Vulnerability Database

With exploit

sun / jre

Title Severity Exploit Date Affected Version
CVE-2008-1187 Medium Mar 6, 2008 <= 1.4.2_14
<= 5.0
<= 6
== 1.4.2_01
== 1.4.2_02
== 1.4.2_03
== 1.4.2_04
== 1.4.2_05
== 1.4.2_06
== 1.4.2_07
== 1.4.2_1
== 1.4.2_10
== 1.4.2_11
== 1.4.2_12
== 1.4.2_13
== 5.0
== 5.0-update_1
== 5.0-update_10
== 5.0-update_11
== 5.0-update_12
== 5.0-update_13
== 5.0-update_2
== 5.0-update_3
== 5.0-update_4
== 5.0-update_5
== 5.0-update_6
== 5.0-update_7
== 5.0-update_8
== 5.0-update_9
== 6
== 6-update_1
== 6-update_2
== 6-update_3
CVE-2008-1188 High Mar 6, 2008 == 1.5.0
== 1.5.0-update1
== 1.5.0-update10
== 1.5.0-update11
== 1.5.0-update12
== 1.5.0-update13
== 1.5.0-update14
== 1.5.0-update2
== 1.5.0-update3
== 1.5.0-update4
== 1.5.0-update5
== 1.5.0-update6
== 1.5.0-update7
== 1.5.0-update8
== 1.5.0-update9
== 1.6.0
== 1.6.0-update_1
== 1.6.0-update_2
== 1.6.0-update_3
== 1.6.0-update_4
CVE-2008-1189 Medium Mar 6, 2008 == 1.4.2
== 1.4.2_1
== 1.4.2_10
== 1.4.2_11
== 1.4.2_12
== 1.4.2_13
== 1.4.2_14
== 1.4.2_15
== 1.4.2_16
== 1.4.2_2
== 1.4.2_3
== 1.4.2_4
== 1.4.2_5
== 1.4.2_6
== 1.4.2_7
== 1.4.2_8
== 1.4.2_9
== 1.5.0
== 1.5.0-update1
== 1.5.0-update10
== 1.5.0-update11
== 1.5.0-update12
== 1.5.0-update13
== 1.5.0-update14
== 1.5.0-update2
== 1.5.0-update3
== 1.5.0-update4
== 1.5.0-update5
== 1.5.0-update6
== 1.5.0-update7
== 1.5.0-update8
== 1.5.0-update9
== 1.6.0
== 1.6.0-update_1
== 1.6.0-update_2
== 1.6.0-update_3
== 1.6.0-update_4
CVE-2008-1190 High Mar 6, 2008 == 1.4.2
== 1.4.2_1
== 1.4.2_10
== 1.4.2_11
== 1.4.2_12
== 1.4.2_13
== 1.4.2_14
== 1.4.2_15
== 1.4.2_16
== 1.4.2_2
== 1.4.2_3
== 1.4.2_4
== 1.4.2_5
== 1.4.2_6
== 1.4.2_7
== 1.4.2_8
== 1.4.2_9
== 1.5.0
== 1.5.0-update1
== 1.5.0-update10
== 1.5.0-update11
== 1.5.0-update12
== 1.5.0-update13
== 1.5.0-update14
== 1.5.0-update2
== 1.5.0-update3
== 1.5.0-update4
== 1.5.0-update5
== 1.5.0-update6
== 1.5.0-update7
== 1.5.0-update8
== 1.5.0-update9
== 1.6.0
== 1.6.0-update_1
== 1.6.0-update_2
== 1.6.0-update_3
== 1.6.0-update_4
CVE-2008-1191 Medium Mar 6, 2008 <= 6_update_4
CVE-2008-1192 Medium Mar 6, 2008 == 1.6.0-update_3
== 1.4.2_7
== 1.4.2_16
== 1.3.1
== 1.3.1_10
== 1.3.1_06
== 1.4.2_4
== 1.4.2_2
== 1.3.1_20
== 1.5.0-update2
== 1.3.1_2
== 1.6.0-update_1
== 1.4.2_15
== 1.5.0-update13
== 1.6.0-update_2
== 1.4.2_13
== 1.4.2_1
== 1.4.2_8
== 1.5.0-update12
== 1.3.1_16
== 1.3.1_19
== 1.5.0-update8
== 1.3.1_11
== 1.3.1_17
== 1.4.2_12
== 1.3.1_12
== 1.3.1_03
== 1.3.1_14
== 1.5.0-update11
== 1.3.1_08
== 1.4.2_14
== 1.5.0-update7
== 1.5.0-update3
== 1.3.1_07
== 1.3.1_05
== 1.4.2_10
== 1.5.0-update5
== 1.5.0-update14
== 1.4.2_9
== 1.4.2
== 1.5.0-update6
== 1.3.1_13
== 1.3.1_04
== 1.3.1_09
== 1.5.0-update9
== 1.4.2_11
== 1.5.0-update1
== 1.3.1_18
== 1.5.0-update10
== 1.3.1_15
== 1.6.0-update_4
== 1.4.2_3
== 1.5.0-update4
== 1.4.2_5
== 1.3.1_21
== 1.4.2_6
== 1.5.0
== 1.6.0
CVE-2008-1193 High Mar 6, 2008 == 1.5.0
== 1.5.0-update1
== 1.5.0-update10
== 1.5.0-update11
== 1.5.0-update12
== 1.5.0-update13
== 1.5.0-update14
== 1.5.0-update2
== 1.5.0-update3
== 1.5.0-update4
== 1.5.0-update5
== 1.5.0-update6
== 1.5.0-update7
== 1.5.0-update8
== 1.5.0-update9
== 1.6.0
== 1.6.0-update_1
== 1.6.0-update_2
== 1.6.0-update_3
== 1.6.0-update_4
CVE-2008-1194 Low Mar 6, 2008 == 1.5.0
== 1.5.0-update1
== 1.5.0-update10
== 1.5.0-update11
== 1.5.0-update12
== 1.5.0-update13
== 1.5.0-update14
== 1.5.0-update2
== 1.5.0-update3
== 1.5.0-update4
== 1.5.0-update5
== 1.5.0-update6
== 1.5.0-update7
== 1.5.0-update8
== 1.5.0-update9
== 1.6.0
== 1.6.0-update_1
== 1.6.0-update_2
== 1.6.0-update_3
== 1.6.0-update_4
CVE-2008-1195 High Mar 6, 2008 == 1.4.2
== 1.4.2_1
== 1.4.2_10
== 1.4.2_11
== 1.4.2_12
== 1.4.2_13
== 1.4.2_14
== 1.4.2_15
== 1.4.2_16
== 1.4.2_2
== 1.4.2_3
== 1.4.2_4
== 1.4.2_5
== 1.4.2_6
== 1.4.2_7
== 1.4.2_8
== 1.4.2_9
== 1.5.0
== 1.5.0-update1
== 1.5.0-update10
== 1.5.0-update11
== 1.5.0-update12
== 1.5.0-update13
== 1.5.0-update14
== 1.5.0-update2
== 1.5.0-update3
== 1.5.0-update4
== 1.5.0-update5
== 1.5.0-update6
== 1.5.0-update7
== 1.5.0-update8
== 1.5.0-update9
== 1.6.0
== 1.6.0-update_1
== 1.6.0-update_2
== 1.6.0-update_3
== 1.6.0-update_4
CVE-2008-1196 Medium Mar 6, 2008 == 1.4.2
== 1.4.2_1
== 1.4.2_10
== 1.4.2_11
== 1.4.2_12
== 1.4.2_13
== 1.4.2_14
== 1.4.2_15
== 1.4.2_16
== 1.4.2_2
== 1.4.2_3
== 1.4.2_4
== 1.4.2_5
== 1.4.2_6
== 1.4.2_7
== 1.4.2_8
== 1.4.2_9
== 1.5.0
== 1.5.0-update1
== 1.5.0-update10
== 1.5.0-update11
== 1.5.0-update12
== 1.5.0-update13
== 1.5.0-update14
== 1.5.0-update2
== 1.5.0-update3
== 1.5.0-update4
== 1.5.0-update5
== 1.5.0-update6
== 1.5.0-update7
== 1.5.0-update8
== 1.5.0-update9
== 1.6.0
== 1.6.0-update_1
== 1.6.0-update_2
== 1.6.0-update_3
== 1.6.0-update_4

oracle / jre

Title Severity Exploit Date Affected Version
CVE-2015-4731 High Jul 16, 2015 == 1.6.0-update_95
== 1.7.0-update_80
== 1.8.0-update_33
== 1.8.0-update_45
CVE-2015-4732 High Jul 16, 2015 == 1.6.0-update_95
== 1.7.0-update_75
== 1.7.0-update_80
== 1.8.0-update_33
== 1.8.0-update_45
CVE-2015-4733 High Jul 16, 2015 == 1.6.0-update_95
== 1.7.0-update_75
== 1.7.0-update_80
== 1.8.0-update_33
== 1.8.0-update_45
CVE-2015-4736 High Jul 16, 2015 == 1.7.0-update_80
== 1.8.0-update_45
CVE-2015-4748 High Jul 16, 2015 == 1.6.0-update_95
== 1.7.0-update_75
== 1.7.0-update_80
== 1.8.0-update_33
== 1.8.0-update_45
CVE-2015-4749 Low Jul 16, 2015 == 1.6.0-update_95
== 1.7.0-update_75
== 1.7.0-update_80
== 1.8.0-update_33
== 1.8.0-update_45
CVE-2015-4760 High Jul 16, 2015 == 1.6.0-update_95
== 1.7.0-update_80
== 1.8.0-update_45
CVE-2015-2590 Critical Jul 16, 2015 == 1.6.0-update_95
== 1.7.0-update_75
== 1.7.0-update_80
== 1.8.0-update_33
== 1.8.0-update_45
CVE-2015-2596 Low Jul 16, 2015 == 1.7.0-update_80
CVE-2015-2597 High Jul 16, 2015 == 1.7.0-update_80
== 1.8.0-update_45