Vulnerability Database

With exploit

sun / jdk

Title Severity Exploit Date Affected Version
CVE-2010-3551 Medium Oct 20, 2010 == 1.6.0-update_4
== 1.6.0-update_7
== 1.6.0-update_19
== 1.6.0-update_13
== 1.6.0-update_3
== 1.6.0-update_11
== 1.6.0-update_10
<= 1.6.0
== 1.6.0-update_14
== 1.6.0
== 1.6.0-update_17
== 1.6.0-update_5
== 1.6.0-update2
== 1.6.0-update1_b06
== 1.6.0-update_16
== 1.6.0-update1
== 1.6.0-update_15
== 1.6.0-update_12
== 1.6.0-update_18
== 1.6.0-update_6
== 1.6.0-update_20
== 1.5.0-update20
== 1.5.0-update15
== 1.5.0-update18
== 1.5.0-update3
== 1.5.0-update21
== 1.5.0-update11
== 1.5.0-update16
== 1.5.0-update17
== 1.5.0-update9
== 1.5.0-update22
<= 1.5.0
== 1.5.0-update6
== 1.5.0-update14
== 1.5.0-update23
== 1.5.0-update1
== 1.5.0-update4
== 1.5.0-update7
== 1.5.0
== 1.5.0-update12
== 1.5.0-update5
== 1.5.0-update24
== 1.5.0-update2
== 1.5.0-update19
== 1.5.0-update13
== 1.5.0-update8
== 1.5.0-update10
CVE-2010-3552 High Oct 20, 2010 <= 1.6.0
== 1.6.0
== 1.6.0-update_10
== 1.6.0-update_11
== 1.6.0-update_12
== 1.6.0-update_13
== 1.6.0-update_14
== 1.6.0-update_15
== 1.6.0-update_16
== 1.6.0-update_17
== 1.6.0-update_18
== 1.6.0-update_19
== 1.6.0-update_20
== 1.6.0-update_3
== 1.6.0-update_4
== 1.6.0-update_5
== 1.6.0-update_6
== 1.6.0-update_7
== 1.6.0-update1
== 1.6.0-update1_b06
== 1.6.0-update2
CVE-2010-3553 High Oct 20, 2010 == 1.6.0-update_4
== 1.6.0-update_7
== 1.6.0-update_19
== 1.6.0-update_13
== 1.6.0-update_3
== 1.6.0-update_11
== 1.6.0-update_10
<= 1.6.0
== 1.6.0-update_14
== 1.6.0
== 1.6.0-update_17
== 1.6.0-update_5
== 1.6.0-update2
== 1.6.0-update1_b06
== 1.6.0-update_16
== 1.6.0-update1
== 1.6.0-update_15
== 1.6.0-update_12
== 1.6.0-update_18
== 1.6.0-update_6
== 1.6.0-update_20
== 1.5.0-update20
== 1.5.0-update15
== 1.5.0-update18
== 1.5.0-update3
== 1.5.0-update21
== 1.5.0-update11
== 1.5.0-update16
== 1.5.0-update17
== 1.5.0-update9
== 1.5.0-update22
<= 1.5.0
== 1.5.0-update6
== 1.5.0-update14
== 1.5.0-update23
== 1.5.0-update1
== 1.5.0-update4
== 1.5.0-update7
== 1.5.0
== 1.5.0-update12
== 1.5.0-update5
== 1.5.0-update24
== 1.5.0-update2
== 1.5.0-update19
== 1.5.0-update13
== 1.5.0-update8
== 1.5.0-update10
== 1.3.1_16
== 1.3.1_02
== 1.3.1_27
== 1.3.1_12
== 1.3.1_14
== 1.3.1_19
== 1.3.1_25
== 1.3.1_04
== 1.3.1_21
== 1.3.1_05
== 1.3.1_09
== 1.3.1_03
<= 1.3.1_28
== 1.3.1_26
== 1.3.1_11
== 1.3.0_03
== 1.3.1_17
== 1.3.1_15
== 1.3.1_01a
== 1.3.1_07
== 1.3.1_13
== 1.3.0
== 1.3.1_08
== 1.3.0_01
== 1.3.0_04
== 1.3.1_20
== 1.3.1_24
== 1.3.1_18
== 1.3.0_02
== 1.3.1_10
== 1.3.1_06
== 1.3.1_23
== 1.3.1_22
== 1.3.1_01
== 1.3.0_05
== 1.3.1
CVE-2010-3554 High Oct 20, 2010 == 1.6.0-update_4
== 1.6.0-update_7
== 1.6.0-update_19
== 1.6.0-update_13
== 1.6.0-update_3
== 1.6.0-update_11
== 1.6.0-update_10
<= 1.6.0
== 1.6.0-update_14
== 1.6.0
== 1.6.0-update_17
== 1.6.0-update_5
== 1.6.0-update2
== 1.6.0-update1_b06
== 1.6.0-update_16
== 1.6.0-update1
== 1.6.0-update_15
== 1.6.0-update_12
== 1.6.0-update_18
== 1.6.0-update_6
== 1.6.0-update_20
== 1.5.0-update20
== 1.5.0-update15
== 1.5.0-update18
== 1.5.0-update3
== 1.5.0-update21
== 1.5.0-update11
== 1.5.0-update16
== 1.5.0-update17
== 1.5.0-update9
== 1.5.0-update22
<= 1.5.0
== 1.5.0-update6
== 1.5.0-update14
== 1.5.0-update23
== 1.5.0-update1
== 1.5.0-update4
== 1.5.0-update7
== 1.5.0
== 1.5.0-update12
== 1.5.0-update5
== 1.5.0-update24
== 1.5.0-update2
== 1.5.0-update19
== 1.5.0-update13
== 1.5.0-update8
== 1.5.0-update10
== 1.3.1_16
== 1.3.1_02
== 1.3.1_27
== 1.3.1_12
== 1.3.1_14
== 1.3.1_19
== 1.3.1_25
== 1.3.1_04
== 1.3.1_21
== 1.3.1_05
== 1.3.1_09
== 1.3.1_03
<= 1.3.1_28
== 1.3.1_26
== 1.3.1_11
== 1.3.0_03
== 1.3.1_17
== 1.3.1_15
== 1.3.1_01a
== 1.3.1_07
== 1.3.1_13
== 1.3.0
== 1.3.1_08
== 1.3.0_01
== 1.3.0_04
== 1.3.1_20
== 1.3.1_24
== 1.3.1_18
== 1.3.0_02
== 1.3.1_10
== 1.3.1_06
== 1.3.1_23
== 1.3.1_22
== 1.3.1_01
== 1.3.0_05
== 1.3.1
CVE-2010-3555 High Oct 20, 2010 <= 1.6.0
== 1.6.0
== 1.6.0-update_10
== 1.6.0-update_11
== 1.6.0-update_12
== 1.6.0-update_13
== 1.6.0-update_14
== 1.6.0-update_15
== 1.6.0-update_16
== 1.6.0-update_17
== 1.6.0-update_18
== 1.6.0-update_19
== 1.6.0-update_20
== 1.6.0-update_3
== 1.6.0-update_4
== 1.6.0-update_5
== 1.6.0-update_6
== 1.6.0-update_7
== 1.6.0-update1
== 1.6.0-update1_b06
== 1.6.0-update2
CVE-2010-3556 High Oct 20, 2010 == 1.6.0-update_4
== 1.6.0-update_7
== 1.6.0-update_19
== 1.6.0-update_13
== 1.6.0-update_3
== 1.6.0-update_11
== 1.6.0-update_10
<= 1.6.0
== 1.6.0-update_14
== 1.6.0
== 1.6.0-update_17
== 1.6.0-update_5
== 1.6.0-update2
== 1.6.0-update1_b06
== 1.6.0-update_16
== 1.6.0-update1
== 1.6.0-update_15
== 1.6.0-update_12
== 1.6.0-update_18
== 1.6.0-update_6
== 1.6.0-update_20
== 1.5.0-update20
== 1.5.0-update15
== 1.5.0-update18
== 1.5.0-update3
== 1.5.0-update21
== 1.5.0-update11
== 1.5.0-update16
== 1.5.0-update17
== 1.5.0-update9
== 1.5.0-update22
<= 1.5.0
== 1.5.0-update6
== 1.5.0-update14
== 1.5.0-update23
== 1.5.0-update1
== 1.5.0-update4
== 1.5.0-update7
== 1.5.0
== 1.5.0-update12
== 1.5.0-update5
== 1.5.0-update24
== 1.5.0-update2
== 1.5.0-update19
== 1.5.0-update13
== 1.5.0-update8
== 1.5.0-update10
== 1.3.1_16
== 1.3.1_02
== 1.3.1_27
== 1.3.1_12
== 1.3.1_14
== 1.3.1_19
== 1.3.1_25
== 1.3.1_04
== 1.3.1_21
== 1.3.1_05
== 1.3.1_09
== 1.3.1_03
<= 1.3.1_28
== 1.3.1_26
== 1.3.1_11
== 1.3.0_03
== 1.3.1_17
== 1.3.1_15
== 1.3.1_01a
== 1.3.1_07
== 1.3.1_13
== 1.3.0
== 1.3.1_08
== 1.3.0_01
== 1.3.0_04
== 1.3.1_20
== 1.3.1_24
== 1.3.1_18
== 1.3.0_02
== 1.3.1_10
== 1.3.1_06
== 1.3.1_23
== 1.3.1_22
== 1.3.1_01
== 1.3.0_05
== 1.3.1
CVE-2010-3557 Medium Oct 20, 2010 == 1.6.0-update_4
== 1.6.0-update_7
== 1.6.0-update_19
== 1.6.0-update_13
== 1.6.0-update_3
== 1.6.0-update_11
== 1.6.0-update_10
<= 1.6.0
== 1.6.0-update_14
== 1.6.0
== 1.6.0-update_17
== 1.6.0-update_5
== 1.6.0-update2
== 1.6.0-update1_b06
== 1.6.0-update_16
== 1.6.0-update1
== 1.6.0-update_15
== 1.6.0-update_12
== 1.6.0-update_18
== 1.6.0-update_6
== 1.6.0-update_20
== 1.5.0-update20
== 1.5.0-update15
== 1.5.0-update18
== 1.5.0-update3
== 1.5.0-update21
== 1.5.0-update11
== 1.5.0-update16
== 1.5.0-update17
== 1.5.0-update9
== 1.5.0-update22
<= 1.5.0
== 1.5.0-update6
== 1.5.0-update14
== 1.5.0-update23
== 1.5.0-update1
== 1.5.0-update4
== 1.5.0-update7
== 1.5.0
== 1.5.0-update12
== 1.5.0-update5
== 1.5.0-update24
== 1.5.0-update2
== 1.5.0-update19
== 1.5.0-update13
== 1.5.0-update8
== 1.5.0-update10
== 1.3.1_16
== 1.3.1_02
== 1.3.1_27
== 1.3.1_12
== 1.3.1_14
== 1.3.1_19
== 1.3.1_25
== 1.3.1_04
== 1.3.1_21
== 1.3.1_05
== 1.3.1_09
== 1.3.1_03
<= 1.3.1_28
== 1.3.1_26
== 1.3.1_11
== 1.3.0_03
== 1.3.1_17
== 1.3.1_15
== 1.3.1_01a
== 1.3.1_07
== 1.3.1_13
== 1.3.0
== 1.3.1_08
== 1.3.0_01
== 1.3.0_04
== 1.3.1_20
== 1.3.1_24
== 1.3.1_18
== 1.3.0_02
== 1.3.1_10
== 1.3.1_06
== 1.3.1_23
== 1.3.1_22
== 1.3.1_01
== 1.3.0_05
== 1.3.1
CVE-2010-3558 High Oct 20, 2010 <= 1.6.0
== 1.6.0
== 1.6.0-update_10
== 1.6.0-update_11
== 1.6.0-update_12
== 1.6.0-update_13
== 1.6.0-update_14
== 1.6.0-update_15
== 1.6.0-update_16
== 1.6.0-update_17
== 1.6.0-update_18
== 1.6.0-update_19
== 1.6.0-update_20
== 1.6.0-update_3
== 1.6.0-update_4
== 1.6.0-update_5
== 1.6.0-update_6
== 1.6.0-update_7
== 1.6.0-update1
== 1.6.0-update1_b06
== 1.6.0-update2
CVE-2010-3559 High Oct 20, 2010 == 1.6.0-update_4
== 1.6.0-update_7
== 1.6.0-update_19
== 1.6.0-update_13
== 1.6.0-update_3
== 1.6.0-update_11
== 1.6.0-update_10
<= 1.6.0
== 1.6.0-update_14
== 1.6.0
== 1.6.0-update_17
== 1.6.0-update_5
== 1.6.0-update2
== 1.6.0-update1_b06
== 1.6.0-update_16
== 1.6.0-update1
== 1.6.0-update_15
== 1.6.0-update_12
== 1.6.0-update_18
== 1.6.0-update_6
== 1.6.0-update_20
== 1.5.0-update20
== 1.5.0-update15
== 1.5.0-update18
== 1.5.0-update3
== 1.5.0-update21
== 1.5.0-update11
== 1.5.0-update16
== 1.5.0-update17
== 1.5.0-update9
== 1.5.0-update22
<= 1.5.0
== 1.5.0-update6
== 1.5.0-update14
== 1.5.0-update23
== 1.5.0-update1
== 1.5.0-update4
== 1.5.0-update7
== 1.5.0
== 1.5.0-update12
== 1.5.0-update5
== 1.5.0-update24
== 1.5.0-update2
== 1.5.0-update19
== 1.5.0-update13
== 1.5.0-update8
== 1.5.0-update10
== 1.3.1_16
== 1.3.1_02
== 1.3.1_27
== 1.3.1_12
== 1.3.1_14
== 1.3.1_19
== 1.3.1_25
== 1.3.1_04
== 1.3.1_21
== 1.3.1_05
== 1.3.1_09
== 1.3.1_03
<= 1.3.1_28
== 1.3.1_26
== 1.3.1_11
== 1.3.0_03
== 1.3.1_17
== 1.3.1_15
== 1.3.1_01a
== 1.3.1_07
== 1.3.1_13
== 1.3.0
== 1.3.1_08
== 1.3.0_01
== 1.3.0_04
== 1.3.1_20
== 1.3.1_24
== 1.3.1_18
== 1.3.0_02
== 1.3.1_10
== 1.3.1_06
== 1.3.1_23
== 1.3.1_22
== 1.3.1_01
== 1.3.0_05
== 1.3.1
CVE-2010-3560 Low Oct 20, 2010 <= 1.6.0
== 1.6.0
== 1.6.0-update_10
== 1.6.0-update_11
== 1.6.0-update_12
== 1.6.0-update_13
== 1.6.0-update_14
== 1.6.0-update_15
== 1.6.0-update_16
== 1.6.0-update_17
== 1.6.0-update_18
== 1.6.0-update_19
== 1.6.0-update_20
== 1.6.0-update_3
== 1.6.0-update_4
== 1.6.0-update_5
== 1.6.0-update_6
== 1.6.0-update_7
== 1.6.0-update1
== 1.6.0-update1_b06
== 1.6.0-update2

oracle / jdk

Title Severity Exploit Date Affected Version
CVE-2018-2629 Medium Jan 18, 2018 == 1.6.0-update171
== 1.7.0-update161
== 1.8.0-update152
== 9.0.1
CVE-2018-2633 High Jan 18, 2018 == 1.6.0-update171
== 1.7.0-update161
== 1.8.0-update152
== 9.0.1
CVE-2018-2634 Medium Jan 18, 2018 == 1.7.0-update161
== 1.8.0-update152
== 9.0.1
CVE-2018-2637 High Jan 18, 2018 == 1.6.0-update171
== 1.7.0-update161
== 1.8.0-update152
== 9.0.1
CVE-2018-2638 High Jan 18, 2018 == 1.8.0-update152
== 9.0.1
CVE-2018-2639 High Jan 18, 2018 == 1.8.0-update152
== 9.0.1
CVE-2018-2641 Medium Jan 18, 2018 == 1.6.0-update171
== 1.7.0-update161
== 1.8.0-update152
== 9.0.1
CVE-2018-2657 Medium Jan 18, 2018 == 1.6.0-update171
== 1.7.0-update161
CVE-2018-2663 Low Jan 18, 2018 == 1.6.0-update171
== 1.7.0-update161
== 1.8.0-update152
== 9.0.1
CVE-2018-2677 Low Jan 18, 2018 == 1.6.0-update171
== 1.7.0-update161
== 1.8.0-update152
== 9.0.1