CVE-2008-4910 – Sun Java Web Start 1.0/1.2 - Remote Command Execution
https://notcve.org/view.php?id=CVE-2008-4910
The BasicService in Sun Java Web Start allows remote attackers to execute arbitrary programs on a client machine via a file:// URL argument to the showDocument method. El BasicService en Sun Java Web Start permite a atacantes remotos ejecutar programas de su elección en una máquina cliente a través de un argumento file:// URL al método showDocument. • https://www.exploit-db.com/exploits/32529 http://securityreason.com/securityalert/4542 http://www.securityfocus.com/archive/1/497799/100/0/threaded http://www.securityfocus.com/archive/1/497972/100/0/threaded http://www.securityfocus.com/bid/31916 https://exchange.xforce.ibmcloud.com/vulnerabilities/46119 • CWE-20: Improper Input Validation •
CVE-2007-5019 – Sun jre1.6.0_X - isInstalled.dnsResolve Function Overflow
https://notcve.org/view.php?id=CVE-2007-5019
Buffer overflow in the Sun Java Web Start ActiveX control in Java Runtime Environment (JRE) 1.6.0_X allows remote attackers to have an unknown impact via a long argument to the dnsResolve (isInstalled.dnsResolve) method. Desbordamiento de búfer en el control ActiveX Sun Java Web Start del Java Runtime Environment (JRE) 1.6.0_X permite a atacantes remotos tener un impacto desconocido a través del uso de un argumento largo en el método dnsResolve (isInstalled.dnsResolve) • https://www.exploit-db.com/exploits/4432 http://osvdb.org/38297 http://www.securityfocus.com/bid/25734 https://exchange.xforce.ibmcloud.com/vulnerabilities/36682 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2006-4302
https://notcve.org/view.php?id=CVE-2006-4302
The Java Plug-in J2SE 1.3.0_02 through 5.0 Update 5, and Java Web Start 1.0 through 1.2 and J2SE 1.4.2 through 5.0 Update 5, allows remote attackers to exploit vulnerabilities by specifying a JRE version that contain vulnerabilities. Java Plug-in J2SE 1.3.0_02 hasta 5.0 Update 5, y Java Web Start 1.0 hasta 1.2 y J2SE 1.4.2 hasta 5.0 Update 5, permite a atacantes remotos explotar vulnerabilidades especificando una versión JRE que contiene vulnerabilidades. • http://secunia.com/advisories/21570 http://securitytracker.com/id?1016732 http://securitytracker.com/id?1016733 http://sunsolve.sun.com/search/document.do?assetkey=1-26-102557-1 http://support.avaya.com/elmodocs2/security/ASA-2006-205.htm http://www.osvdb.org/28109 http://www.securityfocus.com/archive/1/382413 http://www.securityfocus.com/bid/11757 http://www.securityfocus.com/bid/8879 http://www.vupen.com/english/advisories/2006/3354 • CWE-264: Permissions, Privileges, and Access Controls •
CVE-2003-1229
https://notcve.org/view.php?id=CVE-2003-1229
X509TrustManager in (1) Java Secure Socket Extension (JSSE) in SDK and JRE 1.4.0 through 1.4.0_01, (2) JSSE before 1.0.3, (3) Java Plug-in SDK and JRE 1.3.0 through 1.4.1, and (4) Java Web Start 1.0 through 1.2 incorrectly calls the isClientTrusted method when determining server trust, which results in improper validation of digital certificate and allows remote attackers to (1) falsely authenticate peers for SSL or (2) incorrectly validate signed JAR files. • http://archives.neohapsis.com/archives/bugtraq/2003-01/0334.html http://java.sun.com/products/jsse/CHANGES.txt http://secunia.com/advisories/7943 http://securitytracker.com/id?1006007 http://securitytracker.com/id?1007483 http://sunsolve.sun.com/search/document.do?assetkey=1-26-50081-1 http://www.securityfocus.com/bid/6682 http://www.securitytracker.com/id?1006001 http://www1.itrc.hp.com/service/cki/docDisplay.do? • CWE-295: Improper Certificate Validation •
CVE-2002-2005
https://notcve.org/view.php?id=CVE-2002-2005
Unknown vulnerability in Java web start 1.0.1_01, 1.0.1, 1.0 and 1.0.1.01 (HP-UX 11.x only) allows attackers to gain access to restricted resources via unknown attack vectors. • http://archives.neohapsis.com/archives/hp/2002-q1/0084.html http://cert.uni-stuttgart.de/archive/bugtraq/2002/03/msg00279.html http://www.iss.net/security_center/static/8483.php http://www.securityfocus.com/bid/4310 •