U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2010-0840

Change History

Modified Analysis by NIST 6/28/2024 1:36:14 PM

Action Type Old Value New Value
Added CVSS V3.1

								
							
							
						
NIST AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Changed CPE Configuration
OR
     *cpe:2.3:a:sun:jre:1.6.0:*:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.6.0:update_10:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.6.0:update_11:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.6.0:update_12:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.6.0:update_13:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.6.0:update_14:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.6.0:update_15:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.6.0:update_16:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.6.0:update_17:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.6.0:update_2:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.6.0:update_3:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.6.0:update_4:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.6.0:update_5:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.6.0:update_6:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.6.0:update_7:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:*:update_18:*:*:*:*:*:* versions up to (including) 1.6.0
OR
     *cpe:2.3:a:oracle:jre:1.4.2_25:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:jre:1.5.0:update23:*:*:*:*:*:*
     *cpe:2.3:a:oracle:jre:1.6.0:update18:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
     *cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*
     *cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
     *cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:*
     *cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*
     *cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*
Removed CPE Configuration
OR
     *cpe:2.3:a:sun:jdk:1.5.0:*:*:*:*:*:*:*
     *cpe:2.3:a:sun:jdk:1.5.0:update1:*:*:*:*:*:*
     *cpe:2.3:a:sun:jdk:1.5.0:update10:*:*:*:*:*:*
     *cpe:2.3:a:sun:jdk:1.5.0:update11:*:*:*:*:*:*
     *cpe:2.3:a:sun:jdk:1.5.0:update12:*:*:*:*:*:*
     *cpe:2.3:a:sun:jdk:1.5.0:update13:*:*:*:*:*:*
     *cpe:2.3:a:sun:jdk:1.5.0:update14:*:*:*:*:*:*
     *cpe:2.3:a:sun:jdk:1.5.0:update15:*:*:*:*:*:*
     *cpe:2.3:a:sun:jdk:1.5.0:update16:*:*:*:*:*:*
     *cpe:2.3:a:sun:jdk:1.5.0:update17:*:*:*:*:*:*
     *cpe:2.3:a:sun:jdk:1.5.0:update18:*:*:*:*:*:*
     *cpe:2.3:a:sun:jdk:1.5.0:update19:*:*:*:*:*:*
     *cpe:2.3:a:sun:jdk:1.5.0:update2:*:*:*:*:*:*
     *cpe:2.3:a:sun:jdk:1.5.0:update20:*:*:*:*:*:*
     *cpe:2.3:a:sun:jdk:1.5.0:update21:*:*:*:*:*:*
     *cpe:2.3:a:sun:jdk:1.5.0:update3:*:*:*:*:*:*
     *cpe:2.3:a:sun:jdk:1.5.0:update4:*:*:*:*:*:*
     *cpe:2.3:a:sun:jdk:1.5.0:update5:*:*:*:*:*:*
     *cpe:2.3:a:sun:jdk:1.5.0:update6:*:*:*:*:*:*
     *cpe:2.3:a:sun:jdk:1.5.0:update7:*:*:*:*:*:*
     *cpe:2.3:a:sun:jdk:1.5.0:update8:*:*:*:*:*:*
     *cpe:2.3:a:sun:jdk:1.5.0:update9:*:*:*:*:*:*
     *cpe:2.3:a:sun:jdk:*:update23:*:*:*:*:*:* versions up to (including) 1.5.0

								
						
Removed CPE Configuration
OR
     *cpe:2.3:a:sun:jdk:1.6.0:*:*:*:*:*:*:*
     *cpe:2.3:a:sun:jdk:1.6.0:update1:*:*:*:*:*:*
     *cpe:2.3:a:sun:jdk:1.6.0:update1_b06:*:*:*:*:*:*
     *cpe:2.3:a:sun:jdk:1.6.0:update2:*:*:*:*:*:*
     *cpe:2.3:a:sun:jdk:1.6.0:update_10:*:*:*:*:*:*
     *cpe:2.3:a:sun:jdk:1.6.0:update_11:*:*:*:*:*:*
     *cpe:2.3:a:sun:jdk:1.6.0:update_12:*:*:*:*:*:*
     *cpe:2.3:a:sun:jdk:1.6.0:update_13:*:*:*:*:*:*
     *cpe:2.3:a:sun:jdk:1.6.0:update_14:*:*:*:*:*:*
     *cpe:2.3:a:sun:jdk:1.6.0:update_15:*:*:*:*:*:*
     *cpe:2.3:a:sun:jdk:1.6.0:update_16:*:*:*:*:*:*
     *cpe:2.3:a:sun:jdk:1.6.0:update_17:*:*:*:*:*:*
     *cpe:2.3:a:sun:jdk:1.6.0:update_3:*:*:*:*:*:*
     *cpe:2.3:a:sun:jdk:1.6.0:update_4:*:*:*:*:*:*
     *cpe:2.3:a:sun:jdk:1.6.0:update_5:*:*:*:*:*:*
     *cpe:2.3:a:sun:jdk:1.6.0:update_6:*:*:*:*:*:*
     *cpe:2.3:a:sun:jdk:1.6.0:update_7:*:*:*:*:*:*
     *cpe:2.3:a:sun:jdk:*:update_18:*:*:*:*:*:* versions up to (including) 1.6.0

								
						
Removed CPE Configuration
OR
     *cpe:2.3:a:sun:jre:1.4.2:*:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.4.2_1:*:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.4.2_2:*:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.4.2_3:*:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.4.2_4:*:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.4.2_5:*:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.4.2_6:*:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.4.2_7:*:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.4.2_8:*:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.4.2_9:*:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.4.2_10:*:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.4.2_11:*:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.4.2_12:*:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.4.2_13:*:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.4.2_14:*:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.4.2_15:*:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.4.2_16:*:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.4.2_17:*:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.4.2_18:*:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.4.2_19:*:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.4.2_20:*:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.4.2_21:*:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.4.2_22:*:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.4.2_23:*:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.4.2_24:*:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:*:*:*:*:*:*:*:* versions up to (including) 1.4.2_25

								
						
Removed CPE Configuration
OR
     *cpe:2.3:a:sun:jre:1.5.0:*:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.5.0:update1:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.5.0:update10:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.5.0:update11:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.5.0:update12:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.5.0:update13:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.5.0:update14:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.5.0:update15:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.5.0:update16:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.5.0:update17:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.5.0:update18:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.5.0:update19:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.5.0:update2:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.5.0:update20:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.5.0:update21:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.5.0:update3:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.5.0:update4:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.5.0:update5:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.5.0:update6:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.5.0:update7:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.5.0:update8:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:1.5.0:update9:*:*:*:*:*:*
     *cpe:2.3:a:sun:jre:*:update23:*:*:*:*:*:* versions up to (including) 1.5.0

								
						
Removed CPE Configuration
OR
     *cpe:2.3:a:sun:sdk:1.4.2:*:*:*:*:*:*:*
     *cpe:2.3:a:sun:sdk:1.4.2_1:*:*:*:*:*:*:*
     *cpe:2.3:a:sun:sdk:1.4.2_02:*:*:*:*:*:*:*
     *cpe:2.3:a:sun:sdk:1.4.2_3:*:*:*:*:*:*:*
     *cpe:2.3:a:sun:sdk:1.4.2_4:*:*:*:*:*:*:*
     *cpe:2.3:a:sun:sdk:1.4.2_5:*:*:*:*:*:*:*
     *cpe:2.3:a:sun:sdk:1.4.2_6:*:*:*:*:*:*:*
     *cpe:2.3:a:sun:sdk:1.4.2_7:*:*:*:*:*:*:*
     *cpe:2.3:a:sun:sdk:1.4.2_8:*:*:*:*:*:*:*
     *cpe:2.3:a:sun:sdk:1.4.2_9:*:*:*:*:*:*:*
     *cpe:2.3:a:sun:sdk:1.4.2_10:*:*:*:*:*:*:*
     *cpe:2.3:a:sun:sdk:1.4.2_11:*:*:*:*:*:*:*
     *cpe:2.3:a:sun:sdk:1.4.2_12:*:*:*:*:*:*:*
     *cpe:2.3:a:sun:sdk:1.4.2_13:*:*:*:*:*:*:*
     *cpe:2.3:a:sun:sdk:1.4.2_14:*:*:*:*:*:*:*
     *cpe:2.3:a:sun:sdk:1.4.2_15:*:*:*:*:*:*:*
     *cpe:2.3:a:sun:sdk:1.4.2_16:*:*:*:*:*:*:*
     *cpe:2.3:a:sun:sdk:1.4.2_17:*:*:*:*:*:*:*
     *cpe:2.3:a:sun:sdk:1.4.2_18:*:*:*:*:*:*:*
     *cpe:2.3:a:sun:sdk:1.4.2_19:*:*:*:*:*:*:*
     *cpe:2.3:a:sun:sdk:1.4.2_20:*:*:*:*:*:*:*
     *cpe:2.3:a:sun:sdk:1.4.2_21:*:*:*:*:*:*:*
     *cpe:2.3:a:sun:sdk:1.4.2_22:*:*:*:*:*:*:*
     *cpe:2.3:a:sun:sdk:1.4.2_23:*:*:*:*:*:*:*
     *cpe:2.3:a:sun:sdk:1.4.2_24:*:*:*:*:*:*:*
     *cpe:2.3:a:sun:sdk:*:*:*:*:*:*:*:* versions up to (including) 1.4.2_25

								
						
Changed Reference Type
http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751 No Types Assigned
http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751 Broken Link
Changed Reference Type
http://lists.apple.com/archives/security-announce/2010//May/msg00001.html No Types Assigned
http://lists.apple.com/archives/security-announce/2010//May/msg00001.html Mailing List, Third Party Advisory
Changed Reference Type
http://lists.apple.com/archives/security-announce/2010//May/msg00002.html No Types Assigned
http://lists.apple.com/archives/security-announce/2010//May/msg00002.html Mailing List, Third Party Advisory
Changed Reference Type
http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00001.html No Types Assigned
http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00001.html Mailing List, Third Party Advisory
Changed Reference Type
http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html No Types Assigned
http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html Mailing List, Third Party Advisory
Changed Reference Type
http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html No Types Assigned
http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html Mailing List, Third Party Advisory
Changed Reference Type
http://marc.info/?l=bugtraq&m=127557596201693&w=2 No Types Assigned
http://marc.info/?l=bugtraq&m=127557596201693&w=2 Mailing List
Changed Reference Type
http://marc.info/?l=bugtraq&m=134254866602253&w=2 No Types Assigned
http://marc.info/?l=bugtraq&m=134254866602253&w=2 Mailing List
Changed Reference Type
http://secunia.com/advisories/39292 Vendor Advisory
http://secunia.com/advisories/39292 Broken Link, Vendor Advisory
Changed Reference Type
http://secunia.com/advisories/39317 Vendor Advisory
http://secunia.com/advisories/39317 Broken Link, Vendor Advisory
Changed Reference Type
http://secunia.com/advisories/39659 Vendor Advisory
http://secunia.com/advisories/39659 Broken Link, Vendor Advisory
Changed Reference Type
http://secunia.com/advisories/39819 Vendor Advisory
http://secunia.com/advisories/39819 Broken Link, Vendor Advisory
Changed Reference Type
http://secunia.com/advisories/40211 Vendor Advisory
http://secunia.com/advisories/40211 Broken Link, Vendor Advisory
Changed Reference Type
http://secunia.com/advisories/40545 Vendor Advisory
http://secunia.com/advisories/40545 Broken Link, Vendor Advisory
Changed Reference Type
http://secunia.com/advisories/43308 Vendor Advisory
http://secunia.com/advisories/43308 Broken Link, Vendor Advisory
Changed Reference Type
http://support.apple.com/kb/HT4170 No Types Assigned
http://support.apple.com/kb/HT4170 Release Notes, Third Party Advisory
Changed Reference Type
http://support.apple.com/kb/HT4171 No Types Assigned
http://support.apple.com/kb/HT4171 Release Notes, Third Party Advisory
Changed Reference Type
http://ubuntu.com/usn/usn-923-1 No Types Assigned
http://ubuntu.com/usn/usn-923-1 Third Party Advisory
Changed Reference Type
http://www.mandriva.com/security/advisories?name=MDVSA-2010:084 No Types Assigned
http://www.mandriva.com/security/advisories?name=MDVSA-2010:084 Broken Link
Changed Reference Type
http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html No Types Assigned
http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html Patch, Third Party Advisory
Changed Reference Type
http://www.oracle.com/technetwork/topics/security/javacpumar2010-083341.html No Types Assigned
http://www.oracle.com/technetwork/topics/security/javacpumar2010-083341.html Patch, Third Party Advisory
Changed Reference Type
http://www.redhat.com/support/errata/RHSA-2010-0337.html No Types Assigned
http://www.redhat.com/support/errata/RHSA-2010-0337.html Broken Link
Changed Reference Type
http://www.redhat.com/support/errata/RHSA-2010-0338.html No Types Assigned
http://www.redhat.com/support/errata/RHSA-2010-0338.html Broken Link
Changed Reference Type
http://www.redhat.com/support/errata/RHSA-2010-0339.html No Types Assigned
http://www.redhat.com/support/errata/RHSA-2010-0339.html Broken Link
Changed Reference Type
http://www.redhat.com/support/errata/RHSA-2010-0383.html No Types Assigned
http://www.redhat.com/support/errata/RHSA-2010-0383.html Broken Link
Changed Reference Type
http://www.redhat.com/support/errata/RHSA-2010-0471.html No Types Assigned
http://www.redhat.com/support/errata/RHSA-2010-0471.html Broken Link
Changed Reference Type
http://www.redhat.com/support/errata/RHSA-2010-0489.html No Types Assigned
http://www.redhat.com/support/errata/RHSA-2010-0489.html Broken Link
Changed Reference Type
http://www.securityfocus.com/archive/1/510528/100/0/threaded No Types Assigned
http://www.securityfocus.com/archive/1/510528/100/0/threaded Broken Link, Third Party Advisory, VDB Entry
Changed Reference Type
http://www.securityfocus.com/archive/1/516397/100/0/threaded No Types Assigned
http://www.securityfocus.com/archive/1/516397/100/0/threaded Broken Link, Third Party Advisory, VDB Entry
Changed Reference Type
http://www.securityfocus.com/bid/39065 No Types Assigned
http://www.securityfocus.com/bid/39065 Broken Link, Third Party Advisory, VDB Entry
Changed Reference Type
http://www.vmware.com/security/advisories/VMSA-2011-0003.html No Types Assigned
http://www.vmware.com/security/advisories/VMSA-2011-0003.html Third Party Advisory
Changed Reference Type
http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html No Types Assigned
http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html Release Notes
Changed Reference Type
http://www.vupen.com/english/advisories/2010/1107 No Types Assigned
http://www.vupen.com/english/advisories/2010/1107 Broken Link
Changed Reference Type
http://www.vupen.com/english/advisories/2010/1191 Vendor Advisory
http://www.vupen.com/english/advisories/2010/1191 Broken Link, Vendor Advisory
Changed Reference Type
http://www.vupen.com/english/advisories/2010/1454 Vendor Advisory
http://www.vupen.com/english/advisories/2010/1454 Broken Link, Vendor Advisory
Changed Reference Type
http://www.vupen.com/english/advisories/2010/1523 Vendor Advisory
http://www.vupen.com/english/advisories/2010/1523 Broken Link, Vendor Advisory
Changed Reference Type
http://www.vupen.com/english/advisories/2010/1793 Vendor Advisory
http://www.vupen.com/english/advisories/2010/1793 Broken Link, Vendor Advisory
Changed Reference Type
http://www.zerodayinitiative.com/advisories/ZDI-10-056 No Types Assigned
http://www.zerodayinitiative.com/advisories/ZDI-10-056 Third Party Advisory, VDB Entry
Changed Reference Type
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13971 No Types Assigned
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13971 Broken Link
Changed Reference Type
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9974 No Types Assigned
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9974 Broken Link