Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2010-0090

Опубликовано: 01 апр. 2010
Источник: ubuntu
Приоритет: medium
CVSS2: 5.8

Описание

Unspecified vulnerability in the Java Web Start, Java Plug-in component in Oracle Java SE and Java for Business 6 Update 18 allows remote attackers to affect integrity and availability via unknown vectors.

РелизСтатусПримечание
dapper

DNE

devel

not-affected

hardy

not-affected

intrepid

ignored

end of life, was needed
jaunty

not-affected

karmic

not-affected

lucid

not-affected

maverick

not-affected

natty

not-affected

upstream

not-affected

Показывать по

РелизСтатусПримечание
dapper

ignored

end of life
devel

DNE

hardy

ignored

end of life
intrepid

ignored

end of life, was needed
jaunty

ignored

end of life
karmic

DNE

lucid

DNE

maverick

DNE

natty

DNE

upstream

released

1.5.0-24

Показывать по

РелизСтатусПримечание
dapper

DNE

devel

not-affected

hardy

released

6.20dlj-0ubuntu1.8.04
intrepid

ignored

end of life, was needs-triage
jaunty

released

6.20dlj-0ubuntu1.9.04
karmic

released

6.20dlj-0ubuntu1.9.10
lucid

not-affected

6.19-0ubuntu1
maverick

not-affected

natty

not-affected

upstream

released

6.19

Показывать по

5.8 Medium

CVSS2

Связанные уязвимости

redhat
больше 15 лет назад

Unspecified vulnerability in the Java Web Start, Java Plug-in component in Oracle Java SE and Java for Business 6 Update 18 allows remote attackers to affect integrity and availability via unknown vectors.

nvd
больше 15 лет назад

Unspecified vulnerability in the Java Web Start, Java Plug-in component in Oracle Java SE and Java for Business 6 Update 18 allows remote attackers to affect integrity and availability via unknown vectors.

debian
больше 15 лет назад

Unspecified vulnerability in the Java Web Start, Java Plug-in componen ...

github
больше 3 лет назад

Unspecified vulnerability in the Java Web Start, Java Plug-in component in Oracle Java SE and Java for Business 6 Update 18 allows remote attackers to affect integrity and availability via unknown vectors.

5.8 Medium

CVSS2