CVE-2006-0615
Published Feb 9, 2006
Last updated 5 years ago
Overview
- Description
- Multiple unspecified vulnerabilities in Sun Java JDK and JRE 5.0 Update 4 and earlier, SDK and JRE 1.4.x through 1.4.2_09 allow remote attackers to bypass Java sandbox security and obtain privileges via unspecified vectors involving the reflection APIs, aka the "second and third issues."
- Source
- cve@mitre.org
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 4
- Impact score
- 4.9
- Exploitability score
- 4.9
- Vector string
- AV:N/AC:H/Au:N/C:P/I:P/A:N
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:-:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D57BC929-6C98-4F36-B31B-6B946F986D41" }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EE8E883F-E13D-4FB0-8C6F-B7628600E8D4" }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "28BE548B-DD0C-4C58-98CA-5B803F04F9EE" }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5F8E9AA0-8907-4B1A-86A1-08568195217D" }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update4:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A337AD31-4566-4A4E-AFF3-7EAECD5C90F9" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:sun:jre:1.4.2:-:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "787DCE54-6991-4A1A-836B-3C46A02C7400" }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1EEAB662-644A-4D7B-8237-64142CF48724" }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D9598A49-95F2-42DB-B92C-CD026F739B83" }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BED1009E-AE60-43A0-A0F5-38526EFCF423" }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D011585C-0E62-4233-85FA-F29A07D68DA7" }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F226D898-F0E8-41D8-BF40-54DE9FB5426D" }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4CB9CCD1-A67D-4800-9EC5-6E1A0B0B76E7" }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CE28C283-447A-4F83-B96B-69F96E663C1C" }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D102063B-2434-4141-98E7-2DE501AE1728" }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "03B8CD03-CD31-4F4D-BA90-59435578A4F9" }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:-:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5F0AD0F9-E797-4E16-95F3-C1AFDA557D78" }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A7FC09E8-7F30-4FE4-912E-588AA250E2A3" }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7EA5B9E9-654D-44F7-AE98-3D8B382804AC" }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update4:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F296ACF3-1373-429D-B991-8B5BA704A7EF" }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update5:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B863420B-DE16-416A-9640-1A1340A9B855" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:sun:sdk:1.4.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "002CA86D-3090-4C7A-947A-21CB5D1ADD98" }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6F6453C9-7EE0-4FFB-861D-C2D9416DCABA" }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "89BF16DE-EEAB-4DA5-BFF1-7A0A58DE141F" }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6DDE253E-C8B6-4C1D-AECE-ABEA1A67306B" }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A56D9A60-F272-4D4C-A9DD-C93DAF783585" }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EF109CAA-E8D2-4BD7-BE7C-AF8B2A78672E" }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "976F4ACB-3725-45B7-B2EF-DEE4B88254E9" }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "52BDD6A8-1611-4C3C-865D-6EDB5B9F8D88" }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6A1F28FF-652A-4C89-9AC6-5E212F890811" }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "96A8C351-E9CD-431B-8B9D-712CA54C7213" } ], "operator": "OR" } ] } ]