9.3
CVSSv2

CVE-2006-6745

Published: 26/12/2006 Updated: 30/10/2018
CVSS v2 Base Score: 9.3 | Impact Score: 10 | Exploitability Score: 8.6
VMScore: 828
Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

Multiple unspecified vulnerabilities in Sun Java Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 7 and previous versions, and Java System Development Kit (SDK) and JRE 1.4.2_12 and previous versions 1.4.x versions, allow malicious users to develop Java applets or applications that are able to gain privileges, related to serialization in JRE.

Vulnerable Product Search on Vulmon Subscribe to Product

sun j2se 1.4.1

sun j2se 1.4.2

sun j2se 1.4.2_07

sun j2se 1.4.2_08

sun j2se 5.0_update2

sun j2se 5.0_update3

sun jre 1.4.2_1

sun jre 1.4.2_10

sun jre 1.4.2_5

sun jre 1.4.2_6

sun jre 1.5.0

sun j2se 1.4.2_03

sun j2se 1.4.2_04

sun j2se 1.4.2_11

sun j2se 1.4.2_12

sun j2se 5.0_update6

sun j2se 5.0_update7

sun jre 1.4.2_13

sun jre 1.4.2_2

sun jre 1.4.2_9

sun j2se 1.4.2_05

sun j2se 1.4.2_06

sun j2se 1.4

sun j2se 5.0

sun j2se 5.0_update1

sun jre 1.4.1

sun jre 1.4.2

sun jre 1.4.2_3

sun jre 1.4.2_4

sun j2se 1.4.2_01

sun j2se 1.4.2_02

sun j2se 1.4.2_09

sun j2se 1.4.2_10

sun j2se 5.0_update4

sun j2se 5.0_update5

sun jre 1.4.2_11

sun jre 1.4.2_12

sun jre 1.4.2_7

sun jre 1.4.2_8

References

NVD-CWE-Otherhttp://sunsolve.sun.com/search/document.do?assetkey=1-26-102731-1http://www.securityfocus.com/bid/21673http://securitytracker.com/id?1017426http://lists.suse.com/archive/suse-security-announce/2007-Jan/0003.htmlhttp://www.kb.cert.org/vuls/id/102289http://secunia.com/advisories/23650http://secunia.com/advisories/23445http://security.gentoo.org/glsa/glsa-200701-15.xmlhttp://security.gentoo.org/glsa/glsa-200702-08.xmlhttp://www.redhat.com/support/errata/RHSA-2007-0062.htmlhttp://www.redhat.com/support/errata/RHSA-2007-0073.htmlhttp://www.novell.com/linux/security/advisories/2007_10_ibmjava.htmlhttp://secunia.com/advisories/23835http://secunia.com/advisories/24099http://secunia.com/advisories/24189http://secunia.com/advisories/24468http://dev2dev.bea.com/pub/advisory/240http://secunia.com/advisories/25283http://support.novell.com/techcenter/psdb/4f850d1e2b871db609de64ec70f0089c.htmlhttp://support.novell.com/techcenter/psdb/d2f549cc040cd81ae4a268bb5edfe918.htmlhttp://www.gentoo.org/security/en/glsa/glsa-200705-20.xmlhttp://www.novell.com/linux/security/advisories/2007_45_java.htmlhttp://www.us-cert.gov/cas/techalerts/TA07-022A.htmlhttp://secunia.com/advisories/25404http://secunia.com/advisories/26049http://secunia.com/advisories/26119http://docs.info.apple.com/article.html?artnum=307177http://lists.apple.com/archives/Security-announce/2007/Dec/msg00001.htmlhttp://secunia.com/advisories/28115http://www.vupen.com/english/advisories/2007/0936http://www.vupen.com/english/advisories/2006/5074http://www.vupen.com/english/advisories/2007/1814http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c00876579http://www.vupen.com/english/advisories/2007/4224https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9621https://nvd.nist.govhttps://www.kb.cert.org/vuls/id/102289