CVE-2009-2673
05.08.2009, 19:30
The proxy mechanism implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows remote attackers to bypass intended access restrictions and connect to arbitrary sites via unspecified vectors, related to a declaration that lacks the final keyword.Enginsight
Vendor | Product | Version |
---|---|---|
sun | jdk | 𝑥 ≤ 6 |
sun | jdk | 5.0 |
sun | jdk | 5.0 |
sun | jdk | 5.0 |
sun | jdk | 5.0 |
sun | jdk | 5.0 |
sun | jdk | 5.0 |
sun | jdk | 5.0 |
sun | jdk | 5.0 |
sun | jdk | 5.0 |
sun | jdk | 5.0 |
sun | jdk | 5.0 |
sun | jdk | 5.0 |
sun | jdk | 5.0 |
sun | jdk | 5.0 |
sun | jdk | 5.0 |
sun | jdk | 5.0 |
sun | jdk | 5.0 |
sun | jre | 𝑥 ≤ 6 |
sun | jre | 5.0 |
sun | jre | 5.0 |
sun | jre | 5.0 |
sun | jre | 5.0 |
sun | jre | 5.0 |
sun | jre | 5.0 |
sun | jre | 5.0 |
sun | jre | 5.0 |
sun | jre | 5.0 |
sun | jre | 5.0 |
sun | jre | 5.0 |
sun | jre | 5.0 |
sun | jre | 5.0 |
sun | jre | 5.0 |
sun | jre | 5.0 |
sun | jre | 5.0 |
sun | jre | 5.0 |
sun | jre | 5.0 |
𝑥
= Vulnerable software versions

Ubuntu Releases
Ubuntu Product | |||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
openjdk-6 |
| ||||||||||||||||
sun-java5 |
| ||||||||||||||||
sun-java6 |
|
Common Weakness Enumeration
References