Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
redhat icedtea 1.9.2 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2010-4351
The JNLP SecurityManager in IcedTea (IcedTea.so) 1.7 prior to 1.7.7, 1.8 prior to 1.8.4, and 1.9 prior to 1.9.4 for Java OpenJDK returns from the checkPermission method instead of throwing an exception in certain circumstances, which might allow context-dependent malicious users ...
Redhat Icedtea 1.7
Redhat Icedtea 1.7.1
Redhat Icedtea 1.7.2
Redhat Icedtea 1.7.3
Redhat Icedtea 1.7.4
Redhat Icedtea 1.7.5
Redhat Icedtea 1.7.6
Redhat Icedtea 1.8
Redhat Icedtea 1.8.1
Redhat Icedtea 1.8.2
Redhat Icedtea 1.8.3
Redhat Icedtea 1.9
Redhat Icedtea 1.9.1
Redhat Icedtea 1.9.2
Redhat Icedtea 1.9.3
NA
CVE-2011-0025
IcedTea 1.7 prior to 1.7.8, 1.8 prior to 1.8.5, and 1.9 prior to 1.9.5 does not properly verify signatures for JAR files that (1) are "partially signed" or (2) signed by multiple entities, which allows remote malicious users to trick users into executing code that appea...
Redhat Icedtea 1.9.3
Redhat Icedtea 1.8.1
Redhat Icedtea 1.9.4
Redhat Icedtea 1.7.7
Redhat Icedtea 1.7.2
Redhat Icedtea 1.8.3
Redhat Icedtea 1.8
Redhat Icedtea 1.7.3
Redhat Icedtea 1.7.5
Redhat Icedtea 1.8.4
Redhat Icedtea 1.7.4
Redhat Icedtea 1.7.6
Redhat Icedtea 1.8.2
Redhat Icedtea 1.7.1
Redhat Icedtea 1.9.2
Redhat Icedtea 1.9
Redhat Icedtea 1.9.1
Redhat Icedtea 1.7
NA
CVE-2010-3860
IcedTea 1.7.x prior to 1.7.6, 1.8.x prior to 1.8.3, and 1.9.x prior to 1.9.2, as based on OpenJDK 6, declares multiple sensitive variables as public, which allows remote malicious users to obtain sensitive information including (1) user.name, (2) user.home, and (3) java.home syst...
Redhat Icedtea 1.8
Redhat Icedtea 1.8.1
Redhat Icedtea 1.8.2
Redhat Icedtea 1.9
Redhat Icedtea
Redhat Icedtea 1.5
Redhat Icedtea 1.6
Redhat Icedtea 1.7
NA
CVE-2011-2514
The Java Network Launching Protocol (JNLP) implementation in IcedTea6 1.9.x prior to 1.9.9 and prior to 1.8.9, and IcedTea-Web 1.1.x prior to 1.1.1 and prior to 1.0.4, allows remote malicious users to trick victims into granting access to local files by modifying the content of t...
Redhat Icedtea-web
Redhat Icedtea-web 1.0.2
Redhat Icedtea-web 1.0.1
Redhat Icedtea-web 1.0
Redhat Icedtea-web 1.1
Redhat Icedtea6 1.9.5
Redhat Icedtea6 1.9.6
Redhat Icedtea6 1.9.7
Redhat Icedtea6 1.9.8
Redhat Icedtea6 1.8.4
Redhat Icedtea6 1.8.3
Redhat Icedtea6 1.8.2
Redhat Icedtea6 1.8.1
Redhat Icedtea6 1.9.2
Redhat Icedtea6 1.9.4
Redhat Icedtea6
Redhat Icedtea6 1.8.6
Redhat Icedtea6 1.9.1
Redhat Icedtea6 1.9.3
Redhat Icedtea6 1.8.7
Redhat Icedtea6 1.8.5
Redhat Icedtea6 1.8
NA
CVE-2011-2513
The Java Network Launching Protocol (JNLP) implementation in IcedTea6 1.9.x prior to 1.9.9 and prior to 1.8.9, and IcedTea-Web 1.1.x prior to 1.1.1 and prior to 1.0.4, allows remote malicious users to obtain the username and full path of the home and cache directories by accessin...
Redhat Icedtea-web 1.1
Redhat Icedtea-web
Redhat Icedtea-web 1.0.2
Redhat Icedtea-web 1.0.1
Redhat Icedtea-web 1.0
Redhat Icedtea6 1.8.5
Redhat Icedtea6 1.8.4
Redhat Icedtea6 1.8.3
Redhat Icedtea6 1.8.2
Redhat Icedtea6 1.9.4
Redhat Icedtea6 1.9.5
Redhat Icedtea6 1.9.6
Redhat Icedtea6 1.9.7
Redhat Icedtea6 1.9.1
Redhat Icedtea6 1.9.3
Redhat Icedtea6 1.9.8
Redhat Icedtea6 1.8.7
Redhat Icedtea6 1.8
Redhat Icedtea6 1.9.2
Redhat Icedtea6
Redhat Icedtea6 1.8.6
Redhat Icedtea6 1.8.1
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-7028
memory leak
log injection
CVE-2024-3400
CVE-2022-48695
CVE-2022-48675
CVE-2024-34487
CVE-2024-33792
spoof
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started