All the vulnerabilites related to sun - java_web_start
Vulnerability from fkie_nvd
Published
2003-12-31 05:00
Modified
2024-11-20 23:46
Severity ?
Summary
X509TrustManager in (1) Java Secure Socket Extension (JSSE) in SDK and JRE 1.4.0 through 1.4.0_01, (2) JSSE before 1.0.3, (3) Java Plug-in SDK and JRE 1.3.0 through 1.4.1, and (4) Java Web Start 1.0 through 1.2 incorrectly calls the isClientTrusted method when determining server trust, which results in improper validation of digital certificate and allows remote attackers to (1) falsely authenticate peers for SSL or (2) incorrectly validate signed JAR files.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:jre:*:*:*:*:*:*:*:*", "matchCriteriaId": "FF497F0F-1E5C-4A09-AFC6-E288A12AC0B5", "versionEndIncluding": "1.4.1", "versionStartIncluding": "1.3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_web_start:*:*:*:*:*:*:*:*", "matchCriteriaId": "0F06D4B3-926F-4D30-ACF7-A9B334E29B11", "versionEndIncluding": "1.2", "versionStartIncluding": "1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jsse:1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "432EB8F8-52C0-4FF3-97E5-92F670DFEE29", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "X509TrustManager in (1) Java Secure Socket Extension (JSSE) in SDK and JRE 1.4.0 through 1.4.0_01, (2) JSSE before 1.0.3, (3) Java Plug-in SDK and JRE 1.3.0 through 1.4.1, and (4) Java Web Start 1.0 through 1.2 incorrectly calls the isClientTrusted method when determining server trust, which results in improper validation of digital certificate and allows remote attackers to (1) falsely authenticate peers for SSL or (2) incorrectly validate signed JAR files." } ], "id": "CVE-2003-1229", "lastModified": "2024-11-20T23:46:39.550", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2003-12-31T05:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2003-01/0334.html" }, { "source": "cve@mitre.org", "tags": [ "Broken Link", "Vendor Advisory" ], "url": "http://java.sun.com/products/jsse/CHANGES.txt" }, { "source": "cve@mitre.org", "tags": [ "Broken Link", "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/7943" }, { "source": "cve@mitre.org", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://securitytracker.com/id?1006007" }, { "source": "cve@mitre.org", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://securitytracker.com/id?1007483" }, { "source": "cve@mitre.org", "tags": [ "Broken Link", "Patch", "Vendor Advisory" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-50081-1" }, { "source": "cve@mitre.org", "tags": [ "Broken Link", "Patch", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/6682" }, { "source": "cve@mitre.org", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id?1006001" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX0301-239" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/11182" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5883" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2003-01/0334.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Vendor Advisory" ], "url": "http://java.sun.com/products/jsse/CHANGES.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/7943" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://securitytracker.com/id?1006007" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://securitytracker.com/id?1007483" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Patch", "Vendor Advisory" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-50081-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Patch", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/6682" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id?1006001" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX0301-239" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/11182" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5883" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-295" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2008-11-04 00:57
Modified
2024-11-21 00:52
Severity ?
Summary
The BasicService in Sun Java Web Start allows remote attackers to execute arbitrary programs on a client machine via a file:// URL argument to the showDocument method.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
sun | java_web_start | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sun:java_web_start:*:*:*:*:*:*:*:*", "matchCriteriaId": "220CA362-5E47-4FCC-8645-E717C38AEE68", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The BasicService in Sun Java Web Start allows remote attackers to execute arbitrary programs on a client machine via a file:// URL argument to the showDocument method." }, { "lang": "es", "value": "El BasicService en Sun Java Web Start permite a atacantes remotos ejecutar programas de su elecci\u00f3n en una m\u00e1quina cliente a trav\u00e9s de un argumento file:// URL al m\u00e9todo showDocument." } ], "id": "CVE-2008-4910", "lastModified": "2024-11-21T00:52:49.207", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2008-11-04T00:57:30.900", "references": [ { "source": "cve@mitre.org", "url": "http://securityreason.com/securityalert/4542" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/497799/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/497972/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/31916" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46119" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityreason.com/securityalert/4542" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/497799/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/497972/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/31916" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46119" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" }, { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2002-12-31 05:00
Modified
2024-11-20 23:42
Severity ?
Summary
Unknown vulnerability in Java web start 1.0.1_01, 1.0.1, 1.0 and 1.0.1.01 (HP-UX 11.x only) allows attackers to gain access to restricted resources via unknown attack vectors.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
sun | java_web_start | 1.0 | |
sun | java_web_start | 1.0.1 | |
sun | java_web_start | 1.0.1_01 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sun:java_web_start:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "2C1E8E17-C426-424C-82D7-0D54D2B83687", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_web_start:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "2C248C52-F922-458D-9566-0AEA9FEC037A", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_web_start:1.0.1_01:*:*:*:*:*:*:*", "matchCriteriaId": "D5B745C9-7B4B-4ECD-AE4C-11C332DB08FA", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unknown vulnerability in Java web start 1.0.1_01, 1.0.1, 1.0 and 1.0.1.01 (HP-UX 11.x only) allows attackers to gain access to restricted resources via unknown attack vectors." } ], "id": "CVE-2002-2005", "lastModified": "2024-11-20T23:42:38.627", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": true, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2002-12-31T05:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://archives.neohapsis.com/archives/hp/2002-q1/0084.html" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://cert.uni-stuttgart.de/archive/bugtraq/2002/03/msg00279.html" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.iss.net/security_center/static/8483.php" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/4310" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://archives.neohapsis.com/archives/hp/2002-q1/0084.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://cert.uni-stuttgart.de/archive/bugtraq/2002/03/msg00279.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.iss.net/security_center/static/8483.php" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/4310" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2007-09-20 21:17
Modified
2024-11-21 00:36
Severity ?
Summary
Buffer overflow in the Sun Java Web Start ActiveX control in Java Runtime Environment (JRE) 1.6.0_X allows remote attackers to have an unknown impact via a long argument to the dnsResolve (isInstalled.dnsResolve) method.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sun:java_web_start:*:*:*:*:*:*:*:*", "matchCriteriaId": "220CA362-5E47-4FCC-8645-E717C38AEE68", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0_0:*:*:*:*:*:*:*", "matchCriteriaId": "7F9AEA13-26CF-489D-BE9C-3BF576153D59", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0_10:*:*:*:*:*:*:*", "matchCriteriaId": "23F1ED03-A83E-4F0E-A82A-D1A02290F594", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.0:*:standard:*:*:*:*:*", "matchCriteriaId": "7245F1F2-E015-4421-BB10-8466DD2225C7", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in the Sun Java Web Start ActiveX control in Java Runtime Environment (JRE) 1.6.0_X allows remote attackers to have an unknown impact via a long argument to the dnsResolve (isInstalled.dnsResolve) method." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer en el control ActiveX Sun Java Web Start del Java Runtime Environment (JRE) 1.6.0_X permite a atacantes remotos tener un impacto desconocido a trav\u00e9s del uso de un argumento largo en el m\u00e9todo dnsResolve (isInstalled.dnsResolve)" } ], "id": "CVE-2007-5019", "lastModified": "2024-11-21T00:36:57.480", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2007-09-20T21:17:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://osvdb.org/38297" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/25734" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36682" }, { "source": "cve@mitre.org", "url": "https://www.exploit-db.com/exploits/4432" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/38297" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/25734" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36682" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.exploit-db.com/exploits/4432" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2006-08-23 01:04
Modified
2024-11-21 00:15
Severity ?
Summary
The Java Plug-in J2SE 1.3.0_02 through 5.0 Update 5, and Java Web Start 1.0 through 1.2 and J2SE 1.4.2 through 5.0 Update 5, allows remote attackers to exploit vulnerabilities by specifying a JRE version that contain vulnerabilities.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
sun | j2se | 1.3.0_02 | |
sun | j2se | 1.4.2 | |
sun | j2se | 5.0 | |
sun | j2se | 5.0_update1 | |
sun | j2se | 5.0_update5 | |
sun | java_web_start | 1.0 | |
sun | java_web_start | 1.0.1 | |
sun | java_web_start | 1.0.1_01 | |
sun | java_web_start | 1.0.1_02 | |
sun | java_web_start | 1.2 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sun:j2se:1.3.0_02:*:sdk:*:*:*:*:*", "matchCriteriaId": "FD1870BA-062F-41D1-8038-F722BE368516", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:j2se:1.4.2:*:sdk:*:*:*:*:*", "matchCriteriaId": "E2D500E0-A80D-4C9E-94F0-6B59AFEB186A", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:j2se:5.0:*:sdk:*:*:*:*:*", "matchCriteriaId": "AB323619-76BA-4DCF-9613-4C963C235D09", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:j2se:5.0_update1:*:sdk:*:*:*:*:*", "matchCriteriaId": "90A293D3-9A69-4B33-82CE-22A7515819E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:j2se:5.0_update5:*:*:*:*:*:*:*", "matchCriteriaId": "872BDAB5-DB9C-4C18-89CE-296B69661677", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_web_start:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "2C1E8E17-C426-424C-82D7-0D54D2B83687", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_web_start:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "2C248C52-F922-458D-9566-0AEA9FEC037A", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_web_start:1.0.1_01:*:*:*:*:*:*:*", "matchCriteriaId": "D5B745C9-7B4B-4ECD-AE4C-11C332DB08FA", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_web_start:1.0.1_02:*:*:*:*:*:*:*", "matchCriteriaId": "2D1EEB86-E5BB-4034-B9FD-C869F6D069EF", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_web_start:1.2:*:*:*:*:*:*:*", "matchCriteriaId": "B53966B2-0CC5-4590-A7C7-82252F837A26", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Java Plug-in J2SE 1.3.0_02 through 5.0 Update 5, and Java Web Start 1.0 through 1.2 and J2SE 1.4.2 through 5.0 Update 5, allows remote attackers to exploit vulnerabilities by specifying a JRE version that contain vulnerabilities." }, { "lang": "es", "value": "Java Plug-in J2SE 1.3.0_02 hasta 5.0 Update 5, y Java Web Start 1.0 hasta 1.2 y J2SE 1.4.2 hasta 5.0 Update 5, permite a atacantes remotos explotar vulnerabilidades especificando una versi\u00f3n JRE que contiene vulnerabilidades." } ], "id": "CVE-2006-4302", "lastModified": "2024-11-21T00:15:37.347", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2006-08-23T01:04:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/21570" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1016732" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1016733" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102557-1" }, { "source": "cve@mitre.org", "url": "http://support.avaya.com/elmodocs2/security/ASA-2006-205.htm" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/28109" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/382413" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/11757" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/8879" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2006/3354" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/21570" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1016732" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1016733" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102557-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://support.avaya.com/elmodocs2/security/ASA-2006-205.htm" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/28109" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/382413" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/11757" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/8879" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2006/3354" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
cve-2007-5019
Vulnerability from cvelistv5
Published
2007-09-20 21:00
Modified
2024-08-07 15:17
Severity ?
EPSS score ?
Summary
Buffer overflow in the Sun Java Web Start ActiveX control in Java Runtime Environment (JRE) 1.6.0_X allows remote attackers to have an unknown impact via a long argument to the dnsResolve (isInstalled.dnsResolve) method.
References
▼ | URL | Tags |
---|---|---|
https://www.exploit-db.com/exploits/4432 | exploit, x_refsource_EXPLOIT-DB | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/36682 | vdb-entry, x_refsource_XF | |
http://www.securityfocus.com/bid/25734 | vdb-entry, x_refsource_BID | |
http://osvdb.org/38297 | vdb-entry, x_refsource_OSVDB |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T15:17:27.796Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "4432", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/4432" }, { "name": "sun-java-isinstalleddnsresolve-bo(36682)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36682" }, { "name": "25734", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/25734" }, { "name": "38297", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/38297" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-09-19T00:00:00", "descriptions": [ { "lang": "en", "value": "Buffer overflow in the Sun Java Web Start ActiveX control in Java Runtime Environment (JRE) 1.6.0_X allows remote attackers to have an unknown impact via a long argument to the dnsResolve (isInstalled.dnsResolve) method." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-28T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "4432", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/4432" }, { "name": "sun-java-isinstalleddnsresolve-bo(36682)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36682" }, { "name": "25734", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/25734" }, { "name": "38297", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/38297" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-5019", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in the Sun Java Web Start ActiveX control in Java Runtime Environment (JRE) 1.6.0_X allows remote attackers to have an unknown impact via a long argument to the dnsResolve (isInstalled.dnsResolve) method." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "4432", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/4432" }, { "name": "sun-java-isinstalleddnsresolve-bo(36682)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36682" }, { "name": "25734", "refsource": "BID", "url": "http://www.securityfocus.com/bid/25734" }, { "name": "38297", "refsource": "OSVDB", "url": "http://osvdb.org/38297" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-5019", "datePublished": "2007-09-20T21:00:00", "dateReserved": "2007-09-20T00:00:00", "dateUpdated": "2024-08-07T15:17:27.796Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2003-1229
Vulnerability from cvelistv5
Published
2005-08-17 04:00
Modified
2024-08-08 02:19
Severity ?
EPSS score ?
Summary
X509TrustManager in (1) Java Secure Socket Extension (JSSE) in SDK and JRE 1.4.0 through 1.4.0_01, (2) JSSE before 1.0.3, (3) Java Plug-in SDK and JRE 1.3.0 through 1.4.1, and (4) Java Web Start 1.0 through 1.2 incorrectly calls the isClientTrusted method when determining server trust, which results in improper validation of digital certificate and allows remote attackers to (1) falsely authenticate peers for SSL or (2) incorrectly validate signed JAR files.
References
▼ | URL | Tags |
---|---|---|
http://www.securitytracker.com/id?1006001 | vdb-entry, x_refsource_SECTRACK | |
http://securitytracker.com/id?1007483 | vdb-entry, x_refsource_SECTRACK | |
http://securitytracker.com/id?1006007 | vdb-entry, x_refsource_SECTRACK | |
http://java.sun.com/products/jsse/CHANGES.txt | x_refsource_CONFIRM | |
http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX0301-239 | vendor-advisory, x_refsource_HP | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/11182 | vdb-entry, x_refsource_XF | |
http://secunia.com/advisories/7943 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securityfocus.com/bid/6682 | vdb-entry, x_refsource_BID | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5883 | vdb-entry, signature, x_refsource_OVAL | |
http://sunsolve.sun.com/search/document.do?assetkey=1-26-50081-1 | vendor-advisory, x_refsource_SUNALERT | |
http://archives.neohapsis.com/archives/bugtraq/2003-01/0334.html | mailing-list, x_refsource_BUGTRAQ |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T02:19:45.929Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1006001", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1006001" }, { "name": "1007483", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1007483" }, { "name": "1006007", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1006007" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://java.sun.com/products/jsse/CHANGES.txt" }, { "name": "HPSBUX0301-239", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX0301-239" }, { "name": "sun-java-improper-validation(11182)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/11182" }, { "name": "7943", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/7943" }, { "name": "6682", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/6682" }, { "name": "oval:org.mitre.oval:def:5883", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5883" }, { "name": "50081", "tags": [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-50081-1" }, { "name": "20030128 Incorrect Certificate Validation in Java Secure Socket Extension", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2003-01/0334.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2003-01-23T00:00:00", "descriptions": [ { "lang": "en", "value": "X509TrustManager in (1) Java Secure Socket Extension (JSSE) in SDK and JRE 1.4.0 through 1.4.0_01, (2) JSSE before 1.0.3, (3) Java Plug-in SDK and JRE 1.3.0 through 1.4.1, and (4) Java Web Start 1.0 through 1.2 incorrectly calls the isClientTrusted method when determining server trust, which results in improper validation of digital certificate and allows remote attackers to (1) falsely authenticate peers for SSL or (2) incorrectly validate signed JAR files." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-10-10T00:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "1006001", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1006001" }, { "name": "1007483", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1007483" }, { "name": "1006007", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1006007" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://java.sun.com/products/jsse/CHANGES.txt" }, { "name": "HPSBUX0301-239", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX0301-239" }, { "name": "sun-java-improper-validation(11182)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/11182" }, { "name": "7943", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/7943" }, { "name": "6682", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/6682" }, { "name": "oval:org.mitre.oval:def:5883", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5883" }, { "name": "50081", "tags": [ "vendor-advisory", "x_refsource_SUNALERT" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-50081-1" }, { "name": "20030128 Incorrect Certificate Validation in Java Secure Socket Extension", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2003-01/0334.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2003-1229", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "X509TrustManager in (1) Java Secure Socket Extension (JSSE) in SDK and JRE 1.4.0 through 1.4.0_01, (2) JSSE before 1.0.3, (3) Java Plug-in SDK and JRE 1.3.0 through 1.4.1, and (4) Java Web Start 1.0 through 1.2 incorrectly calls the isClientTrusted method when determining server trust, which results in improper validation of digital certificate and allows remote attackers to (1) falsely authenticate peers for SSL or (2) incorrectly validate signed JAR files." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1006001", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1006001" }, { "name": "1007483", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1007483" }, { "name": "1006007", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1006007" }, { "name": "http://java.sun.com/products/jsse/CHANGES.txt", "refsource": "CONFIRM", "url": "http://java.sun.com/products/jsse/CHANGES.txt" }, { "name": "HPSBUX0301-239", "refsource": "HP", "url": "http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX0301-239" }, { "name": "sun-java-improper-validation(11182)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/11182" }, { "name": "7943", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/7943" }, { "name": "6682", "refsource": "BID", "url": "http://www.securityfocus.com/bid/6682" }, { "name": "oval:org.mitre.oval:def:5883", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5883" }, { "name": "50081", "refsource": "SUNALERT", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-50081-1" }, { "name": "20030128 Incorrect Certificate Validation in Java Secure Socket Extension", "refsource": "BUGTRAQ", "url": "http://archives.neohapsis.com/archives/bugtraq/2003-01/0334.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2003-1229", "datePublished": "2005-08-17T04:00:00", "dateReserved": "2005-08-17T00:00:00", "dateUpdated": "2024-08-08T02:19:45.929Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2002-2005
Vulnerability from cvelistv5
Published
2005-07-14 04:00
Modified
2024-08-08 03:51
Severity ?
EPSS score ?
Summary
Unknown vulnerability in Java web start 1.0.1_01, 1.0.1, 1.0 and 1.0.1.01 (HP-UX 11.x only) allows attackers to gain access to restricted resources via unknown attack vectors.
References
▼ | URL | Tags |
---|---|---|
http://archives.neohapsis.com/archives/hp/2002-q1/0084.html | vendor-advisory, x_refsource_HP | |
http://www.securityfocus.com/bid/4310 | vdb-entry, x_refsource_BID | |
http://cert.uni-stuttgart.de/archive/bugtraq/2002/03/msg00279.html | vendor-advisory, x_refsource_SUN | |
http://www.iss.net/security_center/static/8483.php | vdb-entry, x_refsource_XF |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T03:51:16.518Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "HPSBUX0203-188", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/hp/2002-q1/0084.html" }, { "name": "4310", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/4310" }, { "name": "00217", "tags": [ "vendor-advisory", "x_refsource_SUN", "x_transferred" ], "url": "http://cert.uni-stuttgart.de/archive/bugtraq/2002/03/msg00279.html" }, { "name": "java-webstart-access-resources(8483)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "http://www.iss.net/security_center/static/8483.php" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2002-03-18T00:00:00", "descriptions": [ { "lang": "en", "value": "Unknown vulnerability in Java web start 1.0.1_01, 1.0.1, 1.0 and 1.0.1.01 (HP-UX 11.x only) allows attackers to gain access to restricted resources via unknown attack vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-02-15T15:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "HPSBUX0203-188", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://archives.neohapsis.com/archives/hp/2002-q1/0084.html" }, { "name": "4310", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/4310" }, { "name": "00217", "tags": [ "vendor-advisory", "x_refsource_SUN" ], "url": "http://cert.uni-stuttgart.de/archive/bugtraq/2002/03/msg00279.html" }, { "name": "java-webstart-access-resources(8483)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "http://www.iss.net/security_center/static/8483.php" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2002-2005", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unknown vulnerability in Java web start 1.0.1_01, 1.0.1, 1.0 and 1.0.1.01 (HP-UX 11.x only) allows attackers to gain access to restricted resources via unknown attack vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "HPSBUX0203-188", "refsource": "HP", "url": "http://archives.neohapsis.com/archives/hp/2002-q1/0084.html" }, { "name": "4310", "refsource": "BID", "url": "http://www.securityfocus.com/bid/4310" }, { "name": "00217", "refsource": "SUN", "url": "http://cert.uni-stuttgart.de/archive/bugtraq/2002/03/msg00279.html" }, { "name": "java-webstart-access-resources(8483)", "refsource": "XF", "url": "http://www.iss.net/security_center/static/8483.php" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2002-2005", "datePublished": "2005-07-14T04:00:00", "dateReserved": "2005-07-14T00:00:00", "dateUpdated": "2024-08-08T03:51:16.518Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2008-4910
Vulnerability from cvelistv5
Published
2008-11-04 01:00
Modified
2024-08-07 10:31
Severity ?
EPSS score ?
Summary
The BasicService in Sun Java Web Start allows remote attackers to execute arbitrary programs on a client machine via a file:// URL argument to the showDocument method.
References
▼ | URL | Tags |
---|---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/46119 | vdb-entry, x_refsource_XF | |
http://www.securityfocus.com/bid/31916 | vdb-entry, x_refsource_BID | |
http://www.securityfocus.com/archive/1/497799/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://www.securityfocus.com/archive/1/497972/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://securityreason.com/securityalert/4542 | third-party-advisory, x_refsource_SREASON |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T10:31:28.251Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "sun-jws-showdocument-command-execution(46119)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46119" }, { "name": "31916", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/31916" }, { "name": "20081025 Java Web start vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/497799/100/0/threaded" }, { "name": "20081031 Re: Java Web start vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/497972/100/0/threaded" }, { "name": "4542", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/4542" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-10-25T00:00:00", "descriptions": [ { "lang": "en", "value": "The BasicService in Sun Java Web Start allows remote attackers to execute arbitrary programs on a client machine via a file:// URL argument to the showDocument method." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-11T19:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "sun-jws-showdocument-command-execution(46119)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46119" }, { "name": "31916", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/31916" }, { "name": "20081025 Java Web start vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/497799/100/0/threaded" }, { "name": "20081031 Re: Java Web start vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/497972/100/0/threaded" }, { "name": "4542", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/4542" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-4910", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The BasicService in Sun Java Web Start allows remote attackers to execute arbitrary programs on a client machine via a file:// URL argument to the showDocument method." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "sun-jws-showdocument-command-execution(46119)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46119" }, { "name": "31916", "refsource": "BID", "url": "http://www.securityfocus.com/bid/31916" }, { "name": "20081025 Java Web start vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/497799/100/0/threaded" }, { "name": "20081031 Re: Java Web start vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/497972/100/0/threaded" }, { "name": "4542", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/4542" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2008-4910", "datePublished": "2008-11-04T01:00:00", "dateReserved": "2008-11-03T00:00:00", "dateUpdated": "2024-08-07T10:31:28.251Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2006-4302
Vulnerability from cvelistv5
Published
2006-08-23 01:00
Modified
2024-08-07 19:06
Severity ?
EPSS score ?
Summary
The Java Plug-in J2SE 1.3.0_02 through 5.0 Update 5, and Java Web Start 1.0 through 1.2 and J2SE 1.4.2 through 5.0 Update 5, allows remote attackers to exploit vulnerabilities by specifying a JRE version that contain vulnerabilities.
References
▼ | URL | Tags |
---|---|---|
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102557-1 | vendor-advisory, x_refsource_SUNALERT | |
http://www.securityfocus.com/bid/8879 | vdb-entry, x_refsource_BID | |
http://support.avaya.com/elmodocs2/security/ASA-2006-205.htm | x_refsource_CONFIRM | |
http://www.osvdb.org/28109 | vdb-entry, x_refsource_OSVDB | |
http://www.securityfocus.com/archive/1/382413 | mailing-list, x_refsource_BUGTRAQ | |
http://securitytracker.com/id?1016732 | vdb-entry, x_refsource_SECTRACK | |
http://securitytracker.com/id?1016733 | vdb-entry, x_refsource_SECTRACK | |
http://www.securityfocus.com/bid/11757 | vdb-entry, x_refsource_BID | |
http://www.vupen.com/english/advisories/2006/3354 | vdb-entry, x_refsource_VUPEN | |
http://secunia.com/advisories/21570 | third-party-advisory, x_refsource_SECUNIA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T19:06:06.602Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "102557", "tags": [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102557-1" }, { "name": "8879", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/8879" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.avaya.com/elmodocs2/security/ASA-2006-205.htm" }, { "name": "28109", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/28109" }, { "name": "20041126 Java version downgrading proof-of-concept", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/382413" }, { "name": "1016732", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1016732" }, { "name": "1016733", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1016733" }, { "name": "11757", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/11757" }, { "name": "ADV-2006-3354", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/3354" }, { "name": "21570", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/21570" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2006-08-21T00:00:00", "descriptions": [ { "lang": "en", "value": "The Java Plug-in J2SE 1.3.0_02 through 5.0 Update 5, and Java Web Start 1.0 through 1.2 and J2SE 1.4.2 through 5.0 Update 5, allows remote attackers to exploit vulnerabilities by specifying a JRE version that contain vulnerabilities." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2006-08-29T09:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "102557", "tags": [ "vendor-advisory", "x_refsource_SUNALERT" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102557-1" }, { "name": "8879", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/8879" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.avaya.com/elmodocs2/security/ASA-2006-205.htm" }, { "name": "28109", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/28109" }, { "name": "20041126 Java version downgrading proof-of-concept", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/382413" }, { "name": "1016732", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1016732" }, { "name": "1016733", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1016733" }, { "name": "11757", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/11757" }, { "name": "ADV-2006-3354", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/3354" }, { "name": "21570", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/21570" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-4302", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Java Plug-in J2SE 1.3.0_02 through 5.0 Update 5, and Java Web Start 1.0 through 1.2 and J2SE 1.4.2 through 5.0 Update 5, allows remote attackers to exploit vulnerabilities by specifying a JRE version that contain vulnerabilities." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "102557", "refsource": "SUNALERT", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102557-1" }, { "name": "8879", "refsource": "BID", "url": "http://www.securityfocus.com/bid/8879" }, { "name": "http://support.avaya.com/elmodocs2/security/ASA-2006-205.htm", "refsource": "CONFIRM", "url": "http://support.avaya.com/elmodocs2/security/ASA-2006-205.htm" }, { "name": "28109", "refsource": "OSVDB", "url": "http://www.osvdb.org/28109" }, { "name": "20041126 Java version downgrading proof-of-concept", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/382413" }, { "name": "1016732", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1016732" }, { "name": "1016733", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1016733" }, { "name": "11757", "refsource": "BID", "url": "http://www.securityfocus.com/bid/11757" }, { "name": "ADV-2006-3354", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2006/3354" }, { "name": "21570", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/21570" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2006-4302", "datePublished": "2006-08-23T01:00:00", "dateReserved": "2006-08-22T00:00:00", "dateUpdated": "2024-08-07T19:06:06.602Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }