Page 83 of 416 results (0.005 seconds)

CVSS: 7.5EPSS: 7%CPEs: 29EXPL: 0

Unspecified vulnerability in Java Management Extensions (JMX) in Java JDK and JRE 5.0 Update 3, 1.4.2 and later, 1.3.1 and later allows remote attackers to escape the Java sandbox and access arbitrary files or execute arbitrary application via unknown attack vectors. • http://lists.apple.com/archives/security-announce/2005/Nov/msg00004.html http://secunia.com/advisories/17748 http://secunia.com/advisories/17847 http://secunia.com/advisories/18092 http://secunia.com/advisories/18503 http://securitytracker.com/id?1015281 http://sunsolve.sun.com/searchproxy/document.do?assetkey=1-26-102017-1 http://www-1.ibm.com/support/docview.wss?uid=swg21225628 http://www.kb.cert.org/vuls/id/931684 http://www.securityfocus.com/bid/15615 http://www. •

CVSS: 5.0EPSS: 0%CPEs: 10EXPL: 0

Sun Java JRE 1.1.x through 1.4.x writes temporary files with long filenames that become predictable on a file system that uses 8.3 style short names, which allows remote attackers to write arbitrary files to known locations and facilitates the exploitation of vulnerabilities in applications that rely on unpredictable file names. • http://secunia.com/advisories/11070 http://secunia.com/secunia_research/2004-7/advisory http://www.kb.cert.org/vuls/id/544392 https://exchange.xforce.ibmcloud.com/vulnerabilities/19285 •

CVSS: 5.0EPSS: 27%CPEs: 84EXPL: 0

readObject in (1) Java Runtime Environment (JRE) and (2) Software Development Kit (SDK) 1.4.0 through 1.4.2_05 allows remote attackers to cause a denial of service (JVM unresponsive) via crafted serialized data. • http://archives.neohapsis.com/archives/bugtraq/2005-04/0113.html http://secunia.com/advisories/13271 http://sunsolve.sun.com/searchproxy/document.do?assetkey=1-26-57707-1 https://exchange.xforce.ibmcloud.com/vulnerabilities/20027 •

CVSS: 9.3EPSS: 19%CPEs: 157EXPL: 1

The Sun Java Plugin capability in Java 2 Runtime Environment (JRE) 1.4.2_01, 1.4.2_04, and possibly earlier versions, does not properly restrict access between Javascript and Java applets during data transfer, which allows remote attackers to load unsafe classes and execute arbitrary code by using the reflection API to access private Java packages. • https://www.exploit-db.com/exploits/24763 http://jouko.iki.fi/adv/javaplugin.html http://lists.apple.com/archives/security-announce/2005/Feb/msg00000.html http://rpmfind.net/linux/RPM/suse/updates/9.3/i386/rpm/i586/java-1_4_2-sun-src-1.4.2.08-0.1.i586.html http://secunia.com/advisories/13271 http://secunia.com/advisories/29035 http://securityreason.com/securityalert/61 http://sunsolve.sun.com/search/document.do?assetkey=1-26-101523-1 http://sunsolve.sun.co • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 7.5EPSS: 0%CPEs: 3EXPL: 0

X509TrustManager in (1) Java Secure Socket Extension (JSSE) in SDK and JRE 1.4.0 through 1.4.0_01, (2) JSSE before 1.0.3, (3) Java Plug-in SDK and JRE 1.3.0 through 1.4.1, and (4) Java Web Start 1.0 through 1.2 incorrectly calls the isClientTrusted method when determining server trust, which results in improper validation of digital certificate and allows remote attackers to (1) falsely authenticate peers for SSL or (2) incorrectly validate signed JAR files. • http://archives.neohapsis.com/archives/bugtraq/2003-01/0334.html http://java.sun.com/products/jsse/CHANGES.txt http://secunia.com/advisories/7943 http://securitytracker.com/id?1006007 http://securitytracker.com/id?1007483 http://sunsolve.sun.com/search/document.do?assetkey=1-26-50081-1 http://www.securityfocus.com/bid/6682 http://www.securitytracker.com/id?1006001 http://www1.itrc.hp.com/service/cki/docDisplay.do? • CWE-295: Improper Certificate Validation •