Page 74 of 369 results (0.008 seconds)

CVSS: 7.5EPSS: 0%CPEs: 17EXPL: 0

Java Runtime Environment (JRE) Bytecode Verifier allows remote attackers to escape the Java sandbox and execute commands via an applet containing an illegal cast operation, as seen in (1) Microsoft VM build 3802 and earlier as used in Internet Explorer 4.x and 5.x, (2) Netscape 6.2.1 and earlier, and possibly other implementations that use vulnerable versions of SDK or JDK, aka a variant of the "Virtual Machine Verifier" vulnerability. El verificador de bytecode del "Java Runtime Enviroment" (entorno de ejecución de java), permite que atacantes remotos se salten la "sandbox" (caja de arena) de Java y ejecuten comandos a través de un applet que tiene una conversión de tipo ilegal. Ésto se ha comprobado en (1) la máquina virtual de Microsoft (3802 y anteriores) que se usa en el MS Internet Explorer 4.x y 5.x, (2) Netscape 6.2.1 y anteriores y posiblmente en otras implementaciones que usan versiones vulnerables del SDK o JDK. Este vulnerabilidad es una variante de aquella conocida como vulnerabilidad en "Verificador de la Máquina Virtual". • http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/218 http://www.iss.net/security_center/static/8480.php http://www.securityfocus.com/bid/4313 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-013 •

CVSS: 5.0EPSS: 0%CPEs: 11EXPL: 0

Vulnerability in Java Runtime Environment (JRE) allows remote malicious web sites to hijack or sniff a web client's sessions, when an HTTP proxy is being used, via a Java applet that redirects the session to another server, as seen in (1) Netscape 6.0 through 6.1 and 4.79 and earlier, (2) Microsoft VM build 3802 and earlier as used in Internet Explorer 4.x and 5.x, and possibly other implementations that use vulnerable versions of SDK or JDK. Esta vulnerabilidad en el "Java Runtime Enviroment" (entorno de ejecución de Java, JRE), permite que sitios web maliciosos husmeen las sesiones de los clientes web, a través de un applet de Java que redirige la sesión a otros servidor. Esto se ha visto en (1)versiones de Netscape 6.0 hasta 6.1 y las anteriores a la 4.79, (2) Máquina Virtual de Microsoft (build 3802 y anteriores) usada en Internet Explorer 4.x y 5.x, y posiblemente otras implementaciones que usan versiones vulnerables de SDK y JDK. • http://marc.info/?l=bugtraq&m=101534535304228&w=2 http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/216 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-013 •

CVSS: 7.5EPSS: 1%CPEs: 24EXPL: 1

Java Runtime Environment (JRE) and SDK 1.2 through 1.3.0_04 allows untrusted applets to access the system clipboard. • http://cert.uni-stuttgart.de/archive/bugtraq/2001/10/msg00120.html http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/208&type=0&nav=sec.sba http://www.securityfocus.com/advisories/3617 http://www.securityfocus.com/bid/3441 https://exchange.xforce.ibmcloud.com/vulnerabilities/7333 •

CVSS: 5.1EPSS: 0%CPEs: 4EXPL: 0

Java Runtime Environment in Java Development Kit (JDK) 1.2.2_05 and earlier can allow an untrusted Java class to call into a disallowed class, which could allow an attacker to escape the Java sandbox and conduct unauthorized activities. • http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/199&type=0&nav=sec.sba http://www.osvdb.org/7255 http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX0011-132 https://exchange.xforce.ibmcloud.com/vulnerabilities/5605 •