2 results (0.003 seconds)

CVSS: 9.3EPSS: 1%CPEs: 5EXPL: 0

Multiple buffer overflows in Sun Java Wireless Toolkit (WTK) for CLDC 2.5.2 and earlier allow downloaded programs to execute arbitrary code via unknown vectors. Desbordamiento múltiple de búfer en Sun Java Wireless Toolkit (WTK) para CLDC 2.5.2 y versiones anteriores que permite descargar programas para ejecutar arbitrariamente código a través de vectores desconocidos. • http://secunia.com/advisories/33159 http://sunsolve.sun.com/search/document.do?assetkey=1-26-247566-1 http://sunsolve.sun.com/search/document.do?assetkey=1-77-1019851.1-1 http://www.securityfocus.com/bid/32862 http://www.securitytracker.com/id?1021414 http://www.vupen.com/english/advisories/2008/3439 https://exchange.xforce.ibmcloud.com/vulnerabilities/47376 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 10.0EPSS: 14%CPEs: 2EXPL: 0

Multiple unspecified vulnerabilities in Sun Java Platform Micro Edition (aka Java ME, J2ME, or mobile Java), as distributed in Sun Wireless Toolkit 2.5.2, allow remote attackers to execute arbitrary code via unknown vectors. NOTE: as of 20080807, the only disclosure is a vague pre-advisory with no actionable information. However, because it is from a company led by a well-known researcher, it is being assigned a CVE identifier for tracking purposes. Múltiples vulnerabilidades no especificadas en Sun Java Platform Micro Edition (también conocido como Java ME, J2ME, o mobile Java), como lo distribuido enSun Wireless Toolkit 2.5.2, permiten a atacantes remotos ejecutar código de su elección a través de vectores no especificados. NOTA: a fecha 07/08/2008, la única revelación es un vago preaviso sin información de uso inmediato. Sin embargo, dado que proviene de un investigador reputado, se le ha asignado un identificador CVE con propósito de seguimiento. • http://www.security-explorations.com/n2press.htm http://www.security-explorations.com/n2srp.htm http://www.security-explorations.com/n2vendors.htm http://www.security-explorations.com/report_toc.pdf http://www.securityfocus.com/archive/1/495224/100/0/threaded http://www.securityfocus.com/bid/30591 https://exchange.xforce.ibmcloud.com/vulnerabilities/44478 •