Product Detail
JDK
Public Exploit/PoC Code :
28
CISA Actively Exploited :
3
Last Vulnerability Seen :
Oct. 16, 2013
Vulnerabilities
The following vulnerabilities are recorded
JDK product. You can click on the
vulnerability to view more details.
| Number | Published | CVE ID | Severity | CVSS Score | |
|---|---|---|---|---|---|
| 1 | Oct 19, 2010 | CVE-2010-3573 | MEDIUM |
5.1
|
|
| 2 | Oct 19, 2010 | CVE-2010-3572 | HIGH |
10.0
|
|
| 3 | Oct 19, 2010 | CVE-2010-3571 | HIGH |
10.0
|
|
| 4 | Oct 19, 2010 | CVE-2010-3570 | HIGH |
7.6
|
|
| 5 | Oct 19, 2010 | CVE-2010-3569 | HIGH |
10.0
|
|
| 6 | Oct 19, 2010 | CVE-2010-3568 | HIGH |
10.0
|
|
| 7 | Oct 19, 2010 | CVE-2010-3567 | HIGH |
10.0
|
|
| 8 | Oct 19, 2010 | CVE-2010-3566 | HIGH |
10.0
|
|
| 9 | Oct 19, 2010 | CVE-2010-3565 | HIGH |
10.0
|
|
| 10 | Oct 19, 2010 | CVE-2010-3563 | HIGH |
10.0
|
|
| 11 | Oct 19, 2010 | CVE-2010-3562 | HIGH |
10.0
|
|
| 12 | Oct 19, 2010 | CVE-2010-3561 | HIGH |
7.5
|
|
| 13 | Oct 19, 2010 | CVE-2010-3560 | LOW |
2.6
|
|
| 14 | Oct 19, 2010 | CVE-2010-3559 | HIGH |
10.0
|
|
| 15 | Oct 19, 2010 | CVE-2010-3558 | HIGH |
10.0
|
|
| 16 | Oct 19, 2010 | CVE-2010-3557 | MEDIUM |
6.8
|
|
| 17 | Oct 19, 2010 | CVE-2010-3556 | HIGH |
10.0
|
|
| 18 | Oct 19, 2010 | CVE-2010-3555 | HIGH |
9.3
|
|
| 19 | Oct 19, 2010 | CVE-2010-3554 | HIGH |
10.0
|
|
| 20 | Oct 19, 2010 | CVE-2010-3553 | HIGH |
10.0
|