Page 42 of 418 results (0.008 seconds)

CVSS: 9.8EPSS: 6%CPEs: 29EXPL: 0

30 Nov 2005 — Unspecified vulnerability in Java Runtime Environment in Java JDK and JRE 5.0 Update 3 and earlier allows remote attackers to escape the Java sandbox and access arbitrary files or execute arbitrary applications via unknown attack vectors involving untrusted Java applets. • http://lists.apple.com/archives/security-announce/2005/Nov/msg00004.html •

CVSS: 7.5EPSS: 0%CPEs: 10EXPL: 0

19 Feb 2005 — Sun Java JRE 1.1.x through 1.4.x writes temporary files with long filenames that become predictable on a file system that uses 8.3 style short names, which allows remote attackers to write arbitrary files to known locations and facilitates the exploitation of vulnerabilities in applications that rely on unpredictable file names. • http://secunia.com/advisories/11070 •

CVSS: 7.5EPSS: 6%CPEs: 84EXPL: 0

31 Dec 2004 — readObject in (1) Java Runtime Environment (JRE) and (2) Software Development Kit (SDK) 1.4.0 through 1.4.2_05 allows remote attackers to cause a denial of service (JVM unresponsive) via crafted serialized data. • http://archives.neohapsis.com/archives/bugtraq/2005-04/0113.html •

CVSS: 9.8EPSS: 83%CPEs: 157EXPL: 1

24 Nov 2004 — The Sun Java Plugin capability in Java 2 Runtime Environment (JRE) 1.4.2_01, 1.4.2_04, and possibly earlier versions, does not properly restrict access between Javascript and Java applets during data transfer, which allows remote attackers to load unsafe classes and execute arbitrary code by using the reflection API to access private Java packages. • https://www.exploit-db.com/exploits/24763 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 9.1EPSS: 4%CPEs: 60EXPL: 2

31 Dec 2003 — Sun Java Runtime Environment (JRE) and SDK 1.4.0_01 and earlier allows untrusted applets to access certain information within trusted applets, which allows attackers to bypass the restrictions of the Java security model. • https://www.exploit-db.com/exploits/22732 •

CVSS: 9.1EPSS: 0%CPEs: 3EXPL: 0

31 Dec 2003 — X509TrustManager in (1) Java Secure Socket Extension (JSSE) in SDK and JRE 1.4.0 through 1.4.0_01, (2) JSSE before 1.0.3, (3) Java Plug-in SDK and JRE 1.3.0 through 1.4.1, and (4) Java Web Start 1.0 through 1.2 incorrectly calls the isClientTrusted method when determining server trust, which results in improper validation of digital certificate and allows remote attackers to (1) falsely authenticate peers for SSL or (2) incorrectly validate signed JAR files. • http://archives.neohapsis.com/archives/bugtraq/2003-01/0334.html • CWE-295: Improper Certificate Validation •

CVSS: 9.8EPSS: 10%CPEs: 1EXPL: 1

25 Oct 2003 — The loadClass method of the sun.applet.AppletClassLoader class in the Java Virtual Machine (JVM) in Sun SDK and JRE 1.4.1_03 and earlier allows remote attackers to bypass sandbox restrictions and execute arbitrary code via a loaded class name that contains "/" (slash) instead of "." (dot) characters, which bypasses a call to the Security Manager's checkPackageAccess method. El método loadClass de la clase sun.applet.AppletClassLoader en la Máquina Virtual de Java (JVM) en Sun SDK y JRE 1.4.1_03 y anteriores... • https://www.exploit-db.com/exploits/23276 •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 1

31 Aug 2001 — Java Plugin 1.4 for JRE 1.3 executes signed applets even if the certificate is expired, which could allow remote attackers to conduct unauthorized activities via an applet that has been signed by an expired certificate. • http://archives.neohapsis.com/archives/bugtraq/2001-08/0359.html •