Page 16 of 78 results (0.013 seconds)

CVSS: 7.5EPSS: 0%CPEs: 17EXPL: 0

Java Runtime Environment (JRE) Bytecode Verifier allows remote attackers to escape the Java sandbox and execute commands via an applet containing an illegal cast operation, as seen in (1) Microsoft VM build 3802 and earlier as used in Internet Explorer 4.x and 5.x, (2) Netscape 6.2.1 and earlier, and possibly other implementations that use vulnerable versions of SDK or JDK, aka a variant of the "Virtual Machine Verifier" vulnerability. El verificador de bytecode del "Java Runtime Enviroment" (entorno de ejecución de java), permite que atacantes remotos se salten la "sandbox" (caja de arena) de Java y ejecuten comandos a través de un applet que tiene una conversión de tipo ilegal. Ésto se ha comprobado en (1) la máquina virtual de Microsoft (3802 y anteriores) que se usa en el MS Internet Explorer 4.x y 5.x, (2) Netscape 6.2.1 y anteriores y posiblmente en otras implementaciones que usan versiones vulnerables del SDK o JDK. Este vulnerabilidad es una variante de aquella conocida como vulnerabilidad en "Verificador de la Máquina Virtual". • http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/218 http://www.iss.net/security_center/static/8480.php http://www.securityfocus.com/bid/4313 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-013 •

CVSS: 5.0EPSS: 0%CPEs: 11EXPL: 0

Vulnerability in Java Runtime Environment (JRE) allows remote malicious web sites to hijack or sniff a web client's sessions, when an HTTP proxy is being used, via a Java applet that redirects the session to another server, as seen in (1) Netscape 6.0 through 6.1 and 4.79 and earlier, (2) Microsoft VM build 3802 and earlier as used in Internet Explorer 4.x and 5.x, and possibly other implementations that use vulnerable versions of SDK or JDK. Esta vulnerabilidad en el "Java Runtime Enviroment" (entorno de ejecución de Java, JRE), permite que sitios web maliciosos husmeen las sesiones de los clientes web, a través de un applet de Java que redirige la sesión a otros servidor. Esto se ha visto en (1)versiones de Netscape 6.0 hasta 6.1 y las anteriores a la 4.79, (2) Máquina Virtual de Microsoft (build 3802 y anteriores) usada en Internet Explorer 4.x y 5.x, y posiblemente otras implementaciones que usan versiones vulnerables de SDK y JDK. • http://marc.info/?l=bugtraq&m=101534535304228&w=2 http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/216 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-013 •

CVSS: 7.5EPSS: 1%CPEs: 24EXPL: 1

Java Runtime Environment (JRE) and SDK 1.2 through 1.3.0_04 allows untrusted applets to access the system clipboard. • http://cert.uni-stuttgart.de/archive/bugtraq/2001/10/msg00120.html http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/208&type=0&nav=sec.sba http://www.securityfocus.com/advisories/3617 http://www.securityfocus.com/bid/3441 https://exchange.xforce.ibmcloud.com/vulnerabilities/7333 •