CVE-2010-0886
Published Apr 20, 2010
Last updated 6 years ago
Overview
- Description
- Unspecified vulnerability in the Java Deployment Toolkit component in Oracle Java SE and Java for Business JDK and JRE 6 Update 10 through 19 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.
- Source
- secalert_us@oracle.com
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 10
- Impact score
- 10
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- NVD-CWE-noinfo
Evaluator
- Comment
- -
- Impact
- Per: http://www.oracle.com/technology/deploy/security/alerts/alert-cve-2010-0886.html 'Notes: 1. Affects the Windows platform only. CVSS 10.0 score assumes running with Administrator privileges. Otherwise, CVSS score of 7.5 with Confidentiality, Integrity and Availability impacts of Partial+, Partial+ and Partial+.'
- Solution
- Per: http://www.oracle.com/technology/deploy/security/alerts/alert-cve-2010-0886.html 'Notes: 1. Affects the Windows platform only. CVSS 10.0 score assumes running with Administrator privileges. Otherwise, CVSS score of 7.5 with Confidentiality, Integrity and Availability impacts of Partial+, Partial+ and Partial+.'
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update10:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B6339EF9-97AC-4675-9971-7435A4B31432" }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update11:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6D1626F8-26F4-4EC5-A486-98808372425F" }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update12:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FA1BFE3B-3773-426B-9E69-250249E059C7" }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update13:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "46621D4B-CA2B-4EAC-884E-9CC9486F2F94" }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update14:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "37FED4C9-7501-4DF3-B05E-0B460CBB2D9E" }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update15:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6958538A-0C2E-460F-A130-70515AFBB6A5" }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update16:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "ABB1D4B3-54E6-455D-9238-B185DB012A43" }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update17:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F74A9B5B-60F3-4717-8572-63A0996291A6" }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update18:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "30B78D5C-CC85-4E04-8CBA-3DFE99935A23" }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update19:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "864A3C15-E9EA-466A-A32D-2EAC9DD8AC6D" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update10:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FE5F6E90-A942-4468-B763-9606CE073A9E" }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update11:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B0ADF941-5E90-498D-A2E2-7DBCF5358D64" }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update12:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0819F015-FF7B-4C8F-B195-4CB54070BAE4" }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update13:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B5CB2234-B196-4F41-9FE9-A1896A57E575" }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update14:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "572A693C-1EEE-4A6C-BA42-B4FB4B28D0FA" }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update15:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7A59AF0A-5335-4650-88DB-5B261FE5E308" }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update16:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0B955A34-DCD3-42E2-BC37-88F348EE31F4" }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update17:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D5637276-D94D-4793-BFA7-96A66E7663C9" }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update18:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C0552813-87CE-485D-9741-7AB336025D39" }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update19:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "21ED9D75-EC18-414C-B0B0-C27F8755E0B7" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256" } ], "operator": "OR" } ], "operator": "AND" } ]