CWE
Advisory Published
Updated

CVE-2006-6736

First published: Tue Dec 26 2006(Updated: )

Unspecified vulnerability in Sun Java Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 6 and earlier, Java System Development Kit (SDK) and JRE 1.4.2_12 and earlier 1.4.x versions, and SDK and JRE 1.3.1_18 and earlier allows attackers to use untrusted applets to "access data in other applets," aka "The second issue."

Credit: cve@mitre.org

Affected SoftwareAffected VersionHow to fix
Java Development Kit (JDK)=1.5.0
Java Development Kit (JDK)=1.5.0-update1
Java Development Kit (JDK)=1.5.0-update2
Java Development Kit (JDK)=1.5.0-update3
Java Development Kit (JDK)=1.5.0-update4
Java Development Kit (JDK)=1.5.0-update5
Java Development Kit (JDK)=1.5.0-update6
Sun Java Runtime Environment (JRE)=1.3.1
Sun Java Runtime Environment (JRE)=1.3.1_2
Sun Java Runtime Environment (JRE)=1.3.1_03
Sun Java Runtime Environment (JRE)=1.3.1_04
Sun Java Runtime Environment (JRE)=1.3.1_05
Sun Java Runtime Environment (JRE)=1.3.1_06
Sun Java Runtime Environment (JRE)=1.3.1_07
Sun Java Runtime Environment (JRE)=1.3.1_08
Sun Java Runtime Environment (JRE)=1.3.1_09
Sun Java Runtime Environment (JRE)=1.3.1_10
Sun Java Runtime Environment (JRE)=1.3.1_11
Sun Java Runtime Environment (JRE)=1.3.1_12
Sun Java Runtime Environment (JRE)=1.3.1_13
Sun Java Runtime Environment (JRE)=1.3.1_14
Sun Java Runtime Environment (JRE)=1.3.1_15
Sun Java Runtime Environment (JRE)=1.3.1_16
Sun Java Runtime Environment (JRE)=1.3.1_17
Sun Java Runtime Environment (JRE)=1.3.1_18
Sun Java Runtime Environment (JRE)=1.4.2
Sun Java Runtime Environment (JRE)=1.4.2_1
Sun Java Runtime Environment (JRE)=1.4.2_2
Sun Java Runtime Environment (JRE)=1.4.2_3
Sun Java Runtime Environment (JRE)=1.4.2_4
Sun Java Runtime Environment (JRE)=1.4.2_5
Sun Java Runtime Environment (JRE)=1.4.2_6
Sun Java Runtime Environment (JRE)=1.4.2_7
Sun Java Runtime Environment (JRE)=1.4.2_8
Sun Java Runtime Environment (JRE)=1.4.2_9
Sun Java Runtime Environment (JRE)=1.4.2_10
Sun Java Runtime Environment (JRE)=1.4.2_11
Sun Java Runtime Environment (JRE)=1.4.2_12
Sun Java Runtime Environment (JRE)=1.5.0
Sun Java Runtime Environment (JRE)=1.5.0-update1
Sun Java Runtime Environment (JRE)=1.5.0-update2
Sun Java Runtime Environment (JRE)=1.5.0-update3
Sun Java Runtime Environment (JRE)=1.5.0-update4
Sun Java Runtime Environment (JRE)=1.5.0-update5
Sun Java Runtime Environment (JRE)=1.5.0-update6
Java Development Kit (JDK)=1.3.1
Java Development Kit (JDK)=1.3.1_01
Java Development Kit (JDK)=1.3.1_01a
Java Development Kit (JDK)=1.3.1_02
Java Development Kit (JDK)=1.3.1_03
Java Development Kit (JDK)=1.3.1_04
Java Development Kit (JDK)=1.3.1_05
Java Development Kit (JDK)=1.3.1_06
Java Development Kit (JDK)=1.3.1_07
Java Development Kit (JDK)=1.3.1_08
Java Development Kit (JDK)=1.3.1_09
Java Development Kit (JDK)=1.3.1_10
Java Development Kit (JDK)=1.3.1_11
Java Development Kit (JDK)=1.3.1_12
Java Development Kit (JDK)=1.3.1_13
Java Development Kit (JDK)=1.3.1_14
Java Development Kit (JDK)=1.3.1_15
Java Development Kit (JDK)=1.3.1_16
Java Development Kit (JDK)=1.3.1_17
Java Development Kit (JDK)=1.3.1_18
Java Development Kit (JDK)=1.4.2
Java Development Kit (JDK)=1.4.2_1
Java Development Kit (JDK)=1.4.2_2
Java Development Kit (JDK)=1.4.2_3
Java Development Kit (JDK)=1.4.2_4
Java Development Kit (JDK)=1.4.2_5
Java Development Kit (JDK)=1.4.2_6
Java Development Kit (JDK)=1.4.2_7
Java Development Kit (JDK)=1.4.2_8
Java Development Kit (JDK)=1.4.2_9
Java Development Kit (JDK)=1.4.2_10
Java Development Kit (JDK)=1.4.2_11
Java Development Kit (JDK)=1.4.2_12
=1.5.0
=1.5.0-update1
=1.5.0-update2
=1.5.0-update3
=1.5.0-update4
=1.5.0-update5
=1.5.0-update6
=1.3.1
=1.3.1_2
=1.3.1_03
=1.3.1_04
=1.3.1_05
=1.3.1_06
=1.3.1_07
=1.3.1_08
=1.3.1_09
=1.3.1_10
=1.3.1_11
=1.3.1_12
=1.3.1_13
=1.3.1_14
=1.3.1_15
=1.3.1_16
=1.3.1_17
=1.3.1_18
=1.4.2
=1.4.2_1
=1.4.2_2
=1.4.2_3
=1.4.2_4
=1.4.2_5
=1.4.2_6
=1.4.2_7
=1.4.2_8
=1.4.2_9
=1.4.2_10
=1.4.2_11
=1.4.2_12
=1.5.0
=1.5.0-update1
=1.5.0-update2
=1.5.0-update3
=1.5.0-update4
=1.5.0-update5
=1.5.0-update6
=1.3.1
=1.3.1_01
=1.3.1_01a
=1.3.1_02
=1.3.1_03
=1.3.1_04
=1.3.1_05
=1.3.1_06
=1.3.1_07
=1.3.1_08
=1.3.1_09
=1.3.1_10
=1.3.1_11
=1.3.1_12
=1.3.1_13
=1.3.1_14
=1.3.1_15
=1.3.1_16
=1.3.1_17
=1.3.1_18
=1.4.2
=1.4.2_1
=1.4.2_2
=1.4.2_3
=1.4.2_4
=1.4.2_5
=1.4.2_6
=1.4.2_7
=1.4.2_8
=1.4.2_9
=1.4.2_10
=1.4.2_11
=1.4.2_12

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2006-6736?

    CVE-2006-6736 has been classified as a medium severity vulnerability.

  • How do I fix CVE-2006-6736?

    To mitigate CVE-2006-6736, users should upgrade to the latest version of the Java Development Kit (JDK) or Java Runtime Environment (JRE) that is not affected.

  • What systems are affected by CVE-2006-6736?

    CVE-2006-6736 affects Sun JDK versions 5.0 Update 6 and earlier, as well as Java System Development Kit (SDK) versions 1.4.2_12 and earlier.

  • What type of attacks can exploit CVE-2006-6736?

    CVE-2006-6736 can be exploited by attackers through untrusted applets that access sensitive data on the system.

  • Is there a workaround for CVE-2006-6736?

    A workaround for CVE-2006-6736 includes disabling Java applets in the browser settings until the software can be upgraded.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203