### [CVE-2010-4476](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4476) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description The Double.parseDouble method in Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, 5.0 Update 27 and earlier, and 1.4.2_29 and earlier, as used in OpenJDK, Apache, JBossweb, and other products, allows remote attackers to cause a denial of service via a crafted string that triggers an infinite loop of estimations during conversion to a double-precision binary floating-point number, as demonstrated using 2.2250738585072012e-308. ### POC #### Reference - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html - http://www.oracle.com/technetwork/topics/security/javacpufeb2011-304611.html - http://www.redhat.com/support/errata/RHSA-2011-0880.html #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/CVEDB/PoC-List - https://github.com/CVEDB/awesome-cve-repo - https://github.com/STaj-55/Cybersecurity_Incident_Response_Database - https://github.com/grzegorzblaszczyk/CVE-2010-4476-check