Vulnerability Name: CVE-2011-0815 (CCN-67917) Assigned: 2011-06-07 Published: 2011-06-07 Updated: 2018-10-30 Summary: Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 6 Update 25 and earlier, 5.0 Update 29 and earlier, and 1.4.2_31 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to AWT. CVSS v3 Severity: 10.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H )Exploitability Metrics: Attack Vector (AV): NetworkAttack Complexity (AC): LowPrivileges Required (PR): NoneUser Interaction (UI): NoneScope: Scope (S): ChangedImpact Metrics: Confidentiality (C): HighIntegrity (I): HighAvailibility (A): High
CVSS v2 Severity: 10.0 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C )7.4 High (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): LowAuthentication (Au): NoneImpact Metrics: Confidentiality (C): CompleteIntegrity (I): CompleteAvailibility (A): Complete
10.0 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C )7.4 High (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): LowAthentication (Au): NoneImpact Metrics: Confidentiality (C): CompleteIntegrity (I): CompleteAvailibility (A): Complete
Vulnerability Type: CWE-noinfo Vulnerability Consequences: Gain Access References: Source: MITRE Type: CNACVE-2011-0815 Source: CCN Type: HP Security Bulletin HPSBMU02769 SSRT100846HP Systems Insight Manager (SIM) for HP-UX, Linux, and Windows, Remote Unauthorized Access, Execution of Arbitrary Code, and Other Vulnerabilities Source: SUSE Type: UNKNOWNopenSUSE-SU-2011:0633 Source: SUSE Type: UNKNOWNSUSE-SA:2011:030 Source: SUSE Type: UNKNOWNSUSE-SU-2011:0807 Source: SUSE Type: UNKNOWNSUSE-SU-2011:0863 Source: SUSE Type: UNKNOWNSUSE-SA:2011:032 Source: SUSE Type: UNKNOWNSUSE-SA:2011:036 Source: SUSE Type: UNKNOWNSUSE-SU-2011:0966 Source: HP Type: UNKNOWNSSRT100591 Source: HP Type: UNKNOWNHPSBUX02777 Source: HP Type: UNKNOWNHPSBMU02799 Source: HP Type: UNKNOWNSSRT100867 Source: CCN Type: SA44784Sun Java JDK / JRE / SDK Multiple Vulnerabilities Source: SECUNIA Type: UNKNOWN44930 Source: CCN Type: SA45206IBM Java Multiple Vulnerabilities Source: CCN Type: SA45245Hitachi Cosminexus Products Java Multiple Vulnerabilities Source: SECUNIA Type: UNKNOWN49198 Source: GENTOO Type: UNKNOWNGLSA-201406-32 Source: CONFIRM Type: UNKNOWNhttp://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS11-015/index.html Source: CCN Type: Hitachi Security Vulnerability Information HS11-015Cosminexus Source: CCN Type: IBM Web siteOracle June 7 2011 CPU Source: CONFIRM Type: UNKNOWNhttp://www.ibm.com/developerworks/java/jdk/alerts/ Source: CONFIRM Type: UNKNOWNhttp://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html Source: CCN Type: Oracle Java SE Critical Patch Update Advisory - June 2011Oracle Java SE Critical Patch Update Advisory - June 2011 Source: CONFIRM Type: Patch, Vendor Advisoryhttp://www.oracle.com/technetwork/topics/security/javacpujune2011-313339.html Source: CCN Type: OSVDB ID: 73071Oracle Java SE / JRE AWT Unspecified Remote Code Execution Source: CCN Type: BID-48143Oracle Java SE and Java for Business CVE-2011-0815 Remote Java Runtime Environment Vulnerability Source: CERT Type: US Government ResourceTA11-201A Source: XF Type: UNKNOWNjavase-jre-awt-unspecified(67917) Source: OVAL Type: UNKNOWNoval:org.mitre.oval:def:14335 Source: OVAL Type: UNKNOWNoval:org.mitre.oval:def:14896 Vulnerable Configuration: Configuration 1 :cpe:/a:sun:jdk:1.4.2:-:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.4.2_1:*:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.4.2_2:*:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.4.2_3:*:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.4.2_4:*:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.4.2_5:*:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.4.2_6:*:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.4.2_7:*:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.4.2_8:*:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.4.2_9:*:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.4.2_10:*:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.4.2_11:*:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.4.2_12:*:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.4.2_13:*:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.4.2_14:*:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.4.2_15:*:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.4.2_16:*:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.4.2_17:*:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.4.2_18:*:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.4.2_19:*:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.4.2_20:*:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.4.2_21:*:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.4.2_22:*:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.4.2_23:*:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.4.2_24:*:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.4.2_25:*:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.4.2_26:*:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.4.2_27:*:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.4.2_28:*:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.4.2_29:*:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.4.2_30:*:*:*:*:*:*:* OR cpe:/a:sun:jdk:*:*:*:*:*:*:*:* (Version <= 1.4.2_31) OR cpe:/a:sun:jre:1.4.2:-:*:*:*:*:*:* OR cpe:/a:sun:jre:1.4.2_1:*:*:*:*:*:*:* OR cpe:/a:sun:jre:1.4.2_2:*:*:*:*:*:*:* OR cpe:/a:sun:jre:1.4.2_3:*:*:*:*:*:*:* OR cpe:/a:sun:jre:1.4.2_4:*:*:*:*:*:*:* OR cpe:/a:sun:jre:1.4.2_5:*:*:*:*:*:*:* OR cpe:/a:sun:jre:1.4.2_6:*:*:*:*:*:*:* OR cpe:/a:sun:jre:1.4.2_7:*:*:*:*:*:*:* OR cpe:/a:sun:jre:1.4.2_8:*:*:*:*:*:*:* OR cpe:/a:sun:jre:1.4.2_9:*:*:*:*:*:*:* OR cpe:/a:sun:jre:1.4.2_10:*:*:*:*:*:*:* OR cpe:/a:sun:jre:1.4.2_11:*:*:*:*:*:*:* OR cpe:/a:sun:jre:1.4.2_12:*:*:*:*:*:*:* OR cpe:/a:sun:jre:1.4.2_13:*:*:*:*:*:*:* OR cpe:/a:sun:jre:1.4.2_14:*:*:*:*:*:*:* OR cpe:/a:sun:jre:1.4.2_15:*:*:*:*:*:*:* OR cpe:/a:sun:jre:1.4.2_16:*:*:*:*:*:*:* OR cpe:/a:sun:jre:1.4.2_17:*:*:*:*:*:*:* OR cpe:/a:sun:jre:1.4.2_18:*:*:*:*:*:*:* OR cpe:/a:sun:jre:1.4.2_19:*:*:*:*:*:*:* OR cpe:/a:sun:jre:1.4.2_20:*:*:*:*:*:*:* OR cpe:/a:sun:jre:1.4.2_21:*:*:*:*:*:*:* OR cpe:/a:sun:jre:1.4.2_22:*:*:*:*:*:*:* OR cpe:/a:sun:jre:1.4.2_23:*:*:*:*:*:*:* OR cpe:/a:sun:jre:1.4.2_24:*:*:*:*:*:*:* OR cpe:/a:sun:jre:1.4.2_25:*:*:*:*:*:*:* OR cpe:/a:sun:jre:1.4.2_26:*:*:*:*:*:*:* OR cpe:/a:sun:jre:1.4.2_27:*:*:*:*:*:*:* OR cpe:/a:sun:jre:1.4.2_28:*:*:*:*:*:*:* OR cpe:/a:sun:jre:1.4.2_29:*:*:*:*:*:*:* OR cpe:/a:sun:jre:1.4.2_30:*:*:*:*:*:*:* OR cpe:/a:sun:jre:*:*:*:*:*:*:*:* (Version <= 1.4.2_31) Configuration 2 :cpe:/a:sun:jdk:1.6.0:-:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.6.0:update1:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.6.0:update2:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.6.0:update_10:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.6.0:update_11:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.6.0:update_12:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.6.0:update_13:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.6.0:update_14:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.6.0:update_15:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.6.0:update_16:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.6.0:update_17:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.6.0:update_18:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.6.0:update_19:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.6.0:update_20:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.6.0:update_21:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.6.0:update_22:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.6.0:update_23:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.6.0:update_24:*:*:*:*:*:* OR cpe:/a:sun:jdk:*:update_25:*:*:*:*:*:* (Version <= 1.6.0) OR cpe:/a:sun:jdk:1.6.0:update_3:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.6.0:update_4:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.6.0:update_5:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.6.0:update_6:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.6.0:update_7:*:*:*:*:*:* OR cpe:/a:sun:jre:1.6.0:-:*:*:*:*:*:* OR cpe:/a:sun:jre:1.6.0:update_1:*:*:*:*:*:* OR cpe:/a:sun:jre:1.6.0:update_10:*:*:*:*:*:* OR cpe:/a:sun:jre:1.6.0:update_11:*:*:*:*:*:* OR cpe:/a:sun:jre:1.6.0:update_12:*:*:*:*:*:* OR cpe:/a:sun:jre:1.6.0:update_13:*:*:*:*:*:* OR cpe:/a:sun:jre:1.6.0:update_14:*:*:*:*:*:* OR cpe:/a:sun:jre:1.6.0:update_15:*:*:*:*:*:* OR cpe:/a:sun:jre:1.6.0:update_16:*:*:*:*:*:* OR cpe:/a:sun:jre:1.6.0:update_17:*:*:*:*:*:* OR cpe:/a:sun:jre:1.6.0:update_18:*:*:*:*:*:* OR cpe:/a:sun:jre:1.6.0:update_19:*:*:*:*:*:* OR cpe:/a:sun:jre:1.6.0:update_2:*:*:*:*:*:* OR cpe:/a:sun:jre:1.6.0:update_20:*:*:*:*:*:* OR cpe:/a:sun:jre:1.6.0:update_21:*:*:*:*:*:* OR cpe:/a:sun:jre:1.6.0:update_22:*:*:*:*:*:* OR cpe:/a:sun:jre:1.6.0:update_23:*:*:*:*:*:* OR cpe:/a:sun:jre:1.6.0:update_24:*:*:*:*:*:* OR cpe:/a:sun:jre:*:update_25:*:*:*:*:*:* (Version <= 1.6.0) OR cpe:/a:sun:jre:1.6.0:update_3:*:*:*:*:*:* OR cpe:/a:sun:jre:1.6.0:update_4:*:*:*:*:*:* OR cpe:/a:sun:jre:1.6.0:update_5:*:*:*:*:*:* OR cpe:/a:sun:jre:1.6.0:update_6:*:*:*:*:*:* OR cpe:/a:sun:jre:1.6.0:update_7:*:*:*:*:*:* Configuration 3 :cpe:/a:sun:jdk:1.5.0:-:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.5.0:update1:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.5.0:update10:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.5.0:update11:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.5.0:update11_b03:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.5.0:update12:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.5.0:update13:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.5.0:update14:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.5.0:update15:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.5.0:update16:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.5.0:update17:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.5.0:update18:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.5.0:update19:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.5.0:update2:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.5.0:update20:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.5.0:update21:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.5.0:update22:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.5.0:update23:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.5.0:update24:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.5.0:update25:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.5.0:update26:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.5.0:update27:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.5.0:update28:*:*:*:*:*:* OR cpe:/a:sun:jdk:*:update29:*:*:*:*:*:* (Version <= 1.5.0) OR cpe:/a:sun:jdk:1.5.0:update3:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.5.0:update4:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.5.0:update5:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.5.0:update6:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.5.0:update7:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.5.0:update7_b03:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.5.0:update8:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.5.0:update9:*:*:*:*:*:* OR cpe:/a:sun:jre:1.5.0:-:*:*:*:*:*:* OR cpe:/a:sun:jre:1.5.0:update1:*:*:*:*:*:* OR cpe:/a:sun:jre:1.5.0:update10:*:*:*:*:*:* OR cpe:/a:sun:jre:1.5.0:update11:*:*:*:*:*:* OR cpe:/a:sun:jre:1.5.0:update12:*:*:*:*:*:* OR cpe:/a:sun:jre:1.5.0:update13:*:*:*:*:*:* OR cpe:/a:sun:jre:1.5.0:update14:*:*:*:*:*:* OR cpe:/a:sun:jre:1.5.0:update15:*:*:*:*:*:* OR cpe:/a:sun:jre:1.5.0:update16:*:*:*:*:*:* OR cpe:/a:sun:jre:1.5.0:update17:*:*:*:*:*:* OR cpe:/a:sun:jre:1.5.0:update18:*:*:*:*:*:* OR cpe:/a:sun:jre:1.5.0:update19:*:*:*:*:*:* OR cpe:/a:sun:jre:1.5.0:update2:*:*:*:*:*:* OR cpe:/a:sun:jre:1.5.0:update20:*:*:*:*:*:* OR cpe:/a:sun:jre:1.5.0:update21:*:*:*:*:*:* OR cpe:/a:sun:jre:1.5.0:update22:*:*:*:*:*:* OR cpe:/a:sun:jre:1.5.0:update23:*:*:*:*:*:* OR cpe:/a:sun:jre:1.5.0:update24:*:*:*:*:*:* OR cpe:/a:sun:jre:1.5.0:update25:*:*:*:*:*:* OR cpe:/a:sun:jre:1.5.0:update26:*:*:*:*:*:* OR cpe:/a:sun:jre:1.5.0:update27:*:*:*:*:*:* OR cpe:/a:sun:jre:*:update29:*:*:*:*:*:* (Version <= 1.5.0) OR cpe:/a:sun:jre:1.5.0:update3:*:*:*:*:*:* OR cpe:/a:sun:jre:1.5.0:update4:*:*:*:*:*:* OR cpe:/a:sun:jre:1.5.0:update5:*:*:*:*:*:* OR cpe:/a:sun:jre:1.5.0:update6:*:*:*:*:*:* OR cpe:/a:sun:jre:1.5.0:update7:*:*:*:*:*:* OR cpe:/a:sun:jre:1.5.0:update8:*:*:*:*:*:* OR cpe:/a:sun:jre:1.5.0:update9:*:*:*:*:*:* Configuration CCN 1 :cpe:/a:hp:systems_insight_manager:4.2:sp1:*:*:*:*:*:* OR cpe:/a:hp:systems_insight_manager:4.2:sp2:*:*:*:*:*:* OR cpe:/a:hp:systems_insight_manager:5.0:sp1:*:*:*:*:*:* OR cpe:/a:hp:systems_insight_manager:5.0:sp2:*:*:*:*:*:* OR cpe:/a:hp:systems_insight_manager:5.0:sp3:*:*:*:*:*:* OR cpe:/a:hp:systems_insight_manager:5.0:sp5:*:*:*:*:*:* OR cpe:/a:hp:systems_insight_manager:4.0:*:*:*:*:*:*:* OR cpe:/a:hp:systems_insight_manager:5.0:*:*:*:*:*:*:* OR cpe:/a:hp:systems_insight_manager:5.3:*:*:*:*:*:*:* OR cpe:/a:hp:systems_insight_manager:5.3:update_1:*:*:*:*:*:* OR cpe:/a:hp:systems_insight_manager:6.0:*:*:*:*:*:*:* OR cpe:/a:hp:systems_insight_manager:6.1:*:*:*:*:*:*:* OR cpe:/a:hp:systems_insight_manager:6.2:*:*:*:*:*:*:* OR cpe:/a:hp:systems_insight_manager:6.3:*:*:*:*:*:*:* AND cpe:/a:hitachi:ucosminexus_service_architect:*:*:*:*:*:*:*:* OR cpe:/a:hitachi:processing_kit_for_xml:01-00:*:*:*:*:*:*:* OR cpe:/a:hitachi:ucosminexus_client:06-70-/f:*:*:*:*:*:*:* OR cpe:/a:hitachi:ucosminexus_operator:07-00-05:*:*:*:*:*:*:* OR cpe:/a:hitachi:ucosminexus_service_platform:*:*:*:*:*:*:*:* OR cpe:/a:ibm:java:6.0.0.0:*:*:*:*:*:*:* OR cpe:/a:hitachi:ucosminexus_developer:6:-:standard:*:*:*:*:* Denotes that component is vulnerable Oval Definitions Definition ID Class Title Last Modified oval:org.opensuse.security:def:20110815 V CVE-2011-0815 2022-05-20 oval:org.mitre.oval:def:14896 V HP-UX Running Java, Remote Unauthorized Access, Disclosure of Information, and Other Vulnerabilities 2015-04-20 oval:org.mitre.oval:def:14335 V Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 6 Update 25 and earlier, 5.0 Update 29 and earlier, and 1.4.2_31 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to AWT. 2015-03-23 oval:org.mitre.oval:def:14114 P USN-1154-1 -- openjdk-6, openjdk-6b18 vulnerabilities 2014-06-30
BACK
sun jdk 1.4.2
sun jdk 1.4.2_1
sun jdk 1.4.2_2
sun jdk 1.4.2_3
sun jdk 1.4.2_4
sun jdk 1.4.2_5
sun jdk 1.4.2_6
sun jdk 1.4.2_7
sun jdk 1.4.2_8
sun jdk 1.4.2_9
sun jdk 1.4.2_10
sun jdk 1.4.2_11
sun jdk 1.4.2_12
sun jdk 1.4.2_13
sun jdk 1.4.2_14
sun jdk 1.4.2_15
sun jdk 1.4.2_16
sun jdk 1.4.2_17
sun jdk 1.4.2_18
sun jdk 1.4.2_19
sun jdk 1.4.2_20
sun jdk 1.4.2_21
sun jdk 1.4.2_22
sun jdk 1.4.2_23
sun jdk 1.4.2_24
sun jdk 1.4.2_25
sun jdk 1.4.2_26
sun jdk 1.4.2_27
sun jdk 1.4.2_28
sun jdk 1.4.2_29
sun jdk 1.4.2_30
sun jdk *
sun jre 1.4.2
sun jre 1.4.2_1
sun jre 1.4.2_2
sun jre 1.4.2_3
sun jre 1.4.2_4
sun jre 1.4.2_5
sun jre 1.4.2_6
sun jre 1.4.2_7
sun jre 1.4.2_8
sun jre 1.4.2_9
sun jre 1.4.2_10
sun jre 1.4.2_11
sun jre 1.4.2_12
sun jre 1.4.2_13
sun jre 1.4.2_14
sun jre 1.4.2_15
sun jre 1.4.2_16
sun jre 1.4.2_17
sun jre 1.4.2_18
sun jre 1.4.2_19
sun jre 1.4.2_20
sun jre 1.4.2_21
sun jre 1.4.2_22
sun jre 1.4.2_23
sun jre 1.4.2_24
sun jre 1.4.2_25
sun jre 1.4.2_26
sun jre 1.4.2_27
sun jre 1.4.2_28
sun jre 1.4.2_29
sun jre 1.4.2_30
sun jre *
sun jdk 1.6.0
sun jdk 1.6.0 update1
sun jdk 1.6.0 update2
sun jdk 1.6.0 update_10
sun jdk 1.6.0 update_11
sun jdk 1.6.0 update_12
sun jdk 1.6.0 update_13
sun jdk 1.6.0 update_14
sun jdk 1.6.0 update_15
sun jdk 1.6.0 update_16
sun jdk 1.6.0 update_17
sun jdk 1.6.0 update_18
sun jdk 1.6.0 update_19
sun jdk 1.6.0 update_20
sun jdk 1.6.0 update_21
sun jdk 1.6.0 update_22
sun jdk 1.6.0 update_23
sun jdk 1.6.0 update_24
sun jdk * update_25
sun jdk 1.6.0 update_3
sun jdk 1.6.0 update_4
sun jdk 1.6.0 update_5
sun jdk 1.6.0 update_6
sun jdk 1.6.0 update_7
sun jre 1.6.0
sun jre 1.6.0 update_1
sun jre 1.6.0 update_10
sun jre 1.6.0 update_11
sun jre 1.6.0 update_12
sun jre 1.6.0 update_13
sun jre 1.6.0 update_14
sun jre 1.6.0 update_15
sun jre 1.6.0 update_16
sun jre 1.6.0 update_17
sun jre 1.6.0 update_18
sun jre 1.6.0 update_19
sun jre 1.6.0 update_2
sun jre 1.6.0 update_20
sun jre 1.6.0 update_21
sun jre 1.6.0 update_22
sun jre 1.6.0 update_23
sun jre 1.6.0 update_24
sun jre * update_25
sun jre 1.6.0 update_3
sun jre 1.6.0 update_4
sun jre 1.6.0 update_5
sun jre 1.6.0 update_6
sun jre 1.6.0 update_7
sun jdk 1.5.0
sun jdk 1.5.0 update1
sun jdk 1.5.0 update10
sun jdk 1.5.0 update11
sun jdk 1.5.0 update11_b03
sun jdk 1.5.0 update12
sun jdk 1.5.0 update13
sun jdk 1.5.0 update14
sun jdk 1.5.0 update15
sun jdk 1.5.0 update16
sun jdk 1.5.0 update17
sun jdk 1.5.0 update18
sun jdk 1.5.0 update19
sun jdk 1.5.0 update2
sun jdk 1.5.0 update20
sun jdk 1.5.0 update21
sun jdk 1.5.0 update22
sun jdk 1.5.0 update23
sun jdk 1.5.0 update24
sun jdk 1.5.0 update25
sun jdk 1.5.0 update26
sun jdk 1.5.0 update27
sun jdk 1.5.0 update28
sun jdk * update29
sun jdk 1.5.0 update3
sun jdk 1.5.0 update4
sun jdk 1.5.0 update5
sun jdk 1.5.0 update6
sun jdk 1.5.0 update7
sun jdk 1.5.0 update7_b03
sun jdk 1.5.0 update8
sun jdk 1.5.0 update9
sun jre 1.5.0
sun jre 1.5.0 update1
sun jre 1.5.0 update10
sun jre 1.5.0 update11
sun jre 1.5.0 update12
sun jre 1.5.0 update13
sun jre 1.5.0 update14
sun jre 1.5.0 update15
sun jre 1.5.0 update16
sun jre 1.5.0 update17
sun jre 1.5.0 update18
sun jre 1.5.0 update19
sun jre 1.5.0 update2
sun jre 1.5.0 update20
sun jre 1.5.0 update21
sun jre 1.5.0 update22
sun jre 1.5.0 update23
sun jre 1.5.0 update24
sun jre 1.5.0 update25
sun jre 1.5.0 update26
sun jre 1.5.0 update27
sun jre * update29
sun jre 1.5.0 update3
sun jre 1.5.0 update4
sun jre 1.5.0 update5
sun jre 1.5.0 update6
sun jre 1.5.0 update7
sun jre 1.5.0 update8
sun jre 1.5.0 update9
hp systems insight manager 4.2 sp1
hp systems insight manager 4.2 sp2
hp systems insight manager 5.0 sp1
hp systems insight manager 5.0 sp2
hp systems insight manager 5.0 sp3
hp systems insight manager 5.0 sp5
hp systems insight manager 4.0
hp systems insight manager 5.0
hp systems insight manager 5.3
hp systems insight manager 5.3 update_1
hp systems insight manager 6.0
hp systems insight manager 6.1
hp systems insight manager 6.2
hp systems insight manager 6.3
hitachi ucosminexus service architect *
hitachi processing kit for xml 01-00
hitachi ucosminexus client 06-70-/f
hitachi ucosminexus operator 07-00-05
hitachi ucosminexus service platform *
ibm java 6.0.0.0
hitachi ucosminexus developer 6 -