{"id":"UBUNTU-CVE-2019-10648","details":"Robocode through 1.9.3.5 allows remote attackers to cause external service interaction (DNS), as demonstrated by a query for a unique subdomain name within an attacker-controlled DNS zone, because of a .openStream call within java.net.URL.","modified":"2025-10-24T04:47:36Z","published":"2019-03-30T13:29:00Z","upstream":["CVE-2019-10648"],"references":[{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2019-10648"},{"type":"REPORT","url":"https://github.com/robo-code/robocode/commit/836c84635e982e74f2f2771b2c8640c3a34221bd#diff-0296a8f9d4a509789f4dc4f052d9c36f"},{"type":"REPORT","url":"https://sourceforge.net/p/robocode/bugs/406/"},{"type":"REPORT","url":"https://www.cve.org/CVERecord?id=CVE-2019-10648"}],"affected":[{"package":{"name":"robocode","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/robocode@1.9.2.5-2?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["1.9.2.4-2","1.9.2.5-1","1.9.2.5-2"],"ecosystem_specific":{"binaries":[{"binary_version":"1.9.2.5-2","binary_name":"robocode"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-10648.json"}},{"package":{"name":"robocode","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/robocode@1.9.3.1-1?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["1.9.2.6-3","1.9.3.1-1"],"ecosystem_specific":{"binaries":[{"binary_version":"1.9.3.1-1","binary_name":"robocode"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-10648.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]}