4 results (0.004 seconds)

CVSS: 5.0EPSS: 0%CPEs: 2EXPL: 0

The Java Plug-in 1.4.2_03 and 1.4.2_04 controls, and the 1.4.2_03 and 1.4.2_04 <applet> redirector controls, allow remote attackers to cause a denial of service (Internet Explorer crash) by creating a COM object of the class associated with the control's CLSID, which is not intended for use within Internet Explorer. • http://www.securityfocus.com/archive/1/391803 • CWE-16: Configuration •

CVSS: 6.4EPSS: 0%CPEs: 4EXPL: 3

Sun Java Plug-In 1.4 through 1.4.2_02 allows remote attackers to repeatedly access the floppy drive via the createXmlDocument method in the org.apache.crimson.tree.XmlDocument class, which violates the Java security model. • https://www.exploit-db.com/exploits/23270 http://www.securityfocus.com/archive/1/341943 http://www.securityfocus.com/bid/8867 •

CVSS: 6.8EPSS: 0%CPEs: 1EXPL: 3

The org.apache.xalan.processor.XSLProcessorVersion class in Java Plug-in 1.4.2_01 allows signed and unsigned applets to share variables, which violates the Java security model and could allow remote attackers to read or write data belonging to a signed applet. • https://www.exploit-db.com/exploits/23265 http://www.securityfocus.com/archive/1/341815 http://www.securityfocus.com/bid/8857 •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 1

Java Plugin 1.4 for JRE 1.3 executes signed applets even if the certificate is expired, which could allow remote attackers to conduct unauthorized activities via an applet that has been signed by an expired certificate. • http://archives.neohapsis.com/archives/bugtraq/2001-08/0359.html http://www.iss.net/security_center/static/7048.php http://www.securityfocus.com/bid/3245 •