Page 41 of 205 results (0.018 seconds)

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 1

Java Plugin 1.4 for JRE 1.3 executes signed applets even if the certificate is expired, which could allow remote attackers to conduct unauthorized activities via an applet that has been signed by an expired certificate. • http://archives.neohapsis.com/archives/bugtraq/2001-08/0359.html http://www.iss.net/security_center/static/7048.php http://www.securityfocus.com/bid/3245 •

CVSS: 10.0EPSS: 0%CPEs: 4EXPL: 1

The administration module in Sun Java web server allows remote attackers to execute arbitrary commands by uploading Java code to the module and invoke the com.sun.server.http.pagecompile.jsp92.JspServlet by requesting a URL that begins with a /servlet/ tag. • http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/197&type=0&nav=sec.sba http://www.securityfocus.com/bid/1600 http://www.securityfocus.com/templates/advisory.html?id=2542 https://exchange.xforce.ibmcloud.com/vulnerabilities/5135 •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 1

The default configuration of the Sun Java web server 2.0 and earlier allows remote attackers to execute arbitrary commands by uploading Java code to the server via board.html, then directly calling the JSP compiler servlet. • http://archives.neohapsis.com/archives/bugtraq/2000-07/0163.html http://www.securityfocus.com/bid/1459 http://www.sun.com/software/jwebserver/faq/jwsca-2000-02.html •

CVSS: 7.5EPSS: 5%CPEs: 13EXPL: 0

The byte code verifier component of the Java Virtual Machine (JVM) allows remote execution through malicious web pages. • http://java.sun.com/pr/1999/03/pr990329-01.html http://marc.info/?l=bugtraq&m=92333596624452&w=2 http://www.securityfocus.com/bid/1939 •

CVSS: 7.5EPSS: 3%CPEs: 2EXPL: 0

The Java Applet Security Manager implementation in Netscape Navigator 2.0 and Java Developer's Kit 1.0 allows an applet to connect to arbitrary hosts. • https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0142 •