Page 80 of 408 results (0.025 seconds)

CVSS: 7.5EPSS: 2%CPEs: 29EXPL: 0

Unspecified vulnerability in Java Runtime Environment in Java JDK and JRE 5.0 Update 3 and earlier allows remote attackers to escape the Java sandbox and access arbitrary files or execute arbitrary applications via unknown attack vectors involving untrusted Java applets. • http://lists.apple.com/archives/security-announce/2005/Nov/msg00004.html http://secunia.com/advisories/17748 http://secunia.com/advisories/17847 http://secunia.com/advisories/18092 http://securitytracker.com/id?1015282 http://sunsolve.sun.com/searchproxy/document.do?assetkey=1-26-102050-1 http://www.kb.cert.org/vuls/id/355284 http://www.securityfocus.com/bid/15615 http://www.vupen.com/english/advisories/2005/2636 http://www.vupen.com/english/advisories/2005/2675 https: •

CVSS: 7.5EPSS: 4%CPEs: 122EXPL: 0

Multiple unspecified vulnerabilities in reflection APIs in Java SDK and JRE 1.4.2_08 and earlier and JDK and JRE 5.0 Update 3 and earlier allow remote attackers to escape the Java sandbox and access arbitrary files or execute arbitrary applications via unknown attack vectors, a different set of vulnerabilities than CVE-2005-3905. NOTE: this is associated with the "second and third issues" identified in SUNALERT:102003. • http://lists.apple.com/archives/security-announce/2005/Nov/msg00004.html http://secunia.com/advisories/17748 http://secunia.com/advisories/17847 http://secunia.com/advisories/18092 http://secunia.com/advisories/18435 http://secunia.com/advisories/18503 http://securitytracker.com/id?1015280 http://sunsolve.sun.com/searchproxy/document.do?assetkey=1-26-102003-1 http://www-1.ibm.com/support/docview.wss?uid=swg21225628 http://www.gentoo.org/security/en/glsa/glsa-200601-10.xml htt •

CVSS: 7.5EPSS: 4%CPEs: 122EXPL: 0

Unspecified vulnerability in reflection APIs in Java SDK and JRE 1.3.1_15 and earlier, 1.4.2_08 and earlier, and JDK and JRE 5.0 Update 3 and earlier allows remote attackers to escape the Java sandbox and access arbitrary files or execute arbitrary application via unknown attack vectors, a different vulnerability than CVE-2005-3906. NOTE: this is associated with the "first issue" identified in SUNALERT:102003. • http://lists.apple.com/archives/security-announce/2005/Nov/msg00004.html http://secunia.com/advisories/17748 http://secunia.com/advisories/17847 http://secunia.com/advisories/18092 http://secunia.com/advisories/18435 http://secunia.com/advisories/18503 http://securitytracker.com/id?1015280 http://sunsolve.sun.com/searchproxy/document.do?assetkey=1-26-102003-1 http://www-1.ibm.com/support/docview.wss?uid=swg21225628 http://www.gentoo.org/security/en/glsa/glsa-200601-10.xml htt •

CVSS: 5.0EPSS: 0%CPEs: 10EXPL: 0

Sun Java JRE 1.1.x through 1.4.x writes temporary files with long filenames that become predictable on a file system that uses 8.3 style short names, which allows remote attackers to write arbitrary files to known locations and facilitates the exploitation of vulnerabilities in applications that rely on unpredictable file names. • http://secunia.com/advisories/11070 http://secunia.com/secunia_research/2004-7/advisory http://www.kb.cert.org/vuls/id/544392 https://exchange.xforce.ibmcloud.com/vulnerabilities/19285 •

CVSS: 9.3EPSS: 19%CPEs: 157EXPL: 1

The Sun Java Plugin capability in Java 2 Runtime Environment (JRE) 1.4.2_01, 1.4.2_04, and possibly earlier versions, does not properly restrict access between Javascript and Java applets during data transfer, which allows remote attackers to load unsafe classes and execute arbitrary code by using the reflection API to access private Java packages. • https://www.exploit-db.com/exploits/24763 http://jouko.iki.fi/adv/javaplugin.html http://lists.apple.com/archives/security-announce/2005/Feb/msg00000.html http://rpmfind.net/linux/RPM/suse/updates/9.3/i386/rpm/i586/java-1_4_2-sun-src-1.4.2.08-0.1.i586.html http://secunia.com/advisories/13271 http://secunia.com/advisories/29035 http://securityreason.com/securityalert/61 http://sunsolve.sun.com/search/document.do?assetkey=1-26-101523-1 http://sunsolve.sun.co • CWE-264: Permissions, Privileges, and Access Controls •