Page 83 of 415 results (0.008 seconds)

CVSS: 7.5EPSS: 0%CPEs: 3EXPL: 0

X509TrustManager in (1) Java Secure Socket Extension (JSSE) in SDK and JRE 1.4.0 through 1.4.0_01, (2) JSSE before 1.0.3, (3) Java Plug-in SDK and JRE 1.3.0 through 1.4.1, and (4) Java Web Start 1.0 through 1.2 incorrectly calls the isClientTrusted method when determining server trust, which results in improper validation of digital certificate and allows remote attackers to (1) falsely authenticate peers for SSL or (2) incorrectly validate signed JAR files. • http://archives.neohapsis.com/archives/bugtraq/2003-01/0334.html http://java.sun.com/products/jsse/CHANGES.txt http://secunia.com/advisories/7943 http://securitytracker.com/id?1006007 http://securitytracker.com/id?1007483 http://sunsolve.sun.com/search/document.do?assetkey=1-26-50081-1 http://www.securityfocus.com/bid/6682 http://www.securitytracker.com/id?1006001 http://www1.itrc.hp.com/service/cki/docDisplay.do? • CWE-295: Improper Certificate Validation •

CVSS: 7.5EPSS: 2%CPEs: 60EXPL: 2

Sun Java Runtime Environment (JRE) and SDK 1.4.0_01 and earlier allows untrusted applets to access certain information within trusted applets, which allows attackers to bypass the restrictions of the Java security model. • https://www.exploit-db.com/exploits/22732 http://secunia.com/advisories/8958 http://securitytracker.com/id?1006935 http://sunsolve.sun.com/search/document.do?assetkey=1-26-55100-1 http://www.kb.cert.org/vuls/id/393292 http://www.securityfocus.com/bid/7824 https://exchange.xforce.ibmcloud.com/vulnerabilities/12189 •

CVSS: 7.5EPSS: 10%CPEs: 1EXPL: 1

The loadClass method of the sun.applet.AppletClassLoader class in the Java Virtual Machine (JVM) in Sun SDK and JRE 1.4.1_03 and earlier allows remote attackers to bypass sandbox restrictions and execute arbitrary code via a loaded class name that contains "/" (slash) instead of "." (dot) characters, which bypasses a call to the Security Manager's checkPackageAccess method. El método loadClass de la clase sun.applet.AppletClassLoader en la Máquina Virtual de Java (JVM) en Sun SDK y JRE 1.4.1_03 y anteriores permite a atacantes remotos saltarles las restricciones del cajón de arena de Java y ejecutar código mediante una clase cargada que contenga caractéres "/" (barra) en lugar de "." punto, lo que evita la llamada al método del Adminstrador de Seguridad checkPackageAccess. • https://www.exploit-db.com/exploits/23276 http://lsd-pl.net/code/JVM/jre.tar.gz http://marc.info/?l=bugtraq&m=106692334503819&w=2 http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/57221 http://sunsolve.sun.com/search/document.do?assetkey=1-66-200356-1 http://www.securityfocus.com/advisories/6028 http://www.securityfocus.com/archive/1/342580 http://www.securityfocus.com/archive/1/342583 http://www.securityfocus.com/bid/8879 •

CVSS: 5.0EPSS: 2%CPEs: 2EXPL: 3

java.security.AccessController in Sun Java Virtual Machine (JVM) in JRE 1.2.2 and 1.3.1 allows remote attackers to cause a denial of service (JVM crash) via a Java program that calls the doPrivileged method with a null argument. • https://www.exploit-db.com/exploits/21259 http://ohhara.sarang.net/security/jvmcrash.txt http://securitytracker.com/id?1003418 http://www.iss.net/security_center/static/8042.php http://www.securityfocus.com/bid/3992 •

CVSS: 7.5EPSS: 0%CPEs: 17EXPL: 0

Java Runtime Environment (JRE) Bytecode Verifier allows remote attackers to escape the Java sandbox and execute commands via an applet containing an illegal cast operation, as seen in (1) Microsoft VM build 3802 and earlier as used in Internet Explorer 4.x and 5.x, (2) Netscape 6.2.1 and earlier, and possibly other implementations that use vulnerable versions of SDK or JDK, aka a variant of the "Virtual Machine Verifier" vulnerability. El verificador de bytecode del "Java Runtime Enviroment" (entorno de ejecución de java), permite que atacantes remotos se salten la "sandbox" (caja de arena) de Java y ejecuten comandos a través de un applet que tiene una conversión de tipo ilegal. Ésto se ha comprobado en (1) la máquina virtual de Microsoft (3802 y anteriores) que se usa en el MS Internet Explorer 4.x y 5.x, (2) Netscape 6.2.1 y anteriores y posiblmente en otras implementaciones que usan versiones vulnerables del SDK o JDK. Este vulnerabilidad es una variante de aquella conocida como vulnerabilidad en "Verificador de la Máquina Virtual". • http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/218 http://www.iss.net/security_center/static/8480.php http://www.securityfocus.com/bid/4313 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-013 •