Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE and Java for Business 6 Update 18 and 5.0 Update 23 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the March 2010 CPU. Oracle has not commented on claims from a reliable researcher that this is due to missing privilege checks during deserialization of RMIConnectionImpl objects, which allows remote attackers to call system-level Java functions via the ClassLoader of a constructor that is being deserialized.
2010-04-01T16:30:00.767
2025-04-11T00:51:21.963
Deferred
CVSSv2: 7.5 (HIGH)
AV:N/AC:L/Au:N/C:P/I:P/A:P
10.0
6.4
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | sun | jre | ≤ 1.6.0 | Yes |
Application | sun | jre | 1.6.0 | Yes |
Application | sun | jre | 1.6.0 | Yes |
Application | sun | jre | 1.6.0 | Yes |
Application | sun | jre | 1.6.0 | Yes |
Application | sun | jre | 1.6.0 | Yes |
Application | sun | jre | 1.6.0 | Yes |
Application | sun | jre | 1.6.0 | Yes |
Application | sun | jre | 1.6.0 | Yes |
Application | sun | jre | 1.6.0 | Yes |
Application | sun | jre | 1.6.0 | Yes |
Application | sun | jre | 1.6.0 | Yes |
Application | sun | jre | 1.6.0 | Yes |
Application | sun | jre | 1.6.0 | Yes |
Application | sun | jre | 1.6.0 | Yes |
Application | sun | jre | 1.6.0 | Yes |
Application | sun | jre | 1.6.0 | Yes |
Application | sun | jdk | ≤ 1.6.0 | Yes |
Application | sun | jdk | 1.6.0 | Yes |
Application | sun | jdk | 1.6.0 | Yes |
Application | sun | jdk | 1.6.0 | Yes |
Application | sun | jdk | 1.6.0 | Yes |
Application | sun | jdk | 1.6.0 | Yes |
Application | sun | jdk | 1.6.0 | Yes |
Application | sun | jdk | 1.6.0 | Yes |
Application | sun | jdk | 1.6.0 | Yes |
Application | sun | jdk | 1.6.0 | Yes |
Application | sun | jdk | 1.6.0 | Yes |
Application | sun | jdk | 1.6.0 | Yes |
Application | sun | jdk | 1.6.0 | Yes |
Application | sun | jdk | 1.6.0 | Yes |
Application | sun | jdk | 1.6.0 | Yes |
Application | sun | jdk | 1.6.0 | Yes |
Application | sun | jdk | 1.6.0 | Yes |
Application | sun | jdk | 1.6.0 | Yes |
Application | sun | jdk | ≤ 1.5.0 | Yes |
Application | sun | jdk | 1.5.0 | Yes |
Application | sun | jdk | 1.5.0 | Yes |
Application | sun | jdk | 1.5.0 | Yes |
Application | sun | jdk | 1.5.0 | Yes |
Application | sun | jdk | 1.5.0 | Yes |
Application | sun | jdk | 1.5.0 | Yes |
Application | sun | jdk | 1.5.0 | Yes |
Application | sun | jdk | 1.5.0 | Yes |
Application | sun | jdk | 1.5.0 | Yes |
Application | sun | jdk | 1.5.0 | Yes |
Application | sun | jdk | 1.5.0 | Yes |
Application | sun | jdk | 1.5.0 | Yes |
Application | sun | jdk | 1.5.0 | Yes |
Application | sun | jdk | 1.5.0 | Yes |
Application | sun | jdk | 1.5.0 | Yes |
Application | sun | jdk | 1.5.0 | Yes |
Application | sun | jdk | 1.5.0 | Yes |
Application | sun | jdk | 1.5.0 | Yes |
Application | sun | jdk | 1.5.0 | Yes |
Application | sun | jdk | 1.5.0 | Yes |
Application | sun | jdk | 1.5.0 | Yes |
Application | sun | jdk | 1.5.0 | Yes |
Application | sun | jre | ≤ 1.5.0 | Yes |
Application | sun | jre | 1.5.0 | Yes |
Application | sun | jre | 1.5.0 | Yes |
Application | sun | jre | 1.5.0 | Yes |
Application | sun | jre | 1.5.0 | Yes |
Application | sun | jre | 1.5.0 | Yes |
Application | sun | jre | 1.5.0 | Yes |
Application | sun | jre | 1.5.0 | Yes |
Application | sun | jre | 1.5.0 | Yes |
Application | sun | jre | 1.5.0 | Yes |
Application | sun | jre | 1.5.0 | Yes |
Application | sun | jre | 1.5.0 | Yes |
Application | sun | jre | 1.5.0 | Yes |
Application | sun | jre | 1.5.0 | Yes |
Application | sun | jre | 1.5.0 | Yes |
Application | sun | jre | 1.5.0 | Yes |
Application | sun | jre | 1.5.0 | Yes |
Application | sun | jre | 1.5.0 | Yes |
Application | sun | jre | 1.5.0 | Yes |
Application | sun | jre | 1.5.0 | Yes |
Application | sun | jre | 1.5.0 | Yes |
Application | sun | jre | 1.5.0 | Yes |
Application | sun | jre | 1.5.0 | Yes |