CVE-2010-3563 – Sun Java Web Start BasicServiceImpl Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2010-3563
Oracle has not commented on claims from a reliable researcher that this is related to "how Web Start retrieves security policies," BasicServiceImpl, and forged policies that bypass sandbox restrictions. ... Oracle no ha comentado sobre las alegaciones de un investigador confiable de que esto está relacionado con "cómo Web Start recupera políticas de seguridad", BasicServiceImpl y políticas forjadas que eluden las restricciones sandbox. ... By abusing how Web Start retrieves security policies, an attacker can forge their own and force the removal of sandbox restrictions. • https://www.exploit-db.com/exploits/16495 http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c02616748 http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html http://marc.info/?l=bugtraq&m=134254866602253&w=2 http://secunia.com/advisories/44954 http://support.avaya.com/css/P8/documents/100114315 http://support.avaya.com/css/P8/documents/100123193 http://www.oracle.com/technetwork/topics/security/javacpuoct2010-176258.html http://w •
CVE-2010-2298
https://notcve.org/view.php?id=CVE-2010-2298
browser/renderer_host/database_dispatcher_host.cc in Google Chrome before 5.0.375.70 on Linux does not properly handle ViewHostMsg_DatabaseOpenFile messages in chroot-based sandboxing, which allows remote attackers to bypass intended sandbox restrictions via vectors involving fchdir and chdir calls. browser/renderer_host/database_dispatcher_host.cc en Google Chrome anterior a v5.0.375.70 sobre linux, no maneja adecuadamente los mensajes ViewHostMsg_DatabaseOpenFile en el "sandboxing" chroot-based, lo que permite a atacantes remotos evitar las restricciones establecidas para el sandbox a través de vectores que involucran a las llamadas fchdir y chdir. • http://code.google.com/p/chromium/issues/detail?id=43304 http://googlechromereleases.blogspot.com/2010/06/stable-channel-update.html http://secunia.com/advisories/40072 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14154 • CWE-20: Improper Input Validation •
CVE-2010-0186 – flash-plugin: unauthorized cross-domain requests (APSB10-06)
https://notcve.org/view.php?id=CVE-2010-0186
Cross-domain vulnerability in Adobe Flash Player before 10.0.45.2, Adobe AIR before 1.5.3.9130, and Adobe Reader and Acrobat 8.x before 8.2.1 and 9.x before 9.3.1 allows remote attackers to bypass intended sandbox restrictions and make cross-domain requests via unspecified vectors. Vulnerabilidad de tipo cross-domain en Adobe Flash Player anterior a versión 10.0.45.2, Adobe AIR anterior a 1.5.3.9130 y Adobe Reader y Acrobat 8.x anterior al 8.2.1 y 9.x anterior al 9.3.1 permite a los atacantes remotos omitir las restricciones de sandbox previstas y hacer peticiones de tipo cross-domain por medio de vectores no específicos. • http://lists.apple.com/archives/security-announce/2010//Jun/msg00001.html http://lists.opensuse.org/opensuse-security-announce/2010-03/msg00004.html http://secunia.com/advisories/38547 http://secunia.com/advisories/38639 http://secunia.com/advisories/38915 http://secunia.com/advisories/40220 http://secunia.com/advisories/43026 http://security.gentoo.org/glsa/glsa-201101-09.xml http://securitytracker.com/id?1023585 http://support.apple.com/kb/HT4188 http://www.adobe.com/sup •
CVE-2008-5339 – Sun Java Web Start and Applet Multiple Sandbox Bypass Vulnerabilities
https://notcve.org/view.php?id=CVE-2008-5339
These vulnerabilities allow remote attackers to bypass sandbox restrictions on vulnerable installations of Sun Java Web Start. ... If the codebase points to the local filesystem, any file is then readable by the malicious applet. The third vulnerability allows JNLP files to bypass socket restrictions. • http://lists.opensuse.org/opensuse-security-announce/2009-01/msg00009.html http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00004.html http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00000.html http://marc.info/?l=bugtraq&m=123678756409861&w=2 http://marc.info/?l=bugtraq&m=126583436323697&w=2 http://rhn.redhat.com/errata/RHSA-2008-1018.html http://rhn.redhat.com/errata/RHSA-2008-1025.html http://secunia.com/advisories/32991 http://secunia.com •
CVE-2008-4831
https://notcve.org/view.php?id=CVE-2008-4831
Unspecified vulnerability in Adobe ColdFusion 8 and 8.0.1 and ColdFusion MX 7.0.2 allows local users to bypass sandbox restrictions, and obtain sensitive information or possibly gain privileges, via unknown vectors. Vulnerabilidad no especificada en Adobe ColdFusion v8 y v8.0.1 y ColdFusion MX v7.0.2; permite a usuarios locales evitar las restricciones de la caja de arena (sandbox) y obtener información sensible o posiblemente ganar privilegios a través de vectores desconocidos. • http://osvdb.org/49709 http://secunia.com/advisories/32567 http://www.adobe.com/support/security/bulletins/apsb08-21.html http://www.securityfocus.com/bid/32130 http://www.securitytracker.com/id?1021145 http://www.vupen.com/english/advisories/2008/3032 • CWE-264: Permissions, Privileges, and Access Controls •