cpe:/a:sun:jdk:1.5.0:- cpe:/a:sun:jdk:1.5.0:update1 cpe:/a:sun:jdk:1.5.0:update10 cpe:/a:sun:jdk:1.5.0:update2 cpe:/a:sun:jdk:1.5.0:update3 cpe:/a:sun:jdk:1.5.0:update4 cpe:/a:sun:jdk:1.5.0:update5 cpe:/a:sun:jdk:1.5.0:update6 cpe:/a:sun:jdk:1.5.0:update7 cpe:/a:sun:jdk:1.5.0:update8 cpe:/a:sun:jdk:1.5.0:update9 cpe:/a:sun:jdk:1.6.0:- cpe:/a:sun:jre:1.3.1:- cpe:/a:sun:jre:1.3.1_2 cpe:/a:sun:jre:1.3.1_03 cpe:/a:sun:jre:1.3.1_04 cpe:/a:sun:jre:1.3.1_05 cpe:/a:sun:jre:1.3.1_06 cpe:/a:sun:jre:1.3.1_07 cpe:/a:sun:jre:1.3.1_08 cpe:/a:sun:jre:1.3.1_09 cpe:/a:sun:jre:1.3.1_10 cpe:/a:sun:jre:1.3.1_11 cpe:/a:sun:jre:1.3.1_12 cpe:/a:sun:jre:1.3.1_13 cpe:/a:sun:jre:1.3.1_14 cpe:/a:sun:jre:1.3.1_15 cpe:/a:sun:jre:1.3.1_16 cpe:/a:sun:jre:1.3.1_17 cpe:/a:sun:jre:1.3.1_18 cpe:/a:sun:jre:1.3.1_19 cpe:/a:sun:jre:1.3.1_20 cpe:/a:sun:jre:1.4.2:- cpe:/a:sun:jre:1.4.2_1 cpe:/a:sun:jre:1.4.2_2 cpe:/a:sun:jre:1.4.2_3 cpe:/a:sun:jre:1.4.2_4 cpe:/a:sun:jre:1.4.2_5 cpe:/a:sun:jre:1.4.2_6 cpe:/a:sun:jre:1.4.2_7 cpe:/a:sun:jre:1.4.2_8 cpe:/a:sun:jre:1.4.2_9 cpe:/a:sun:jre:1.4.2_10 cpe:/a:sun:jre:1.4.2_11 cpe:/a:sun:jre:1.4.2_12 cpe:/a:sun:jre:1.4.2_13 cpe:/a:sun:jre:1.4.2_14 cpe:/a:sun:jre:1.5.0:- cpe:/a:sun:jre:1.5.0:update1 cpe:/a:sun:jre:1.5.0:update10 cpe:/a:sun:jre:1.5.0:update2 cpe:/a:sun:jre:1.5.0:update3 cpe:/a:sun:jre:1.5.0:update4 cpe:/a:sun:jre:1.5.0:update5 cpe:/a:sun:jre:1.5.0:update6 cpe:/a:sun:jre:1.5.0:update7 cpe:/a:sun:jre:1.5.0:update8 cpe:/a:sun:jre:1.5.0:update9 cpe:/a:sun:jre:1.6.0:- cpe:/a:sun:sdk:1.3.1 cpe:/a:sun:sdk:1.3.1_01 cpe:/a:sun:sdk:1.3.1_01a cpe:/a:sun:sdk:1.3.1_02 cpe:/a:sun:sdk:1.3.1_03 cpe:/a:sun:sdk:1.3.1_04 cpe:/a:sun:sdk:1.3.1_05 cpe:/a:sun:sdk:1.3.1_06 cpe:/a:sun:sdk:1.3.1_07 cpe:/a:sun:sdk:1.3.1_08 cpe:/a:sun:sdk:1.3.1_09 cpe:/a:sun:sdk:1.3.1_10 cpe:/a:sun:sdk:1.3.1_11 cpe:/a:sun:sdk:1.3.1_12 cpe:/a:sun:sdk:1.3.1_13 cpe:/a:sun:sdk:1.3.1_14 cpe:/a:sun:sdk:1.3.1_15 cpe:/a:sun:sdk:1.3.1_16 cpe:/a:sun:sdk:1.3.1_17 cpe:/a:sun:sdk:1.3.1_18 cpe:/a:sun:sdk:1.3.1_19 cpe:/a:sun:sdk:1.3.1_20 cpe:/a:sun:sdk:1.4.2 cpe:/a:sun:sdk:1.4.2_1 cpe:/a:sun:sdk:1.4.2_2 cpe:/a:sun:sdk:1.4.2_3 cpe:/a:sun:sdk:1.4.2_4 cpe:/a:sun:sdk:1.4.2_5 cpe:/a:sun:sdk:1.4.2_6 cpe:/a:sun:sdk:1.4.2_7 cpe:/a:sun:sdk:1.4.2_8 cpe:/a:sun:sdk:1.4.2_9 cpe:/a:sun:sdk:1.4.2_10 cpe:/a:sun:sdk:1.4.2_11 cpe:/a:sun:sdk:1.4.2_12 cpe:/a:sun:sdk:1.4.2_13 cpe:/a:sun:sdk:1.4.2_14 CVE-2007-2788 2007-05-21T20:30:00.000-04:00 2019-08-01T08:21:17.537-04:00 6.8 NETWORK MEDIUM NONE PARTIAL PARTIAL PARTIAL http://nvd.nist.gov 2019-07-31T13:01:27.303-04:00 ALLOWS_USER_ACCESS SECTRACK 1018182 SUNALERT 102934 VIM 20070703 Sun JDK Confusion VIM 20070704 [theall at tenablesecurity.com: Sun JDK Confusion] (fwd) VIM 20070711 Sun JDK Confusion VIM 20071218 Sun JDK Confusion Revisited SUNALERT 200856 BID 24004 BID 24267 SECUNIA 25295 SECUNIA 25474 SECUNIA 25832 SECUNIA 26049 SECUNIA 26119 SECUNIA 26311 SECUNIA 26369 SECUNIA 26631 SECUNIA 26645 SECUNIA 26933 SECUNIA 27203 SECUNIA 27266 SECUNIA 28056 SECUNIA 28115 SECUNIA 28365 SECUNIA 29340 SECUNIA 29858 SECUNIA 30780 SECUNIA 30805 VUPEN ADV-2007-1836 VUPEN ADV-2007-3009 VUPEN ADV-2007-4224 VUPEN ADV-2008-0065 APPLE APPLE-SA-2007-12-14 BEA BEA07-177.00 GENTOO GLSA-200705-23 GENTOO GLSA-200706-08 GENTOO GLSA-200709-15 GENTOO GLSA-200804-20 GENTOO GLSA-200804-28 GENTOO GLSA-200806-11 REDHAT RHSA-2007:0817 REDHAT RHSA-2007:0829 REDHAT RHSA-2007:0956 REDHAT RHSA-2007:1086 REDHAT RHSA-2008:0100 REDHAT RHSA-2008:0133 REDHAT RHSA-2008:0261 SUSE SUSE-SA:2007:045 SUSE SUSE-SA:2007:056 CERT-VN VU#138545 MLIST [Security-announce] 20080107 VMSA-2008-0002 Low severity security update for VirtualCenter and ESX Server 3.0.2, and ESX 3.0.1 MISC http://docs.info.apple.com/article.html?artnum=307177 MISC http://scary.beasts.org/security/CESA-2006-004.html CONFIRM http://support.novell.com/techcenter/psdb/4f850d1e2b871db609de64ec70f0089c.html CONFIRM http://support.novell.com/techcenter/psdb/d2f549cc040cd81ae4a268bb5edfe918.html XF sun-java-image-bo(34652) XF sunjava-iccprofile-overflow(34318) Integer overflow in the embedded ICC profile image parser in Sun Java Development Kit (JDK) before 1.5.0_11-b03 and 1.6.x before 1.6.0_01-b06, and Sun Java Runtime Environment in JDK and JRE 6, JDK and JRE 5.0 Update 10 and earlier, SDK and JRE 1.4.2_14 and earlier, and SDK and JRE 1.3.1_20 and earlier, allows remote attackers to execute arbitrary code or cause a denial of service (JVM crash) via a crafted JPEG or BMP file that triggers a buffer overflow.