Product Detail
JDK
Public Exploit/PoC Code :
22
CISA Actively Exploited :
3
Last Vulnerability Seen :
Oct. 16, 2013
Vulnerabilities
The following vulnerabilities are recorded
JDK
product. You can click on the
vulnerability to view more details.
Number | Published | CVE ID | Severity | CVSS Score | |
---|---|---|---|---|---|
1 | Feb 17, 2011 | CVE-2010-4473 | CRITICAL |
10.0
|
|
2 | Feb 17, 2011 | CVE-2010-4472 | LOW |
2.6
|
|
3 | Feb 17, 2011 | CVE-2010-4471 | MEDIUM |
5.0
|
|
4 | Feb 17, 2011 | CVE-2010-4470 | MEDIUM |
5.0
|
|
5 | Feb 17, 2011 | CVE-2010-4469 | CRITICAL |
10.0
|
|
6 | Feb 17, 2011 | CVE-2010-4468 | MEDIUM |
4.0
|
|
7 | Feb 17, 2011 | CVE-2010-4467 | CRITICAL |
10.0
|
|
8 | Feb 17, 2011 | CVE-2010-4466 | MEDIUM |
5.0
|
|
9 | Feb 17, 2011 | CVE-2010-4465 | CRITICAL |
10.0
|
|
10 | Feb 17, 2011 | CVE-2010-4463 | CRITICAL |
10.0
|
|
11 | Feb 17, 2011 | CVE-2010-4462 | CRITICAL |
10.0
|
|
12 | Feb 17, 2011 | CVE-2010-4454 | CRITICAL |
10.0
|
|
13 | Feb 17, 2011 | CVE-2010-4452 | CRITICAL |
10.0
|
|
14 | Feb 17, 2011 | CVE-2010-4451 | HIGH |
7.6
|
|
15 | Feb 17, 2011 | CVE-2010-4450 | LOW |
3.7
|
|
16 | Feb 17, 2011 | CVE-2010-4448 | LOW |
2.6
|
|
17 | Feb 17, 2011 | CVE-2010-4447 | MEDIUM |
4.3
|
|
18 | Feb 17, 2011 | CVE-2010-4422 | HIGH |
7.6
|
|
19 | Oct 19, 2010 | CVE-2010-3574 | CRITICAL |
10.0
|
|
20 | Oct 19, 2010 | CVE-2010-3573 | MEDIUM |
5.1
|