2010 Jeep Wrangler Unlimited Rubicon on 2040-cars
1502 Industrial Park Dr, Maysville, Kentucky, United States
Engine:3.8L V6 12V MPFI OHV
Transmission:4-Speed Automatic
VIN (Vehicle Identification Number): 1J4HA6H11AL190126
Stock Num: 5220A
Make: Jeep
Model: Wrangler Unlimited Rubicon
Year: 2010
Exterior Color: White
Interior Color: Dark Slate Gray / Medium Slate Gray
Options: Drive Type: 4WD
Number of Doors: 4 Doors
Mileage: 46121
1 OWNER NEW JEEP TRADE IN,RUBICON EDITION,HEATED LEATHER SEATS,NAVIGATION,ALLOY WHEELS,LOADED,REMAINING 5 YEAR 100000 MILE POWERTRAIN WARRANTY,EXTRA NICE
Jeep Wrangler for Sale
- 2014 jeep wrangler unlimited sport(US $32,900.00)
- 2014 jeep wrangler unlimited sport(US $31,724.00)
- 2014 jeep wrangler unlimited sport rhd
- 2014 jeep wrangler unlimited sport(US $32,339.00)
- 2014 jeep wrangler unlimited rubicon(US $36,365.00)
- 2010 jeep wrangler unlimited sport(US $24,880.00)
Auto Services in Kentucky
World Class Auto Glass ★★★★★
Valvoline Instant Oil Change ★★★★★
Renfro`s Collision ★★★★★
Raymond Stephens Garage ★★★★★
Quality Auto Care ★★★★★
Mike Albert Direct ★★★★★
Auto blog
Freak accident during Jeep demonstration turns fatal
Mon, 20 May 2013A 20-year-old woman was killed in Edmonton, Canada on Satuday, reports CTV News, in a freak accident resulting from a rollover during a Jeep demonstration. As part of a fundraising enthusiast event called "Jeeps Go Topless," the driver of one Jeep Wrangler drove up and onto the top of the tire of another.
CTV reports that the owner of the topmost Jeep then switched the vehicle off, posed for pictures and then dismounted from his vehicle. His movement off of the Jeep apparently caused it to tip over, crushing a woman who was on top of an adjacent vehicle. Edmonton police are currently investigating more fully what caused the parking lot accident to occur. Scroll below to watch the CTV News video report about this tragic incident.
Jeep Renegade and Fiat 500X finally on the way to dealers
Mon, Jun 1 2015After a brief pause, the Jeep Renegade and Fiat 500X are on their way to dealers again. While initially reported as a software bug, the issue had nothing to do with the models themselves. According to a statement from FCA US to Autoblog, the "vehicles were built with an atypical Vehicle Identification Number that may not be recognized as valid by some computer systems." That problem has now been fixed. FCA US held the compact crossovers back from dealers until the company could rectify the bug. If the CUVs had been delivered, there would have been difficulty registering the vehicles, according to Automotive News. Before discovering the situation, about 20 of these Renegades were sold to customers. FCA CEO Sergio Marchionne originally discussed the predicament in late May. "I'm having a very bad engineering day," he said. "It's a combination of attributes of that vehicle that is making my life horrible." While the boss predicted the problem would be fixed as late as mid-June, the company apparently got things working much quicker than that. Related Video: FCA US Statement A limited number of 2015 Jeep Renegade and 2016 Fiat 500X vehicles were built with an atypical Vehicle Identification Number (VIN) that may not be recognized as valid by some computer systems. This VIN issue has been resolved. FCA US has been working with governmental agencies, insurers and financial institutions with whom customers may interact to ensure successful registration, financing and insurance coverage. Renegade and 500X vehicles are being shipped and are in stock at dealerships for purchase. The VIN issue is entirely separate from the operation of the vehicle.
Jeep in St. Louis hacked from Pittsburgh
Tue, Jul 21 2015One of America's most popular vehicles contains a security flaw that allows hackers to remotely commandeer it from anywhere on the planet. Cyber-security researchers Chris Valasek and Charlie Miller say they've accessed critical vehicle controls on a 2014 Jeep Cherokee that allowed them to remotely control critical vehicle functions like braking, transmission function, and steering. Automakers have downplayed the possibility a car could be remotely compromised, but the significance of the findings detailed Tuesday could cause them to reevaluate the threats posed to hundreds of thousands of vehicles already on the road. A key finding – the pair needed no physical access to the Jeep to pull off the attack. Valasek and Miller accessed the controls via a security hole in the Sprint cellular connection to Chrysler's UConnect infotainment system. In the course of their research, Valasek sat in his Pittsburgh home and remotely manipulated Miller's Jeep as he drove along a highway outside St. Louis. If you know a car's IP address, they say, a hacker could control it from anywhere. "We didn't add anything, didn't touch it," Valasek told Autoblog. "A customer could drive one of these things off a lot, and they'd have no clue it had these open attack surfaces." Remotely, he disabled brakes, turned the radio volume up, engaged windshield wipers and tampered with the transmission. Further, they could conduct surveillance on the Jeep, measuring its speed and tracking its whereabouts. They conducted the experiments over multiple breaches. They made their findings public on the same day the National Highway Traffic Safety Administration, the federal agency in charge of vehicle safety, released its latest report on the readiness of government and automakers to fend off these sorts of cyber attacks. Later today, two US Senators are expected to introduce legislation that would help consumers better understand the potential risks of car hacking. In the early stages of their research, Valasek and Miller found a security flaw in the car's wi-fi that allowed them to remotely manipulate controls from a range of about three feet. But in recent months, they found another vulnerability in the Sprint cellular connection in the UConnect system. That was a key breakthrough. "Lo and behold, we found we could communicate with this thing using cellular, and then more research, and 'Holy cow,' we're using the Sprint network to communicate with these vehicles," Valasek said.