Product Detail
JDK
Public Exploit/PoC Code :
28
CISA Actively Exploited :
3
Last Vulnerability Seen :
Oct. 16, 2013
Vulnerabilities
The following vulnerabilities are recorded
JDK product. You can click on the
vulnerability to view more details.
| Number | Published | CVE ID | Severity | CVSS Score | |
|---|---|---|---|---|---|
| 1 | Feb 17, 2011 | CVE-2010-4474 | LOW |
2.1
|
|
| 2 | Feb 17, 2011 | CVE-2010-4473 | HIGH |
10.0
|
|
| 3 | Feb 17, 2011 | CVE-2010-4472 | LOW |
2.6
|
|
| 4 | Feb 17, 2011 | CVE-2010-4471 | MEDIUM |
5.0
|
|
| 5 | Feb 17, 2011 | CVE-2010-4470 | MEDIUM |
5.0
|
|
| 6 | Feb 17, 2011 | CVE-2010-4469 | HIGH |
10.0
|
|
| 7 | Feb 17, 2011 | CVE-2010-4468 | MEDIUM |
4.0
|
|
| 8 | Feb 17, 2011 | CVE-2010-4467 | HIGH |
10.0
|
|
| 9 | Feb 17, 2011 | CVE-2010-4466 | MEDIUM |
5.0
|
|
| 10 | Feb 17, 2011 | CVE-2010-4465 | HIGH |
10.0
|
|
| 11 | Feb 17, 2011 | CVE-2010-4463 | HIGH |
10.0
|
|
| 12 | Feb 17, 2011 | CVE-2010-4462 | HIGH |
10.0
|
|
| 13 | Feb 17, 2011 | CVE-2010-4454 | HIGH |
10.0
|
|
| 14 | Feb 17, 2011 | CVE-2010-4452 | HIGH |
10.0
|
|
| 15 | Feb 17, 2011 | CVE-2010-4451 | HIGH |
7.6
|
|
| 16 | Feb 17, 2011 | CVE-2010-4450 | LOW |
3.7
|
|
| 17 | Feb 17, 2011 | CVE-2010-4448 | LOW |
2.6
|
|
| 18 | Feb 17, 2011 | CVE-2010-4447 | MEDIUM |
4.3
|
|
| 19 | Feb 17, 2011 | CVE-2010-4422 | HIGH |
7.6
|
|
| 20 | Oct 19, 2010 | CVE-2010-3574 | HIGH |
10.0
|