexity (AC): 
Authentication (Au): 
Impact Metrics:Confidentiality (C): 
Integrity (I): 
Availibility (A): 
5.1 Medium (CCN CVSS v2 Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P)
3.8 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): 
Access Complexity (AC): 
Athentication (Au): 
Impact Metrics:Confidentiality (C): 
Integrity (I): 
Availibility (A): 
5.1 Medium (REDHAT CVSS v2 Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P)
3.8 Low (REDHAT Temporal CVSS v2 Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): 
Access Complexity (AC): 
Authentication (Au): 
Impact Metrics:Confidentiality (C): 
Integrity (I): 
Availibility (A): 
Vulnerability Type:CWE-noinfo
Vulnerability Consequences:Gain Access
References:Source: MITRE
Type: CNA
CVE-2010-3574

Source: HP
Type: UNKNOWN
SSRT100333

Source: FEDORA
Type: UNKNOWN
FEDORA-2010-16312

Source: FEDORA
Type: UNKNOWN
FEDORA-2010-16294

Source: FEDORA
Type: UNKNOWN
FEDORA-2010-16240

Source: SUSE
Type: UNKNOWN
SUSE-SR:2010:019

Source: HP
Type: UNKNOWN
HPSBMU02799

Source: CCN
Type: RHSA-2010-0768
Important: java-1.6.0-openjdk security and bug fix update

Source: CCN
Type: RHSA-2010-0770
Critical: java-1.6.0-sun security update

Source: CCN
Type: RHSA-2010-0807
Critical: java-1.5.0-ibm security update

Source: CCN
Type: RHSA-2010-0865
Important: java-1.6.0-openjdk security and bug fix update

Source: CCN
Type: RHSA-2010-0873
Critical: java-1.5.0-ibm security update

Source: CCN
Type: RHSA-2010-0935
Moderate: java-1.4.2-ibm security update

Source: CCN
Type: RHSA-2010-0987
Critical: java-1.6.0-ibm security and bug fix update

Source: CCN
Type: RHSA-2011-0152
Moderate: java-1.4.2-ibm security update

Source: CCN
Type: RHSA-2011-0880
Low: Red Hat Network Satellite server IBM Java Runtime security update

Source: CCN
Type: SA41791
Sun Java JDK / JRE / SDK Multiple Vulnerabilities

Source: CCN
Type: SA41882
IBM Java Multiple Vulnerabilities

Source: SECUNIA
Type: Vendor Advisory
41967

Source: SECUNIA
Type: Vendor Advisory
41972

Source: CCN
Type: SA42377
Hitachi Products Multiple Vulnerabilities

Source: SECUNIA
Type: Vendor Advisory
42377

Source: SECUNIA
Type: Vendor Advisory
42432

Source: CCN
Type: SA42974
Oracle JRockit Multiple Vulnerabilities

Source: SECUNIA
Type: Vendor Advisory
42974

Source: SECUNIA
Type: Vendor Advisory
44954

Source: GENTOO
Type: UNKNOWN
GLSA-201406-32

Source: CONFIRM
Type: UNKNOWN
http://support.avaya.com/css/P8/documents/100114315

Source: CONFIRM
Type: UNKNOWN
http://support.avaya.com/css/P8/documents/100114327

Source: CONFIRM
Type: UNKNOWN
http://support.avaya.com/css/P8/documents/100123193

Source: CCN
Type: Hitachi Security Vulnerability Information HS10-030
Cosminexus Developer's Kit for Java

Source: CONFIRM
Type: UNKNOWN
http://www.hitachi.co.jp/Prod/comp/soft1/security/info/vuls/HS10-030/index.html

Source: CCN
Type: Oracle Critical Patch Update Advisory - January 2011
Oracle Critical Patch Update Advisory - January 2011

Source: CONFIRM
Type: Patch, Vendor Advisory
http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html

Source: CCN
Type: Oracle Java SE and Java for Business Critical Patch Update Advisory - October 2010
Oracle Java SE and Java for Business Critical Patch Update Advisory - October 2010

Source: CONFIRM
Type: Patch, Vendor Advisory
http://www.oracle.com/technetwork/topics/security/javacpuoct2010-176258.html

Source: REDHAT
Type: Vendor Advisory
RHSA-2010:0768

Source: REDHAT
Type: Vendor Advisory
RHSA-2010:0770

Source: REDHAT
Type: Vendor Advisory
RHSA-2010:0807

Source: REDHAT
Type: Vendor Advisory
RHSA-2010:0865

Source: REDHAT
Type: Vendor Advisory
RHSA-2010:0873

Source: REDHAT
Type: Vendor Advisory
RHSA-2010:0935

Source: REDHAT
Type: Vendor Advisory
RHSA-2010:0987

Source: REDHAT
Type: Vendor Advisory
RHSA-2011:0152

Source: REDHAT
Type: Vendor Advisory
RHSA-2011:0880

Source: BUGTRAQ
Type: UNKNOWN
20110211 VMSA-2011-0003 Third party component updates for VMware vCenter Server, vCenter Update Manager, ESXi and ESX

Source: BID
Type: UNKNOWN
44011

Source: CCN
Type: BID-44011
Oracle Java SE and Java for Business CVE-2010-3574 Remote Networking Vulnerability

Source: UBUNTU
Type: UNKNOWN
USN-1010-1

Source: CONFIRM
Type: UNKNOWN
http://www.vmware.com/security/advisories/VMSA-2011-0003.html

Source: VUPEN
Type: Vendor Advisory
ADV-2010-3086

Source: VUPEN
Type: Vendor Advisory
ADV-2010-3112

Source: VUPEN
Type: Vendor Advisory
ADV-2011-0134

Source: VUPEN
Type: Vendor Advisory
ADV-2011-0143

Source: CONFIRM
Type: UNKNOWN
https://bugzilla.redhat.com/show_bug.cgi?id=642215

Source: XF
Type: UNKNOWN
ojsejb-networking-unspecified-var3(62518)

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:12367

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:12462

Source: SUSE
Type: SUSE-SA:2011:006
IBM Java 6 security update

Source: SUSE
Type: SUSE-SA:2011:014
IBM Java security update

Source: SUSE
Type: SUSE-SR:2010:019
SUSE Security Summary Report

Source: SUSE
Type: SUSE-SR:2011:008
SUSE Security Summary Report

Vulnerable Configuration:Configuration 1:
  • cpe:/a:sun:jre:1.6.0:-:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.6.0:update_1:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.6.0:update_10:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.6.0:update_11:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.6.0:update_12:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.6.0:update_13:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.6.0:update_14:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.6.0:update_15:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.6.0:update_16:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.6.0:update_17:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.6.0:update_18:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.6.0:update_19:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.6.0:update_2:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.6.0:update_20:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:*:update_21:*:*:*:*:*:* (Version <= 1.6.0)
  • OR cpe:/a:sun:jre:1.6.0:update_3:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.6.0:update_4:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.6.0:update_5:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.6.0:update_6:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.6.0:update_7:*:*:*:*:*:*

  • Configuration 2:
  • cpe:/a:sun:jdk:1.6.0:-:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.6.0:update1:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.6.0:update1_b06:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.6.0:update2:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.6.0:update_10:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.6.0:update_11:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.6.0:update_12:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.6.0:update_13:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.6.0:update_14:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.6.0:update_15:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.6.0:update_16:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.6.0:update_17:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.6.0:update_18:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.6.0:update_19:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.6.0:update_20:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:*:update_21:*:*:*:*:*:* (Version <= 1.6.0)
  • OR cpe:/a:sun:jdk:1.6.0:update_3:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.6.0:update_4:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.6.0:update_5:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.6.0:update_6:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.6.0:update_7:*:*:*:*:*:*

  • Configuration 3:
  • cpe:/a:sun:jdk:1.5.0:-:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.5.0:update1:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.5.0:update10:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.5.0:update11:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.5.0:update12:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.5.0:update13:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.5.0:update14:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.5.0:update15:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.5.0:update16:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.5.0:update17:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.5.0:update18:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.5.0:update19:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.5.0:update2:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.5.0:update20:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.5.0:update21:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.5.0:update22:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.5.0:update23:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.5.0:update24:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:*:update25:*:*:*:*:*:* (Version <= 1.5.0)
  • OR cpe:/a:sun:jdk:1.5.0:update3:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.5.0:update4:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.5.0:update5:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.5.0:update6:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.5.0:update7:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.5.0:update8:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.5.0:update9:*:*:*:*:*:*

  • Configuration 4:
  • cpe:/a:sun:sdk:1.4.2:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.4.2_1:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.4.2_02:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.4.2_3:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.4.2_4:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.4.2_5:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.4.2_6:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.4.2_7:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.4.2_8:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.4.2_9:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.4.2_10:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.4.2_11:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.4.2_12:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.4.2_13:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.4.2_14:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.4.2_15:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.4.2_16:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.4.2_17:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.4.2_18:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.4.2_19:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.4.2_20:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.4.2_21:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.4.2_22:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.4.2_23:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.4.2_24:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.4.2_25:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.4.2_26:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:*:*:*:*:*:*:*:* (Version <= 1.4.2_27)

  • Configuration 5:
  • cpe:/a:sun:jre:1.5.0:-:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.5.0:update1:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.5.0:update10:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.5.0:update11:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.5.0:update12:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.5.0:update13:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.5.0:update14:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.5.0:update15:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.5.0:update16:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.5.0:update17:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.5.0:update18:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.5.0:update19:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.5.0:update2:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.5.0:update20:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.5.0:update21:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.5.0:update22:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.5.0:update23:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.5.0:update24:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:*:update25:*:*:*:*:*:* (Version <= 1.5.0)
  • OR cpe:/a:sun:jre:1.5.0:update3:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.5.0:update4:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.5.0:update5:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.5.0:update6:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.5.0:update7:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.5.0:update8:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.5.0:update9:*:*:*:*:*:*

  • Configuration 6:
  • cpe:/a:sun:jre:1.4.2:-:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2_1:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2_2:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2_3:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2_4:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2_5:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2_6:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2_7:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2_8:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2_9:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2_10:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2_11:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2_12:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2_13:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2_14:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2_15:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2_16:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2_17:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2_18:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2_19:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2_20:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2_21:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2_22:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2_23:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2_24:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2_25:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2_26:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:*:*:*:*:*:*:*:* (Version <= 1.4.2_27)

  • Configuration 7:
  • cpe:/a:sun:jdk:1.3.0:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.3.0_01:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.3.0_02:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.3.0_03:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.3.0_04:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.3.0_05:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.3.1:-:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.3.1_01:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.3.1_01a:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.3.1_02:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.3.1_03:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.3.1_04:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.3.1_05:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.3.1_06:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.3.1_07:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.3.1_08:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.3.1_09:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.3.1_10:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.3.1_11:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.3.1_12:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.3.1_13:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.3.1_14:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.3.1_15:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.3.1_16:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.3.1_17:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.3.1_18:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.3.1_19:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.3.1_20:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.3.1_21:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.3.1_22:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.3.1_23:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.3.1_24:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.3.1_25:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.3.1_26:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.3.1_27:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:*:*:*:*:*:*:*:* (Version <= 1.3.1_28)

  • Configuration 8:
  • cpe:/a:sun:jre:1.3.0:-:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.3.0:update1:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.3.0:update2:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.3.0:update3:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.3.0:update4:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.3.0:update5:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.3.1:-:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.3.1:update1:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.3.1:update2:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.3.1_2:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.3.1_03:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.3.1_04:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.3.1_05:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.3.1_06:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.3.1_07:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.3.1_08:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.3.1_09:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.3.1_10:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.3.1_11:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.3.1_12:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.3.1_13:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.3.1_14:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.3.1_15:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.3.1_16:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.3.1_17:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.3.1_18:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.3.1_19:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.3.1_20:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.3.1_21:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.3.1_22:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.3.1_23:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.3.1_24:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.3.1_25:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.3.1_26:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.3.1_27:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:*:*:*:*:*:*:*:* (Version <= 1.3.1_28)

  • Configuration 9:
  • cpe:/a:sun:sdk:1.3.0:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.3.0_01:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.3.0_02:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.3.0_03:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.3.0_04:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.3.0_05:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.3.1:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.3.1_01:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.3.1_01a:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.3.1_02:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.3.1_03:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.3.1_04:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.3.1_05:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.3.1_06:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.3.1_07:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.3.1_08:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.3.1_09:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.3.1_10:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.3.1_11:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.3.1_12:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.3.1_13:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.3.1_14:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.3.1_15:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.3.1_16:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.3.1_17:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.3.1_18:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.3.1_19:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.3.1_20:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.3.1_21:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.3.1_22:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.3.1_23:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.3.1_24:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.3.1_25:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.3.1_26:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.3.1_27:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:*:*:*:*:*:*:*:* (Version <= 1.3.1_28)

  • Configuration RedHat 1:
  • cpe:/o:redhat:enterprise_linux:5:*:*:*:*:*:*:*

  • Configuration RedHat 2:
  • cpe:/o:redhat:enterprise_linux:5::client:*:*:*:*:*

  • Configuration RedHat 3:
  • cpe:/o:redhat:enterprise_linux:5::server:*:*:*:*:*

  • Configuration RedHat 4:
  • cpe:/o:redhat:enterprise_linux:6:*:*:*:*:*:*:*

  • Configuration RedHat 5:
  • cpe:/o:redhat:enterprise_linux:6::client:*:*:*:*:*

  • Configuration RedHat 6:
  • cpe:/o:redhat:enterprise_linux:6::computenode:*:*:*:*:*

  • Configuration RedHat 7:
  • cpe:/o:redhat:enterprise_linux:6::server:*:*:*:*:*

  • Configuration RedHat 8:
  • cpe:/o:redhat:enterprise_linux:6::workstation:*:*:*:*:*

  • * Denotes that component is vulnerable
    Vulnerability Name:

    CVE-2010-3574 (CCN-64763)

    Assigned:2010-10-12
    Published:2010-10-12
    Updated:2011-01-19
    Summary:Unspecified vulnerability in the Networking component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, 1.4.2_27, and 1.3.1_28 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.
    Note: the previous information was obtained from the October 2010 CPU. Oracle has not commented on claims from a reliable downstream vendor that HttpURLConnection does not properly check for the allowHttpTrace permission, which allows untrusted code to perform HTTP TRACE requests.
    CVSS v3 Severity:10.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
    Exploitability Metrics:Attack Vector (AV): Network
    Attack Complexity (AC): Low
    Privileges Required (PR): None
    User Interaction (UI): None
    Scope:Scope (S): Changed
    Impact Metrics:Confidentiality (C): High
    Integrity (I): High
    Availibility (A): High
    CVSS v2 Severity:10.0 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)
    7.4 High (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
    Exploitability Metrics:Access Vector (AV): 
    Access Complexity (AC): 
    Authentication (Au): 
    Impact Metrics:Confidentiality (C): 
    Integrity (I): 
    Availibility (A): 
    10.0 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)
    7.4 High (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
    Exploitability Metrics:Access Vector (AV): 
    Access Complexity (AC): 
    Athentication (Au): 
    Impact Metrics:Confidentiality (C): 
    Integrity (I): 
    Availibility (A): 
    5.1 Medium (REDHAT CVSS v2 Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P)
    3.8 Low (REDHAT Temporal CVSS v2 Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
    Exploitability Metrics:Access Vector (AV): 
    Access Complexity (AC): 
    Authentication (Au): 
    Impact Metrics:Confidentiality (C): 
    Integrity (I): 
    Availibility (A): 
    Vulnerability Consequences:Gain Access
    References:Source: MITRE
    Type: CNA
    CVE-2010-3574

    Source: CCN
    Type: RHSA-2010-0768
    Important: java-1.6.0-openjdk security and bug fix update

    Source: CCN
    Type: RHSA-2010-0770
    Critical: java-1.6.0-sun security update

    Source: CCN
    Type: RHSA-2010-0807
    Critical: java-1.5.0-ibm security update

    Source: CCN
    Type: RHSA-2010-0865
    Important: java-1.6.0-openjdk security and bug fix update

    Source: CCN
    Type: RHSA-2010-0873
    Critical: java-1.5.0-ibm security update

    Source: CCN
    Type: RHSA-2010-0935
    Moderate: java-1.4.2-ibm security update

    Source: CCN
    Type: RHSA-2010-0987
    Critical: java-1.6.0-ibm security and bug fix update

    Source: CCN
    Type: RHSA-2011-0152
    Moderate: java-1.4.2-ibm security update

    Source: CCN
    Type: RHSA-2011-0880
    Low: Red Hat Network Satellite server IBM Java Runtime security update

    Source: CCN
    Type: SA42377
    Hitachi Products Multiple Vulnerabilities

    Source: CCN
    Type: SA42974
    Oracle JRockit Multiple Vulnerabilities

    Source: CCN
    Type: Oracle Critical Patch Update Advisory - January 2011
    Oracle Critical Patch Update Advisory - January 2011

    Source: CCN
    Type: BID-44011
    Oracle Java SE and Java for Business CVE-2010-3574 Remote Networking Vulnerability

    Source: XF
    Type: UNKNOWN
    jrocket-multiple-unspecified(64763)

    Source: SUSE
    Type: SUSE-SA:2011:006
    IBM Java 6 security update

    Source: SUSE
    Type: SUSE-SA:2011:014
    IBM Java security update

    Source: SUSE
    Type: SUSE-SR:2010:019
    SUSE Security Summary Report

    Source: SUSE
    Type: SUSE-SR:2011:008
    SUSE Security Summary Report

    Vulnerable Configuration:Configuration RedHat 1:
  • cpe:/o:redhat:enterprise_linux:5:*:*:*:*:*:*:*
  • Configuration RedHat 2:
  • cpe:/o:redhat:enterprise_linux:5::client:*:*:*:*:*
  • Configuration RedHat 3:
  • cpe:/o:redhat:enterprise_linux:5::server:*:*:*:*:*
  • Configuration RedHat 4:
  • cpe:/o:redhat:enterprise_linux:6:*:*:*:*:*:*:*
  • Configuration RedHat 5:
  • cpe:/o:redhat:enterprise_linux:6::client:*:*:*:*:*
  • Configuration RedHat 6:
  • cpe:/o:redhat:enterprise_linux:6::computenode:*:*:*:*:*
  • Configuration RedHat 7:
  • cpe:/o:redhat:enterprise_linux:6::server:*:*:*:*:*
  • Configuration RedHat 8:
  • cpe:/o:redhat:enterprise_linux:6::workstation:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:oracle:jrockit:r28.0.0:*:*:*:*:*:*:*
  • AND
  • cpe:/a:redhat:rhel_extras:4:*:*:*:*:*:*:*
  • OR cpe:/o:novell:suse_linux_enterprise_server:10:*:*:*:*:*:*:*
  • OR cpe:/o:suse:novell_linux_pos:9:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:5:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:5:*:client:*:*:*:*:*
  • OR cpe:/a:novell:open_enterprise_server:*:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:6:*:server:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:6:*:workstation:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_desktop:6:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_hpc_node:6:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_hpc_node_supplementary:6.0:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:7729
    P
    p7zip-16.02-150200.14.9.2 on GA media (Moderate)
    2023-06-12
    oval:org.opensuse.security:def:7707
    P
    libykcs11-1-1.6.2-4.30 on GA media (Moderate)
    2023-06-12
    oval:org.opensuse.security:def:42329
    P
    Security update for dwarves and elfutils (Moderate)
    2022-08-01
    oval:org.opensuse.security:def:20103574
    V
    CVE-2010-3574
    2022-05-20
    oval:org.opensuse.security:def:31756
    P
    Security update for apache2 (Important)
    2022-01-12
    oval:org.opensuse.security:def:7005
    P
    Security update for the Linux Kernel (Live Patch 27 for SLE 15 SP1) (Important)
    2021-12-14
    oval:org.opensuse.security:def:31699
    P
    Security update for binutils (Moderate)
    2021-11-02
    oval:org.opensuse.security:def:32209
    P
    Security update for postgresql10 (Important)
    2021-10-20
    oval:org.opensuse.security:def:26151
    P
    Security update for python3 (Moderate)
    2021-10-20
    oval:org.opensuse.security:def:42128
    P
    Security update for rpm (Important)
    2021-10-15
    oval:org.opensuse.security:def:6980
    P
    Security update for the Linux Kernel (Live Patch 22 for SLE 15 SP1) (Important)
    2021-10-14
    oval:org.opensuse.security:def:42127
    P
    Security update for glibc (Moderate)
    2021-10-12
    oval:org.opensuse.security:def:31274
    P
    Security update for the Linux Kernel (Live Patch 38 for SLE 12 SP3) (Important)
    2021-09-23
    oval:org.opensuse.security:def:31275
    P
    Security update for the Linux Kernel (Live Patch 37 for SLE 12 SP3) (Important)
    2021-09-23
    oval:org.opensuse.security:def:32165
    P
    Security update for cpio (Important)
    2021-08-23
    oval:org.opensuse.security:def:26102
    P
    Security update for php72 (Important)
    2021-08-06
    oval:org.opensuse.security:def:32143
    P
    Security update for the Linux Kernel (Live Patch 39 for SLE 12 SP3) (Important)
    2021-07-21
    oval:org.opensuse.security:def:31642
    P
    Security update for webkit2gtk3 (Important)
    2021-06-17
    oval:org.opensuse.security:def:31643
    P
    Security update for apache2 (Important)
    2021-06-17
    oval:org.opensuse.security:def:31200
    P
    Security update for java-1_8_0-openjdk (Moderate)
    2021-06-15
    oval:org.opensuse.security:def:36537
    P
    perl-base-32bit-5.10.0-64.72.1 on GA media (Moderate)
    2021-06-08
    oval:org.opensuse.security:def:36495
    P
    libtirpc-devel-0.2.1-1.7.1 on GA media (Moderate)
    2021-06-08
    oval:org.opensuse.security:def:31190
    P
    Security update for the Linux Kernel (Live Patch 37 for SLE 12 SP3) (Important)
    2021-06-04
    oval:org.opensuse.security:def:31188
    P
    Security update for the Linux Kernel (Live Patch 32 for SLE 12 SP3) (Important)
    2021-06-04
    oval:org.opensuse.security:def:32104
    P
    Security update for the Linux Kernel (Live Patch 35 for SLE 12 SP3) (Important)
    2021-06-04
    oval:org.opensuse.security:def:31189
    P
    Security update for the Linux Kernel (Live Patch 38 for SLE 12 SP3) (Important)
    2021-06-04
    oval:org.opensuse.security:def:6905
    P
    Security update for the Linux Kernel (Live Patch 12 for SLE 15 SP1) (Important)
    2021-05-25
    oval:org.opensuse.security:def:26049
    P
    Security update for lz4 (Important)
    2021-05-14
    oval:org.opensuse.security:def:26048
    P
    Security update for the Linux Kernel (Important)
    2021-05-13
    oval:org.opensuse.security:def:26047
    P
    Security update for xen (Important)
    2021-05-12
    oval:org.opensuse.security:def:13238
    P
    java-1_6_0-ibm-1.6.0_sr16.1-5.9 on GA media (Moderate)
    2021-04-29
    oval:org.opensuse.security:def:46358
    P
    java-1_6_0-ibm-1.6.0_sr16.1-5.9 on GA media (Moderate)
    2021-04-29
    oval:org.opensuse.security:def:6886
    P
    Security update for the Linux Kernel (Live Patch 13 for SLE 15 SP1) (Important)
    2021-04-28
    oval:org.opensuse.security:def:31607
    P
    Security update for qemu (Important)
    2021-04-16
    oval:org.opensuse.security:def:6871
    P
    Security update for the Linux Kernel (Live Patch 17 for SLE 15 SP1) (Important)
    2021-04-07
    oval:org.opensuse.security:def:7069
    P
    Security update for the Linux Kernel (Live Patch 1 for SLE 15 SP2) (Important)
    2021-04-07
    oval:org.opensuse.security:def:26204
    P
    Security update for freeradius-server (Low)
    2021-03-04
    oval:org.opensuse.security:def:26190
    P
    Security update for MozillaFirefox (Low)
    2021-02-10
    oval:org.opensuse.security:def:31201
    P
    Security update for ImageMagick (Important)
    2021-01-22
    oval:org.opensuse.security:def:7056
    P
    Security update for the Linux Kernel (Important)
    2020-12-10
    oval:org.opensuse.security:def:32009
    P
    Security update for the Linux Kernel (Live Patch 32 for SLE 12 SP3) (Important)
    2020-12-07
    oval:org.opensuse.security:def:32008
    P
    Security update for the Linux Kernel (Live Patch 31 for SLE 12 SP3) (Important)
    2020-12-07
    oval:org.opensuse.security:def:35785
    P
    mono-core-2.6.7-0.7.19 on GA media (Moderate)
    2020-12-03
    oval:org.opensuse.security:def:35638
    P
    squid-2.7.STABLE5-2.4.1 on GA media (Moderate)
    2020-12-03
    oval:org.opensuse.security:def:35813
    P
    python-sssd-config-1.5.11-0.9.96 on GA media (Moderate)
    2020-12-03
    oval:org.opensuse.security:def:35720
    P
    java-1_4_2-ibm-1.4.2_sr13.10-0.4.1 on GA media (Moderate)
    2020-12-03
    oval:org.opensuse.security:def:35697
    P
    findutils-4.4.0-38.26.1 on GA media (Moderate)
    2020-12-03
    oval:org.opensuse.security:def:35857
    P
    PackageKit-0.3.14-2.28.46 on GA media (Moderate)
    2020-12-03
    oval:org.opensuse.security:def:35721
    P
    java-1_6_0-ibm-1.6.0_sr9.3-0.4.1 on GA media (Moderate)
    2020-12-03
    oval:org.opensuse.security:def:35746
    P
    libfreebl3-3.13.1-0.2.1 on GA media (Moderate)
    2020-12-03
    oval:org.opensuse.security:def:35922
    P
    java-1_6_0-ibm-1.6.0_sr13.1-0.9.1 on GA media (Moderate)
    2020-12-03
    oval:org.opensuse.security:def:6778
    P
    libvte9 on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:7047
    P
    libhogweed2 on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:31555
    P
    Security update for sqlite3 (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:31903
    P
    Security update for fontconfig (Low)
    2020-12-01
    oval:org.opensuse.security:def:32646
    P
    curl on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:31499
    P
    Security update for python-paramiko (Important)
    2020-12-01
    oval:org.opensuse.security:def:31855
    P
    Security update for crash (Low)
    2020-12-01
    oval:org.opensuse.security:def:6748
    P
    libqt4-32bit on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:31999
    P
    Security update for xorg-x11-server (Important)
    2020-12-01
    oval:org.opensuse.security:def:35094
    P
    Security update for Linux kernel
    2020-12-01
    oval:org.opensuse.security:def:35478
    P
    Security update for php53 (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:25347
    P
    Security update for mariadb (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:25697
    P
    Security update for ImageMagick (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:25989
    P
    Security update for the Linux Kernel (Important)
    2020-12-01
    oval:org.opensuse.security:def:26720
    P
    java-1_4_2-ibm on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:25284
    P
    Security update for xrdp (Important)
    2020-12-01
    oval:org.opensuse.security:def:25614
    P
    Security update for perl-DBI (Important)
    2020-12-01
    oval:org.opensuse.security:def:25951
    P
    Security update for pcsc-lite (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:26686
    P
    dhcpcd on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:34998
    P
    Security update for glibc (Important)
    2020-12-01
    oval:org.opensuse.security:def:25757
    P
    Security update for flash-player (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:26248
    P
    Security update for freerdp (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:25271
    P
    Security update for MozillaFirefox (Important)
    2020-12-01
    oval:org.opensuse.security:def:6824
    P
    python-libxml2 on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:31942
    P
    Security update for gnome-session (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:32685
    P
    java-1_4_2-ibm on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:31556
    P
    Security update for xorg-x11-server (Important)
    2020-12-01
    oval:org.opensuse.security:def:31904
    P
    Security update for foomatic-filters (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:32647
    P
    cyrus-imapd on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:31390
    P
    Security update for pam
    2020-12-01
    oval:org.opensuse.security:def:32055
    P
    Security update for kvm (Important)
    2020-12-01
    oval:org.opensuse.security:def:35230
    P
    Security update for libmspack (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:25475
    P
    Security update for libssh (Important)
    2020-12-01
    oval:org.opensuse.security:def:25848
    P
    Security update for flex, at, bogofilter, cyrus-imapd, kdelibs4, libQtWebKit4, libbonobo, mdbtools, netpbm, openslp, sgmltool, virtuoso, libqt5-qtwebkit (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:26003
    P
    Security update for yaml-cpp (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:25348
    P
    Security update for ucode-intel (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:25698
    P
    Security update for dpdk (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:25990
    P
    Security update for libvpx (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:26721
    P
    java-1_6_0-ibm on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:25484
    P
    Security update for libqt4 (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:25814
    P
    Security update for flash-player (Important)
    2020-12-01
    oval:org.opensuse.security:def:26886
    P
    ecryptfs-utils-32bit on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:25273
    P
    Security update for ceph (Important)
    2020-12-01
    oval:org.opensuse.security:def:25272
    P
    Security update for vino (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:31406
    P
    Security update for perl-PlRPC (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:31798
    P
    Security update for OpenEXR (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:31964
    P
    Security update for icu (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:31943
    P
    Security update for gnutls (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:32686
    P
    java-1_6_0-ibm on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:31401
    P
    Security update for perl-DBD-mysql (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:32847
    P
    dbus-1-glib on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:34999
    P
    Security update for glibc (Important)
    2020-12-01
    oval:org.opensuse.security:def:35331
    P
    Security update for minicom (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:25556
    P
    Security update for ntp (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:25901
    P
    Security update for flash-player (Important)
    2020-12-01
    oval:org.opensuse.security:def:25476
    P
    Security update for git (Important)
    2020-12-01
    oval:org.opensuse.security:def:25849
    P
    Security update for mariadb (Important)
    2020-12-01
    oval:org.opensuse.security:def:26004
    P
    Security update for shotwell (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:25548
    P
    Security update for ceph (Important)
    2020-12-01
    oval:org.opensuse.security:def:25898
    P
    Security update for the Linux Kernel (Important)
    2020-12-01
    oval:org.opensuse.security:def:26921
    P
    java-1_6_0-ibm on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:6756
    P
    libsndfile1 on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:7038
    P
    libgadu3 on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:25473
    P
    Security update for strongswan (Important)
    2020-12-01
    oval:org.opensuse.security:def:31498
    P
    Security update for python-numpy (Important)
    2020-12-01
    oval:org.opensuse.security:def:31854
    P
    Security update for cracklib (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:25472
    P
    Security update for apache2-mod_perl (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:31407
    P
    Security update for perl-XML-LibXML (Important)
    2020-12-01
    oval:org.opensuse.security:def:31799
    P
    Security update for SDL (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:31965
    P
    Security update for icu (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:31475
    P
    Security update for procps (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:31843
    P
    Security update for cairo (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:32886
    P
    java-1_6_0-ibm on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:35010
    P
    Security update for gnutls (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:35388
    P
    Security update for openldap2 (Important)
    2020-12-01
    oval:org.opensuse.security:def:25283
    P
    Security update for SUSE Manager Client Tools (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:25613
    P
    Security update for libsolv (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:25950
    P
    Security update for evince (Important)
    2020-12-01
    oval:org.opensuse.security:def:26685
    P
    dhcp on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:31389
    P
    Security update for orca (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:25557
    P
    Security update for transfig (Low)
    2020-12-01
    oval:org.opensuse.security:def:25902
    P
    Security update for ImageMagick (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:25676
    P
    Security update for postgresql, postgresql96, postgresql10 and postgresql12 (Moderate)
    2020-12-01
    oval:org.mitre.oval:def:12462
    V
    HP-UX Running Java, Remote Execution of Arbitrary Code, Disclosure of Information, and Other Vulnerabilities.
    2015-04-20
    oval:org.mitre.oval:def:12367
    V
    Unspecified vulnerability in the Networking component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, 1.4.2_27, and 1.3.1_28 and earlier versions
    2015-03-23
    oval:org.mitre.oval:def:13305
    P
    USN-1010-1 -- openjdk-6, openjdk-6b18 vulnerabilities
    2014-06-30
    oval:org.mitre.oval:def:22873
    P
    ELSA-2010:0807: java-1.5.0-ibm security update (Critical)
    2014-05-26
    oval:org.mitre.oval:def:23453
    P
    ELSA-2010:0987: java-1.6.0-ibm security and bug fix update (Critical)
    2014-05-26
    oval:org.mitre.oval:def:22954
    P
    ELSA-2010:0770: java-1.6.0-sun security update (Critical)
    2014-05-26
    oval:org.mitre.oval:def:23563
    P
    ELSA-2010:0865: java-1.6.0-openjdk security and bug fix update (Important)
    2014-05-26
    oval:org.mitre.oval:def:22962
    P
    ELSA-2010:0768: java-1.6.0-openjdk security and bug fix update (Important)
    2014-05-26
    oval:org.mitre.oval:def:23606
    P
    ELSA-2010:0873: java-1.5.0-ibm security update (Critical)
    2014-05-26
    oval:org.mitre.oval:def:22816
    P
    ELSA-2011:0152: java-1.4.2-ibm security update (Moderate)
    2014-05-26
    oval:org.mitre.oval:def:23245
    P
    ELSA-2010:0935: java-1.4.2-ibm security update (Moderate)
    2014-05-26
    oval:org.mitre.oval:def:22124
    P
    RHSA-2010:0770: java-1.6.0-sun security update (Critical)
    2014-02-24
    oval:org.mitre.oval:def:22342
    P
    RHSA-2010:0873: java-1.5.0-ibm security update (Critical)
    2014-02-24
    oval:org.mitre.oval:def:22284
    P
    RHSA-2010:0935: java-1.4.2-ibm security update (Moderate)
    2014-02-24
    oval:org.mitre.oval:def:22361
    P
    RHSA-2010:0807: java-1.5.0-ibm security update (Critical)
    2014-02-24
    oval:org.mitre.oval:def:21498
    P
    RHSA-2011:0152: java-1.4.2-ibm security update (Moderate)
    2014-02-24
    oval:org.mitre.oval:def:22285
    P
    RHSA-2010:0865: java-1.6.0-openjdk security and bug fix update (Important)
    2014-02-24
    oval:org.mitre.oval:def:21716
    P
    RHSA-2010:0768: java-1.6.0-openjdk security and bug fix update (Important)
    2014-02-24
    oval:org.mitre.oval:def:22313
    P
    RHSA-2010:0987: java-1.6.0-ibm security and bug fix update (Critical)
    2014-02-24
    oval:org.mitre.oval:def:20306
    V
    Third party component updates for VMware vCenter Server, vCenter Update Manager, ESXi and ESX
    2014-01-20
    oval:com.redhat.rhsa:def:20110152
    P
    RHSA-2011:0152: java-1.4.2-ibm security update (Moderate)
    2011-01-17
    oval:com.redhat.rhsa:def:20100987
    P
    RHSA-2010:0987: java-1.6.0-ibm security and bug fix update (Critical)
    2010-12-15
    oval:com.redhat.rhsa:def:20100935
    P
    RHSA-2010:0935: java-1.4.2-ibm security update (Moderate)
    2010-12-01
    oval:com.redhat.rhsa:def:20100873
    P
    RHSA-2010:0873: java-1.5.0-ibm security update (Critical)
    2010-11-10
    oval:com.redhat.rhsa:def:20100865
    P
    RHSA-2010:0865: java-1.6.0-openjdk security and bug fix update (Important)
    2010-11-10
    oval:com.redhat.rhsa:def:20100807
    P
    RHSA-2010:0807: java-1.5.0-ibm security update (Critical)
    2010-10-27
    oval:com.redhat.rhsa:def:20100770
    P
    RHSA-2010:0770: java-1.6.0-sun security update (Critical)
    2010-10-14
    oval:com.redhat.rhsa:def:20100768
    P
    RHSA-2010:0768: java-1.6.0-openjdk security and bug fix update (Important)
    2010-10-13
    BACK
    sun jre 1.6.0
    sun jre 1.6.0 update_1
    sun jre 1.6.0 update_10
    sun jre 1.6.0 update_11
    sun jre 1.6.0 update_12
    sun jre 1.6.0 update_13
    sun jre 1.6.0 update_14
    sun jre 1.6.0 update_15
    sun jre 1.6.0 update_16
    sun jre 1.6.0 update_17
    sun jre 1.6.0 update_18
    sun jre 1.6.0 update_19
    sun jre 1.6.0 update_2
    sun jre 1.6.0 update_20
    sun jre * update_21
    sun jre 1.6.0 update_3
    sun jre 1.6.0 update_4
    sun jre 1.6.0 update_5
    sun jre 1.6.0 update_6
    sun jre 1.6.0 update_7
    sun jdk 1.6.0
    sun jdk 1.6.0 update1
    sun jdk 1.6.0 update1_b06
    sun jdk 1.6.0 update2
    sun jdk 1.6.0 update_10
    sun jdk 1.6.0 update_11
    sun jdk 1.6.0 update_12
    sun jdk 1.6.0 update_13
    sun jdk 1.6.0 update_14
    sun jdk 1.6.0 update_15
    sun jdk 1.6.0 update_16
    sun jdk 1.6.0 update_17
    sun jdk 1.6.0 update_18
    sun jdk 1.6.0 update_19
    sun jdk 1.6.0 update_20
    sun jdk * update_21
    sun jdk 1.6.0 update_3
    sun jdk 1.6.0 update_4
    sun jdk 1.6.0 update_5
    sun jdk 1.6.0 update_6
    sun jdk 1.6.0 update_7
    sun jdk 1.5.0
    sun jdk 1.5.0 update1
    sun jdk 1.5.0 update10
    sun jdk 1.5.0 update11
    sun jdk 1.5.0 update12
    sun jdk 1.5.0 update13
    sun jdk 1.5.0 update14
    sun jdk 1.5.0 update15
    sun jdk 1.5.0 update16
    sun jdk 1.5.0 update17
    sun jdk 1.5.0 update18
    sun jdk 1.5.0 update19
    sun jdk 1.5.0 update2
    sun jdk 1.5.0 update20
    sun jdk 1.5.0 update21
    sun jdk 1.5.0 update22
    sun jdk 1.5.0 update23
    sun jdk 1.5.0 update24
    sun jdk * update25
    sun jdk 1.5.0 update3
    sun jdk 1.5.0 update4
    sun jdk 1.5.0 update5
    sun jdk 1.5.0 update6
    sun jdk 1.5.0 update7
    sun jdk 1.5.0 update8
    sun jdk 1.5.0 update9
    sun sdk 1.4.2
    sun sdk 1.4.2_1
    sun sdk 1.4.2_02
    sun sdk 1.4.2_3
    sun sdk 1.4.2_4
    sun sdk 1.4.2_5
    sun sdk 1.4.2_6
    sun sdk 1.4.2_7
    sun sdk 1.4.2_8
    sun sdk 1.4.2_9
    sun sdk 1.4.2_10
    sun sdk 1.4.2_11
    sun sdk 1.4.2_12
    sun sdk 1.4.2_13
    sun sdk 1.4.2_14
    sun sdk 1.4.2_15
    sun sdk 1.4.2_16
    sun sdk 1.4.2_17
    sun sdk 1.4.2_18
    sun sdk 1.4.2_19
    sun sdk 1.4.2_20
    sun sdk 1.4.2_21
    sun sdk 1.4.2_22
    sun sdk 1.4.2_23
    sun sdk 1.4.2_24
    sun sdk 1.4.2_25
    sun sdk 1.4.2_26
    sun sdk *
    sun jre 1.5.0
    sun jre 1.5.0 update1
    sun jre 1.5.0 update10
    sun jre 1.5.0 update11
    sun jre 1.5.0 update12
    sun jre 1.5.0 update13
    sun jre 1.5.0 update14
    sun jre 1.5.0 update15
    sun jre 1.5.0 update16
    sun jre 1.5.0 update17
    sun jre 1.5.0 update18
    sun jre 1.5.0 update19
    sun jre 1.5.0 update2
    sun jre 1.5.0 update20
    sun jre 1.5.0 update21
    sun jre 1.5.0 update22
    sun jre 1.5.0 update23
    sun jre 1.5.0 update24
    sun jre * update25
    sun jre 1.5.0 update3
    sun jre 1.5.0 update4
    sun jre 1.5.0 update5
    sun jre 1.5.0 update6
    sun jre 1.5.0 update7
    sun jre 1.5.0 update8
    sun jre 1.5.0 update9
    sun jre 1.4.2
    sun jre 1.4.2_1
    sun jre 1.4.2_2
    sun jre 1.4.2_3
    sun jre 1.4.2_4
    sun jre 1.4.2_5
    sun jre 1.4.2_6
    sun jre 1.4.2_7
    sun jre 1.4.2_8
    sun jre 1.4.2_9
    sun jre 1.4.2_10
    sun jre 1.4.2_11
    sun jre 1.4.2_12
    sun jre 1.4.2_13
    sun jre 1.4.2_14
    sun jre 1.4.2_15
    sun jre 1.4.2_16
    sun jre 1.4.2_17
    sun jre 1.4.2_18
    sun jre 1.4.2_19
    sun jre 1.4.2_20
    sun jre 1.4.2_21
    sun jre 1.4.2_22
    sun jre 1.4.2_23
    sun jre 1.4.2_24
    sun jre 1.4.2_25
    sun jre 1.4.2_26
    sun jre *
    sun jdk 1.3.0
    sun jdk 1.3.0_01
    sun jdk 1.3.0_02
    sun jdk 1.3.0_03
    sun jdk 1.3.0_04
    sun jdk 1.3.0_05
    sun jdk 1.3.1
    sun jdk 1.3.1_01
    sun jdk 1.3.1_01a
    sun jdk 1.3.1_02
    sun jdk 1.3.1_03
    sun jdk 1.3.1_04
    sun jdk 1.3.1_05
    sun jdk 1.3.1_06
    sun jdk 1.3.1_07
    sun jdk 1.3.1_08
    sun jdk 1.3.1_09
    sun jdk 1.3.1_10
    sun jdk 1.3.1_11
    sun jdk 1.3.1_12
    sun jdk 1.3.1_13
    sun jdk 1.3.1_14
    sun jdk 1.3.1_15
    sun jdk 1.3.1_16
    sun jdk 1.3.1_17
    sun jdk 1.3.1_18
    sun jdk 1.3.1_19
    sun jdk 1.3.1_20
    sun jdk 1.3.1_21
    sun jdk 1.3.1_22
    sun jdk 1.3.1_23
    sun jdk 1.3.1_24
    sun jdk 1.3.1_25
    sun jdk 1.3.1_26
    sun jdk 1.3.1_27
    sun jdk *
    sun jre 1.3.0
    sun jre 1.3.0 update1
    sun jre 1.3.0 update2
    sun jre 1.3.0 update3
    sun jre 1.3.0 update4
    sun jre 1.3.0 update5
    sun jre 1.3.1
    sun jre 1.3.1 update1
    sun jre 1.3.1 update2
    sun jre 1.3.1_2
    sun jre 1.3.1_03
    sun jre 1.3.1_04
    sun jre 1.3.1_05
    sun jre 1.3.1_06
    sun jre 1.3.1_07
    sun jre 1.3.1_08
    sun jre 1.3.1_09
    sun jre 1.3.1_10
    sun jre 1.3.1_11
    sun jre 1.3.1_12
    sun jre 1.3.1_13
    sun jre 1.3.1_14
    sun jre 1.3.1_15
    sun jre 1.3.1_16
    sun jre 1.3.1_17
    sun jre 1.3.1_18
    sun jre 1.3.1_19
    sun jre 1.3.1_20
    sun jre 1.3.1_21
    sun jre 1.3.1_22
    sun jre 1.3.1_23
    sun jre 1.3.1_24
    sun jre 1.3.1_25
    sun jre 1.3.1_26
    sun jre 1.3.1_27
    sun jre *
    sun sdk 1.3.0
    sun sdk 1.3.0_01
    sun sdk 1.3.0_02
    sun sdk 1.3.0_03
    sun sdk 1.3.0_04
    sun sdk 1.3.0_05
    sun sdk 1.3.1
    sun sdk 1.3.1_01
    sun sdk 1.3.1_01a
    sun sdk 1.3.1_02
    sun sdk 1.3.1_03
    sun sdk 1.3.1_04
    sun sdk 1.3.1_05
    sun sdk 1.3.1_06
    sun sdk 1.3.1_07
    sun sdk 1.3.1_08
    sun sdk 1.3.1_09
    sun sdk 1.3.1_10
    sun sdk 1.3.1_11
    sun sdk 1.3.1_12
    sun sdk 1.3.1_13
    sun sdk 1.3.1_14
    sun sdk 1.3.1_15
    sun sdk 1.3.1_16
    sun sdk 1.3.1_17
    sun sdk 1.3.1_18
    sun sdk 1.3.1_19
    sun sdk 1.3.1_20
    sun sdk 1.3.1_21
    sun sdk 1.3.1_22
    sun sdk 1.3.1_23
    sun sdk 1.3.1_24
    sun sdk 1.3.1_25
    sun sdk 1.3.1_26
    sun sdk 1.3.1_27
    sun sdk *
    oracle jrockit r28.0.0
    redhat rhel extras 4
    novell suse linux enterprise server 10
    suse novell linux pos 9
    redhat enterprise linux 5
    redhat enterprise linux 5
    novell open enterprise server *
    redhat enterprise linux 6
    redhat enterprise linux 6
    redhat enterprise linux server supplementary 6.0
    redhat enterprise linux workstation supplementary 6.0
    redhat enterprise linux desktop 6
    redhat enterprise linux desktop supplementary 6.0
    redhat enterprise linux hpc node 6
    redhat enterprise linux hpc node supplementary 6.0