Куда я попал?
SECURITM это SGRC система, ? автоматизирующая процессы в службах информационной безопасности. SECURITM помогает построить и управлять ИСПДн, КИИ, ГИС, СМИБ/СУИБ, банковскими системами защиты.
А еще SECURITM это место для обмена опытом и наработками для служб безопасности.

CVE-2010-0840

PUBLISHED 22.10.2025

CNA: oracle

Обновлено: 10.10.2018
Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE and Java for Business 6 Update 18, 5.0 Update 23, and 1.4.2_25 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the March 2010 CPU. Oracle has not commented on claims from a reliable researcher that this is related to improper checks when executing privileged methods in the Java Runtime Environment (JRE), which allows attackers to execute arbitrary code via (1) an untrusted object that extends the trusted class but has not modified a certain method, or (2) "a similar trust issue with interfaces," aka "Trusted Methods Chaining Remote Code Execution Vulnerability."

БДУ ФСТЭК

Идентификатор Описание
BDU:2022-03394 Уязвимость программной платформы Java Runtime Environment, вызванная выходом операции за границы буфера в памяти, позволяющая нарушителю повлиять на целостность, доступность и конфиденциальность информации

Доп. Информация

Product Status

n/a
Product: n/a
Vendor: n/a
Default status: Не определен
Версии:
Затронутые версии Статус
Наблюдалось в версии n/a affected
 

Ссылки

http://lists.apple.com/archives/security-announce/2010//May/msg00001.html
http://marc.info/?l=bugtraq&m=134254866602253&w=2
http://www.securityfocus.com/archive/1/510528/100/0/threaded
http://secunia.com/advisories/39317
http://www.redhat.com/support/errata/RHSA-2010-0383.html
http://secunia.com/advisories/40545
http://www.vupen.com/english/advisories/2010/1454
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13971
http://secunia.com/advisories/39819
http://www.vupen.com/english/advisories/2010/1107
http://www.redhat.com/support/errata/RHSA-2010-0338.html
http://www.vupen.com/english/advisories/2010/1793
http://lists.apple.com/archives/security-announce/2010//May/msg00002.html
http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html
http://secunia.com/advisories/43308
http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html
http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751
http://marc.info/?l=bugtraq&m=127557596201693&w=2
http://www.oracle.com/technetwork/topics/security/javacpumar2010-083341.html
http://www.redhat.com/support/errata/RHSA-2010-0339.html
http://marc.info/?l=bugtraq&m=127557596201693&w=2
http://secunia.com/advisories/39292
http://support.apple.com/kb/HT4170
http://www.vupen.com/english/advisories/2010/1523
http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html
http://www.securityfocus.com/bid/39065
http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00001.html
http://secunia.com/advisories/39659
http://www.redhat.com/support/errata/RHSA-2010-0471.html
http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html
http://ubuntu.com/usn/usn-923-1
http://www.vmware.com/security/advisories/VMSA-2011-0003.html
http://www.redhat.com/support/errata/RHSA-2010-0337.html
http://www.redhat.com/support/errata/RHSA-2010-0489.html
http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751
http://www.zerodayinitiative.com/advisories/ZDI-10-056
http://secunia.com/advisories/40211
http://support.apple.com/kb/HT4171
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9974
http://www.mandriva.com/security/advisories?name=MDVSA-2010:084
http://www.securityfocus.com/archive/1/516397/100/0/threaded
http://www.vupen.com/english/advisories/2010/1191

CVE Program Container

Обновлено: 07.08.2024
SSVC and KEV, plus CVSS and CWE if not provided by the CNA.

Ссылки

http://lists.apple.com/archives/security-announce/2010//May/msg00001.html
http://marc.info/?l=bugtraq&m=134254866602253&w=2
http://www.securityfocus.com/archive/1/510528/100/0/threaded
http://secunia.com/advisories/39317
http://www.redhat.com/support/errata/RHSA-2010-0383.html
http://secunia.com/advisories/40545
http://www.vupen.com/english/advisories/2010/1454
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13971
http://secunia.com/advisories/39819
http://www.vupen.com/english/advisories/2010/1107
http://www.redhat.com/support/errata/RHSA-2010-0338.html
http://www.vupen.com/english/advisories/2010/1793
http://lists.apple.com/archives/security-announce/2010//May/msg00002.html
http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html
http://secunia.com/advisories/43308
http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html
http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751
http://marc.info/?l=bugtraq&m=127557596201693&w=2
http://www.oracle.com/technetwork/topics/security/javacpumar2010-083341.html
http://www.redhat.com/support/errata/RHSA-2010-0339.html
http://marc.info/?l=bugtraq&m=127557596201693&w=2
http://secunia.com/advisories/39292
http://support.apple.com/kb/HT4170
http://www.vupen.com/english/advisories/2010/1523
http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html
http://www.securityfocus.com/bid/39065
http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00001.html
http://secunia.com/advisories/39659
http://www.redhat.com/support/errata/RHSA-2010-0471.html
http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html
http://ubuntu.com/usn/usn-923-1
http://www.vmware.com/security/advisories/VMSA-2011-0003.html
http://www.redhat.com/support/errata/RHSA-2010-0337.html
http://www.redhat.com/support/errata/RHSA-2010-0489.html
http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751
http://www.zerodayinitiative.com/advisories/ZDI-10-056
http://secunia.com/advisories/40211
http://support.apple.com/kb/HT4171
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9974
http://www.mandriva.com/security/advisories?name=MDVSA-2010:084
http://www.securityfocus.com/archive/1/516397/100/0/threaded
http://www.vupen.com/english/advisories/2010/1191

CISA ADP Vulnrichment

Обновлено: 22.10.2025
Этот блок содержит дополнительную информацию, предоставленную программой CVE для этой уязвимости.

CVSS

Оценка Severity Версия Базовый вектор
9.8 CRITICAL 3.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

SSVC

Exploitation Automatable Technical Impact Версия Дата доступа
active yes total 2.0.3 10.02.2025

Ссылки

Мы используем cookie-файлы, чтобы получить статистику, которая помогает нам улучшить сервис для вас с целью персонализации сервисов и предложений. Вы может прочитать подробнее о cookie-файлах или изменить настройки браузера. Продолжая пользоваться сайтом, вы даёте согласие на использование ваших cookie-файлов и соглашаетесь с Политикой обработки персональных данных.