Page 87 of 439 results (0.014 seconds)

CVSS: 5.0EPSS: 6%CPEs: 17EXPL: 1

Sun Java Runtime Environment (JRE) 1.x before 1.4.2_11 and 1.5.x before 1.5.0_06, and as used in multiple web browsers, allows remote attackers to cause a denial of service (application crash) via deeply nested object arrays, which are not properly handled by the garbage collector and trigger invalid memory accesses. • http://bugs.sun.com/bugdatabase/view_bug.do?bug_id=4396719 http://bugs.sun.com/bugdatabase/view_bug.do?bug_id=4944300 http://www.illegalaccess.org/exploit/ObjectStackOverflow.html http://www.securityfocus.com/archive/1/434705/100/0/threaded http://www.securityfocus.com/bid/18058 •

CVSS: 7.5EPSS: 2%CPEs: 60EXPL: 2

Sun Java Runtime Environment (JRE) and SDK 1.4.0_01 and earlier allows untrusted applets to access certain information within trusted applets, which allows attackers to bypass the restrictions of the Java security model. • https://www.exploit-db.com/exploits/22732 http://secunia.com/advisories/8958 http://securitytracker.com/id?1006935 http://sunsolve.sun.com/search/document.do?assetkey=1-26-55100-1 http://www.kb.cert.org/vuls/id/393292 http://www.securityfocus.com/bid/7824 https://exchange.xforce.ibmcloud.com/vulnerabilities/12189 •

CVSS: 4.6EPSS: 0%CPEs: 4EXPL: 1

Java Runtime Environment (JRE) and Software Development Kit (SDK) 1.4.2 through 1.4.2_02 allows local users to overwrite arbitrary files via a symlink attack on (1) unpack.log, as created by the unpack program, or (2) .mailcap1 and .mime.types1, as created by the RPM program. • http://www.securityfocus.com/archive/1/343038 http://www.securityfocus.com/bid/8937 https://exchange.xforce.ibmcloud.com/vulnerabilities/13570 •

CVSS: 7.5EPSS: 10%CPEs: 1EXPL: 1

The loadClass method of the sun.applet.AppletClassLoader class in the Java Virtual Machine (JVM) in Sun SDK and JRE 1.4.1_03 and earlier allows remote attackers to bypass sandbox restrictions and execute arbitrary code via a loaded class name that contains "/" (slash) instead of "." (dot) characters, which bypasses a call to the Security Manager's checkPackageAccess method. El método loadClass de la clase sun.applet.AppletClassLoader en la Máquina Virtual de Java (JVM) en Sun SDK y JRE 1.4.1_03 y anteriores permite a atacantes remotos saltarles las restricciones del cajón de arena de Java y ejecutar código mediante una clase cargada que contenga caractéres "/" (barra) en lugar de "." punto, lo que evita la llamada al método del Adminstrador de Seguridad checkPackageAccess. • https://www.exploit-db.com/exploits/23276 http://lsd-pl.net/code/JVM/jre.tar.gz http://marc.info/?l=bugtraq&m=106692334503819&w=2 http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/57221 http://sunsolve.sun.com/search/document.do?assetkey=1-66-200356-1 http://www.securityfocus.com/advisories/6028 http://www.securityfocus.com/archive/1/342580 http://www.securityfocus.com/archive/1/342583 http://www.securityfocus.com/bid/8879 •

CVSS: 5.0EPSS: 2%CPEs: 2EXPL: 3

java.security.AccessController in Sun Java Virtual Machine (JVM) in JRE 1.2.2 and 1.3.1 allows remote attackers to cause a denial of service (JVM crash) via a Java program that calls the doPrivileged method with a null argument. • https://www.exploit-db.com/exploits/21259 http://ohhara.sarang.net/security/jvmcrash.txt http://securitytracker.com/id?1003418 http://www.iss.net/security_center/static/8042.php http://www.securityfocus.com/bid/3992 •