Page 19 of 94 results (0.009 seconds)

CVSS: 6.4EPSS: 0%CPEs: 12EXPL: 0

Unspecified vulnerability in Sun Java JDK and JRE 5.0 Update 3 and earlier, SDK and JRE 1.3.x through 1.3.1_16 and 1.4.x through 1.4.2_08 allows remote attackers to bypass Java sandbox security and obtain privileges via unspecified vectors involving the reflection APIs, aka the "first issue." • http://docs.info.apple.com/article.html?artnum=303658 http://secunia.com/advisories/18760 http://secunia.com/advisories/18884 http://securitytracker.com/id?1015596 http://sunsolve.sun.com/search/document.do?assetkey=1-26-102171-1 http://www.gentoo.org/security/en/glsa/glsa-200602-07.xml http://www.kb.cert.org/vuls/id/759996 http://www.vupen.com/english/advisories/2006/0467 http://www.vupen.com/english/advisories/2006/0828 http://www.vupen.com/english/advisories/ •

CVSS: 7.5EPSS: 0%CPEs: 17EXPL: 0

Java Runtime Environment (JRE) Bytecode Verifier allows remote attackers to escape the Java sandbox and execute commands via an applet containing an illegal cast operation, as seen in (1) Microsoft VM build 3802 and earlier as used in Internet Explorer 4.x and 5.x, (2) Netscape 6.2.1 and earlier, and possibly other implementations that use vulnerable versions of SDK or JDK, aka a variant of the "Virtual Machine Verifier" vulnerability. El verificador de bytecode del "Java Runtime Enviroment" (entorno de ejecución de java), permite que atacantes remotos se salten la "sandbox" (caja de arena) de Java y ejecuten comandos a través de un applet que tiene una conversión de tipo ilegal. Ésto se ha comprobado en (1) la máquina virtual de Microsoft (3802 y anteriores) que se usa en el MS Internet Explorer 4.x y 5.x, (2) Netscape 6.2.1 y anteriores y posiblmente en otras implementaciones que usan versiones vulnerables del SDK o JDK. Este vulnerabilidad es una variante de aquella conocida como vulnerabilidad en "Verificador de la Máquina Virtual". • http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/218 http://www.iss.net/security_center/static/8480.php http://www.securityfocus.com/bid/4313 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-013 •

CVSS: 5.0EPSS: 0%CPEs: 11EXPL: 0

Vulnerability in Java Runtime Environment (JRE) allows remote malicious web sites to hijack or sniff a web client's sessions, when an HTTP proxy is being used, via a Java applet that redirects the session to another server, as seen in (1) Netscape 6.0 through 6.1 and 4.79 and earlier, (2) Microsoft VM build 3802 and earlier as used in Internet Explorer 4.x and 5.x, and possibly other implementations that use vulnerable versions of SDK or JDK. Esta vulnerabilidad en el "Java Runtime Enviroment" (entorno de ejecución de Java, JRE), permite que sitios web maliciosos husmeen las sesiones de los clientes web, a través de un applet de Java que redirige la sesión a otros servidor. Esto se ha visto en (1)versiones de Netscape 6.0 hasta 6.1 y las anteriores a la 4.79, (2) Máquina Virtual de Microsoft (build 3802 y anteriores) usada en Internet Explorer 4.x y 5.x, y posiblemente otras implementaciones que usan versiones vulnerables de SDK y JDK. • http://marc.info/?l=bugtraq&m=101534535304228&w=2 http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/216 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-013 •

CVSS: 7.5EPSS: 1%CPEs: 24EXPL: 1

Java Runtime Environment (JRE) and SDK 1.2 through 1.3.0_04 allows untrusted applets to access the system clipboard. • http://cert.uni-stuttgart.de/archive/bugtraq/2001/10/msg00120.html http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/208&type=0&nav=sec.sba http://www.securityfocus.com/advisories/3617 http://www.securityfocus.com/bid/3441 https://exchange.xforce.ibmcloud.com/vulnerabilities/7333 •