First published: Thu Mar 06 2008(Updated: )
Unspecified vulnerability in the Virtual Machine for Sun Java Runtime Environment (JRE) and JDK 5.0 Update 13 and earlier, and SDK/JRE 1.4.2_16 and earlier, allows remote attackers to gain privileges via an untrusted application or applet, a different issue than CVE-2008-1185, aka "the second issue."
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Sun JDK | =1.5.0-update3 | |
Sun JDK | =1.5.0-update11 | |
Sun JDK | =1.5.0-update9 | |
Sun JDK | =1.5.0-update6 | |
Sun JDK | =1.5.0-update1 | |
Sun JDK | =1.5.0-update4 | |
Sun JDK | =1.5.0-update7 | |
Sun JDK | =1.5.0 | |
Sun JDK | =1.5.0-update12 | |
Sun JDK | =1.5.0-update5 | |
Sun JDK | =1.5.0-update2 | |
Sun JDK | =1.5.0-update13 | |
Sun JDK | =1.5.0-update8 | |
Sun JDK | =1.5.0-update10 | |
Sun JRE | =1.4.2_7 | |
Sun JRE | =1.4.2_16 | |
Sun JRE | =1.5.0 | |
Sun JRE | =1.4.2_4 | |
Sun JRE | =1.4.2_2 | |
Sun JRE | =1.5.0-update2 | |
Sun JRE | =1.4.2_15 | |
Sun JRE | =1.5.0-update13 | |
Sun JRE | =1.4.2_13 | |
Sun JRE | =1.4.2_1 | |
Sun JRE | =1.4.2_8 | |
Sun JRE | =1.5.0-update12 | |
Sun JRE | =1.5.0-update8 | |
Sun JRE | =1.4.2_12 | |
Sun JRE | =1.5.0-update11 | |
Sun JRE | =1.4.2_14 | |
Sun JRE | =1.5.0-update7 | |
Sun JRE | =1.5.0-update3 | |
Sun JRE | =1.4.2_10 | |
Sun JRE | =1.5.0-update5 | |
Sun JRE | =1.4.2_9 | |
Sun JRE | =1.4.2 | |
Sun JRE | =1.5.0-update6 | |
Sun JRE | =1.5.0-update9 | |
Sun JRE | =1.4.2_11 | |
Sun JRE | =1.5.0-update1 | |
Sun JRE | =1.5.0-update10 | |
Sun JRE | =1.4.2_3 | |
Sun JRE | =1.5.0-update4 | |
Sun JRE | =1.4.2_5 | |
Sun JRE | =1.4.2_6 | |
Sun SDK | =1.4.2 | |
Sun SDK | =1.4.2_10 | |
Sun SDK | =1.4.2_12 | |
Sun SDK | =1.4.2_14 | |
Sun SDK | =1.4.2_13 | |
Sun SDK | =1.4.2_6 | |
Sun SDK | =1.4.2_2 | |
Sun SDK | =1.4.2_5 | |
Sun SDK | =1.4.2_1 | |
Sun SDK | =1.4.2_4 | |
Sun SDK | =1.4.2_7 | |
Sun SDK | =1.4.2_8 | |
Sun SDK | =1.4.2_16 | |
Sun SDK | =1.4.2_11 | |
Sun SDK | =1.4.2_9 | |
Sun SDK | =1.4.2_3 | |
Sun SDK | =1.4.2_15 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.