CVE-2006-0614

N/A Unknown
Published: February 09, 2006 Modified: April 16, 2026
View on NVD

Description

Unspecified vulnerability in Sun Java JDK and JRE 5.0 Update 3 and earlier, SDK and JRE 1.3.x through 1.3.1_16 and 1.4.x through 1.4.2_08 allows remote attackers to bypass Java sandbox security and obtain privileges via unspecified vectors involving the reflection APIs, aka the "first issue."

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://docs.info.apple.com/article.html?artnum=303658
Source: cve@mitre.org
Third Party Advisory
http://secunia.com/advisories/18760
Source: cve@mitre.org
Third Party Advisory
http://secunia.com/advisories/18884
Source: cve@mitre.org
Third Party Advisory
http://securitytracker.com/id?1015596
Source: cve@mitre.org
Third Party Advisory VDB Entry
http://www.gentoo.org/security/en/glsa/glsa-200602-07.xml
Source: cve@mitre.org
Third Party Advisory
http://www.kb.cert.org/vuls/id/759996
Source: cve@mitre.org
Third Party Advisory US Government Resource
http://www.vupen.com/english/advisories/2006/0467
Source: cve@mitre.org
Permissions Required Third Party Advisory
http://www.vupen.com/english/advisories/2006/0828
Source: cve@mitre.org
Permissions Required Third Party Advisory
http://www.vupen.com/english/advisories/2006/1398
Source: cve@mitre.org
Permissions Required Third Party Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/24561
Source: cve@mitre.org
Third Party Advisory VDB Entry
http://docs.info.apple.com/article.html?artnum=303658
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://secunia.com/advisories/18760
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://secunia.com/advisories/18884
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://securitytracker.com/id?1015596
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory VDB Entry
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102171-1
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link Patch
http://www.gentoo.org/security/en/glsa/glsa-200602-07.xml
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.kb.cert.org/vuls/id/759996
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory US Government Resource
http://www.vupen.com/english/advisories/2006/0467
Source: af854a3a-2127-422b-91ae-364da2661108
Permissions Required Third Party Advisory
http://www.vupen.com/english/advisories/2006/0828
Source: af854a3a-2127-422b-91ae-364da2661108
Permissions Required Third Party Advisory
http://www.vupen.com/english/advisories/2006/1398
Source: af854a3a-2127-422b-91ae-364da2661108
Permissions Required Third Party Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/24561
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory VDB Entry

22 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
7.0%
92th percentile
Exploitation Status
Not in CISA KEV

Affected Vendors

sun