Vulnerability Monitor

The vendors, products, and vulnerabilities you care about
sdk Vendor: sun

About This Product

sdk is a software product offered by sun. This product is widely deployed in production environments, making vulnerability monitoring essential for organizations relying on it. Security vulnerabilities in products of this category can affect system availability, data confidentiality, and integrity across entire networks. The significant number of reported vulnerabilities indicates this product has received substantial security scrutiny and community focus over time. Regular assessment of known vulnerabilities and timely patching are fundamental components of responsible system administration for any deployment of this software.

Vulnerability Landscape Summary

SecUtils has identified 127 known vulnerabilities affecting sun sdk. This includes 71 high-severity issues requiring prompt remediation. Vulnerabilities in this product have been disclosed spanning from 2001 to 2011, indicating a sustained research interest and ongoing security attention. 51 medium-severity issues and 5 low-severity issues complete the vulnerability landscape. Organizations should prioritize patching based on deployment context, asset criticality, and exploitation likelihood rather than severity alone.

Known Vulnerabilities
ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2001-1480 2001-12-31 2025-04-03 - 7.5 Likely
CVE-2002-0058 2002-03-15 2025-04-03 - 5.0 Likely
CVE-2002-0076 2002-03-19 2025-04-03 - 7.5 Likely
CVE-2004-0651 2004-08-06 2025-04-03 - 5.0 Likely
CVE-2005-0223 2005-05-02 2025-04-03 - 5.0 Likely
CVE-2005-1080 2005-05-02 2025-04-03 - 5.0 Likely
CVE-2005-3583 2005-11-16 2025-04-03 - 7.8 Likely
CVE-2006-0614 2006-02-09 2025-04-03 - 6.4 Likely
CVE-2006-0615 2006-02-09 2025-04-03 - 4.0 Unknown
CVE-2006-2426 2006-05-17 2025-04-03 - 6.4 Likely
CVE-2006-5201 2006-10-10 2025-04-09 - 4.0 Unknown
CVE-2006-6731 2006-12-26 2025-04-09 - 9.3 Likely
CVE-2006-6736 2006-12-26 2025-04-09 - 4.3 Likely
CVE-2006-6737 2006-12-26 2025-04-09 - 4.3 Likely
CVE-2007-0243 2007-01-17 2025-04-09 - 6.8 Likely
CVE-2007-2435 2007-05-02 2025-04-09 - 10.0 Likely
CVE-2007-2788 2007-05-22 2025-04-09 - 6.8 Likely
CVE-2007-2789 2007-05-22 2025-04-09 - 4.3 Likely
CVE-2007-3504 2007-06-30 2025-04-09 - 9.3 Likely
CVE-2007-3698 2007-07-11 2025-04-09 - 7.8 Likely
CVE-2007-3922 2007-07-21 2025-04-09 - 6.8 Likely
CVE-2007-4381 2007-08-17 2025-04-09 - 9.3 Likely
CVE-2007-5019 2007-09-20 2025-04-09 - 10.0 Likely
CVE-2007-5232 2007-10-05 2025-04-09 - 4.0 Unknown
CVE-2007-5236 2007-10-06 2025-04-09 - 5.4 Unknown
CVE-2007-5238 2007-10-06 2025-04-09 - 2.6 Unknown
CVE-2007-5239 2007-10-06 2025-04-09 - 4.0 Unknown
CVE-2007-5240 2007-10-06 2025-04-09 - 5.0 Likely
CVE-2007-5273 2007-10-08 2025-04-09 - 2.6 Unknown
CVE-2007-5274 2007-10-08 2025-04-09 - 2.6 Unknown
CVE-2007-5689 2007-10-29 2025-04-09 - 10.0 Likely
CVE-2008-1185 2008-03-06 2025-04-09 - 9.3 Likely
CVE-2008-1186 2008-03-06 2025-04-09 - 9.3 Likely
CVE-2008-1187 2008-03-06 2025-04-09 - 6.8 Likely
CVE-2008-1189 2008-03-06 2025-04-09 - 6.8 Likely
CVE-2008-1190 2008-03-06 2025-04-09 - 9.3 Likely
CVE-2008-1192 2008-03-06 2025-04-09 - 6.8 Likely
CVE-2008-1195 2008-03-06 2025-04-09 - 9.3 Likely
CVE-2008-1196 2008-03-06 2025-04-09 - 6.8 Likely
CVE-2008-3104 2008-07-09 2025-04-09 - 6.8 Likely
CVE-2008-3107 2008-07-09 2025-04-09 - 10.0 Likely
CVE-2008-3108 2008-07-09 2025-04-09 - 10.0 Likely
CVE-2008-3111 2008-07-09 2025-04-09 - 10.0 Likely
CVE-2008-3112 2008-07-09 2025-04-09 - 10.0 Likely
CVE-2008-3113 2008-07-09 2025-04-09 - 10.0 Likely
CVE-2008-3114 2008-07-09 2025-04-09 - 5.0 Likely
CVE-2008-2086 2008-12-05 2025-04-09 - 9.3 Likely
CVE-2008-5339 2008-12-05 2025-04-09 - 5.0 Likely
CVE-2008-5340 2008-12-05 2025-04-09 - 10.0 Likely
CVE-2008-5341 2008-12-05 2025-04-09 - 5.0 Likely
CVE-2008-5342 2008-12-05 2025-04-09 - 5.0 Likely
CVE-2008-5343 2008-12-05 2025-04-09 - 9.0 Likely
CVE-2008-5344 2008-12-05 2025-04-09 - 7.5 Likely
CVE-2008-5345 2008-12-05 2025-04-09 - 7.5 Likely
CVE-2008-5346 2008-12-05 2025-04-09 - 7.1 Likely
CVE-2008-5348 2008-12-05 2025-04-09 - 7.1 Likely
CVE-2008-5350 2008-12-05 2025-04-09 - 5.0 Likely
CVE-2008-5351 2008-12-05 2025-04-09 - 7.5 Likely
CVE-2008-5353 2008-12-05 2025-04-09 - 10.0 Likely
CVE-2008-5354 2008-12-05 2025-04-09 - 9.3 Likely
CVE-2008-5355 2008-12-05 2025-04-09 - 10.0 Likely
CVE-2008-5356 2008-12-05 2025-04-09 - 9.3 Likely
CVE-2008-5357 2008-12-05 2025-04-09 - 9.3 Likely
CVE-2008-5359 2008-12-05 2025-04-09 - 9.3 Likely
CVE-2008-5360 2008-12-05 2025-04-09 - 6.4 Likely
CVE-2009-1093 2009-03-25 2025-04-09 - 5.0 Likely
CVE-2009-1094 2009-03-25 2025-04-09 - 10.0 Likely
CVE-2009-1098 2009-03-25 2025-04-09 - 9.3 Likely
CVE-2009-1006 2009-04-15 2025-04-09 - 10.0 Likely
CVE-2004-2764 2009-06-02 2025-04-09 - 10.0 Likely
CVE-2009-2676 2009-08-05 2025-04-09 - 6.8 Likely
CVE-2009-3867 2009-11-05 2025-04-09 - 9.3 Likely
CVE-2009-3868 2009-11-05 2025-04-09 - 9.3 Likely
CVE-2009-3869 2009-11-05 2025-04-09 - 9.3 Likely
CVE-2009-3871 2009-11-05 2025-04-09 - 9.3 Likely
CVE-2009-3872 2009-11-05 2025-04-09 - 9.3 Likely
CVE-2009-3873 2009-11-05 2025-04-09 - 9.3 Likely
CVE-2009-3874 2009-11-05 2025-04-09 - 9.3 Likely
CVE-2009-3875 2009-11-05 2025-04-09 - 5.0 Likely
CVE-2009-3876 2009-11-05 2025-04-09 - 5.0 Likely
CVE-2009-3877 2009-11-05 2025-04-09 - 5.0 Likely
CVE-2010-0082 2010-04-01 2025-04-11 - 5.1 Unknown
CVE-2010-0084 2010-04-01 2025-04-11 - 5.0 Likely
CVE-2010-0085 2010-04-01 2025-04-11 - 5.1 Unknown
CVE-2010-0087 2010-04-01 2025-04-11 - 7.5 Likely
CVE-2010-0088 2010-04-01 2025-04-11 - 6.8 Likely
CVE-2010-0089 2010-04-01 2025-04-11 - 5.0 Likely
CVE-2010-0091 2010-04-01 2025-04-11 - 4.3 Likely
CVE-2010-0093 2010-04-01 2025-04-11 - 5.1 Unknown
CVE-2010-0095 2010-04-01 2025-04-11 - 6.8 Likely
CVE-2010-0839 2010-04-01 2025-04-11 - 7.5 Likely
CVE-2010-0841 2010-04-01 2025-04-11 - 7.5 Likely
CVE-2010-0842 2010-04-01 2025-04-11 - 7.5 Likely
CVE-2010-0843 2010-04-01 2025-04-11 - 7.5 Likely
CVE-2010-0844 2010-04-01 2025-04-11 - 7.5 Likely
CVE-2010-0846 2010-04-01 2025-04-11 - 7.5 Likely
CVE-2010-0847 2010-04-01 2025-04-11 - 7.5 Likely
CVE-2010-0848 2010-04-01 2025-04-11 - 7.5 Likely
CVE-2010-0849 2010-04-01 2025-04-11 - 7.5 Likely
CVE-2010-0850 2010-04-01 2025-04-11 - 7.5 Likely
CVE-2010-3541 2010-10-19 2025-04-11 - 5.1 Unknown
CVE-2010-3548 2010-10-19 2025-04-11 - 5.0 Likely
CVE-2010-3549 2010-10-19 2025-04-11 - 6.8 Likely
CVE-2010-3551 2010-10-19 2025-04-11 - 5.0 Likely
CVE-2010-3553 2010-10-19 2025-04-11 - 10.0 Likely
CVE-2010-3554 2010-10-19 2025-04-11 - 10.0 Likely
CVE-2010-3556 2010-10-19 2025-04-11 - 10.0 Likely
CVE-2010-3557 2010-10-19 2025-04-11 - 6.8 Likely
CVE-2010-3559 2010-10-19 2025-04-11 - 10.0 Likely
CVE-2010-3562 2010-10-19 2025-04-11 - 10.0 Likely
CVE-2010-3565 2010-10-19 2025-04-11 - 10.0 Likely
CVE-2010-3568 2010-10-19 2025-04-11 - 10.0 Likely
CVE-2010-3569 2010-10-19 2025-04-11 - 10.0 Likely
CVE-2010-3571 2010-10-19 2025-04-11 - 10.0 Likely
CVE-2010-3572 2010-10-19 2025-04-11 - 10.0 Likely
CVE-2010-3574 2010-10-19 2025-04-11 - 10.0 Likely
CVE-2010-4447 2011-02-17 2025-04-11 - 4.3 Likely
CVE-2010-4448 2011-02-17 2025-04-11 - 2.6 Unknown
CVE-2010-4450 2011-02-17 2025-04-11 - 3.7 Unknown
CVE-2010-4454 2011-02-17 2025-04-11 - 10.0 Likely
CVE-2010-4462 2011-02-17 2025-04-11 - 10.0 Likely
CVE-2010-4465 2011-02-17 2025-04-11 - 10.0 Likely
CVE-2010-4466 2011-02-17 2025-04-11 - 5.0 Likely
CVE-2010-4469 2011-02-17 2025-04-11 - 10.0 Likely
CVE-2010-4473 2011-02-17 2025-04-11 - 10.0 Likely
CVE-2010-4475 2011-02-17 2025-04-11 - 4.3 Likely
CVE-2010-4476 2011-02-17 2025-04-11 - 5.0 Likely

How SecUtils Interprets Product Data

SecUtils normalizes and enriches National Vulnerability Database (NVD) records for sun sdk by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and structuring the data for rapid analysis and asset correlation. For every vulnerability listed, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference information to enable organizations to prioritize patching and risk assessment efficiently. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for vulnerability management and security operations.