cpe:/a:sun:jdk:1.5.0:- cpe:/a:sun:jdk:1.5.0:update1 cpe:/a:sun:jdk:1.5.0:update10 cpe:/a:sun:jdk:1.5.0:update2 cpe:/a:sun:jdk:1.5.0:update3 cpe:/a:sun:jdk:1.5.0:update4 cpe:/a:sun:jdk:1.5.0:update5 cpe:/a:sun:jdk:1.5.0:update6 cpe:/a:sun:jdk:1.5.0:update7 cpe:/a:sun:jdk:1.5.0:update7_b03 cpe:/a:sun:jdk:1.5.0:update8 cpe:/a:sun:jdk:1.5.0:update9 cpe:/a:sun:jre:1.3.1 cpe:/a:sun:jre:1.3.1_2 cpe:/a:sun:jre:1.3.1_03 cpe:/a:sun:jre:1.3.1_04 cpe:/a:sun:jre:1.3.1_05 cpe:/a:sun:jre:1.3.1_06 cpe:/a:sun:jre:1.3.1_07 cpe:/a:sun:jre:1.3.1_08 cpe:/a:sun:jre:1.3.1_09 cpe:/a:sun:jre:1.3.1_10 cpe:/a:sun:jre:1.3.1_11 cpe:/a:sun:jre:1.3.1_12 cpe:/a:sun:jre:1.3.1_13 cpe:/a:sun:jre:1.3.1_14 cpe:/a:sun:jre:1.3.1_15 cpe:/a:sun:jre:1.3.1_16 cpe:/a:sun:jre:1.3.1_17 cpe:/a:sun:jre:1.3.1_18 cpe:/a:sun:jre:1.3.1_19 cpe:/a:sun:jre:1.3.1_20 cpe:/a:sun:jre:1.3.1_21 cpe:/a:sun:jre:1.3.1_22 cpe:/a:sun:jre:1.3.1_23 cpe:/a:sun:jre:1.4.2 cpe:/a:sun:jre:1.4.2_1 cpe:/a:sun:jre:1.4.2_2 cpe:/a:sun:jre:1.4.2_3 cpe:/a:sun:jre:1.4.2_4 cpe:/a:sun:jre:1.4.2_5 cpe:/a:sun:jre:1.4.2_6 cpe:/a:sun:jre:1.4.2_7 cpe:/a:sun:jre:1.4.2_8 cpe:/a:sun:jre:1.4.2_9 cpe:/a:sun:jre:1.4.2_10 cpe:/a:sun:jre:1.4.2_11 cpe:/a:sun:jre:1.4.2_12 cpe:/a:sun:jre:1.4.2_13 cpe:/a:sun:jre:1.4.2_14 cpe:/a:sun:jre:1.4.2_15 cpe:/a:sun:jre:1.4.2_16 cpe:/a:sun:jre:1.4.2_17 cpe:/a:sun:jre:1.4.2_18 cpe:/a:sun:jre:1.5.0:- cpe:/a:sun:jre:1.5.0:update1 cpe:/a:sun:jre:1.5.0:update10 cpe:/a:sun:jre:1.5.0:update2 cpe:/a:sun:jre:1.5.0:update3 cpe:/a:sun:jre:1.5.0:update4 cpe:/a:sun:jre:1.5.0:update5 cpe:/a:sun:jre:1.5.0:update6 cpe:/a:sun:jre:1.5.0:update7 cpe:/a:sun:jre:1.5.0:update8 cpe:/a:sun:jre:1.5.0:update9 cpe:/a:sun:sdk:1.3.1 cpe:/a:sun:sdk:1.3.1_01 cpe:/a:sun:sdk:1.3.1_01a cpe:/a:sun:sdk:1.3.1_02 cpe:/a:sun:sdk:1.3.1_03 cpe:/a:sun:sdk:1.3.1_04 cpe:/a:sun:sdk:1.3.1_05 cpe:/a:sun:sdk:1.3.1_06 cpe:/a:sun:sdk:1.3.1_07 cpe:/a:sun:sdk:1.3.1_08 cpe:/a:sun:sdk:1.3.1_09 cpe:/a:sun:sdk:1.3.1_10 cpe:/a:sun:sdk:1.3.1_11 cpe:/a:sun:sdk:1.3.1_12 cpe:/a:sun:sdk:1.3.1_13 cpe:/a:sun:sdk:1.3.1_14 cpe:/a:sun:sdk:1.3.1_15 cpe:/a:sun:sdk:1.3.1_16 cpe:/a:sun:sdk:1.3.1_17 cpe:/a:sun:sdk:1.3.1_18 cpe:/a:sun:sdk:1.3.1_19 cpe:/a:sun:sdk:1.3.1_20 cpe:/a:sun:sdk:1.3.1_21 cpe:/a:sun:sdk:1.3.1_22 cpe:/a:sun:sdk:1.3.1_23 cpe:/a:sun:sdk:1.4.2 cpe:/a:sun:sdk:1.4.2_1 cpe:/a:sun:sdk:1.4.2_2 cpe:/a:sun:sdk:1.4.2_03 cpe:/a:sun:sdk:1.4.2_4 cpe:/a:sun:sdk:1.4.2_5 cpe:/a:sun:sdk:1.4.2_6 cpe:/a:sun:sdk:1.4.2_7 cpe:/a:sun:sdk:1.4.2_8 cpe:/a:sun:sdk:1.4.2_09 cpe:/a:sun:sdk:1.4.2_10 cpe:/a:sun:sdk:1.4.2_11 cpe:/a:sun:sdk:1.4.2_12 cpe:/a:sun:sdk:1.4.2_13 cpe:/a:sun:sdk:1.4.2_14 cpe:/a:sun:sdk:1.4.2_15 cpe:/a:sun:sdk:1.4.2_16 cpe:/a:sun:sdk:1.4.2_17 cpe:/a:sun:sdk:1.4.2_18 CVE-2008-3108 2008-07-09T19:41:00.000-04:00 2019-07-31T08:47:06.483-04:00 10.0 NETWORK LOW NONE COMPLETE COMPLETE COMPLETE http://nvd.nist.gov 2019-07-22T14:06:04.127-04:00 ALLOWS_ADMIN_ACCESS SECTRACK 1020461 BUGTRAQ 20081004 VMSA-2008-0016 VMware Hosted products, VirtualCenter Update 3 and BUGTRAQ 20081004 VMSA-2008-0016 VMware Hosted products, VirtualCenter Update 3 and patches for ESX and ESXi resolve multiple security issues SUNALERT 238666 BID 30147 SECUNIA 31010 SECUNIA 31320 SECUNIA 31497 SECUNIA 31600 SECUNIA 31736 SECUNIA 32018 SECUNIA 32179 SECUNIA 32180 SECUNIA 33236 SECUNIA 33237 SECUNIA 37386 VUPEN ADV-2008-2056 VUPEN ADV-2008-2740 APPLE APPLE-SA-2008-09-24 GENTOO GLSA-200911-02 IAVM IAVM:2012-A-0136 REDHAT RHSA-2008:0790 REDHAT RHSA-2008:1043 REDHAT RHSA-2008:1044 SUSE SUSE-SA:2008:042 SUSE SUSE-SA:2008:043 SUSE SUSE-SA:2008:045 CERT TA08-193A CONFIRM http://support.apple.com/kb/HT3178 CONFIRM http://support.apple.com/kb/HT3179 CONFIRM http://support.avaya.com/elmodocs2/security/ASA-2008-300.htm CONFIRM http://support.avaya.com/elmodocs2/security/ASA-2008-507.htm CONFIRM http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=751014 CONFIRM http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=756717 CONFIRM http://www.vmware.com/security/advisories/VMSA-2008-0016.html XF sun-jre-font-bo(43656) Buffer overflow in Sun Java Runtime Environment (JRE) in JDK and JRE 5.0 before Update 10, SDK and JRE 1.4.x before 1.4.2_18, and SDK and JRE 1.3.x before 1.3.1_23 allows context-dependent attackers to gain privileges via unspecified vectors related to font processing.