Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
redhat icedtea-web 1.0 vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv2
CVE-2012-3423
The IcedTea-Web plugin prior to 1.2.1 does not properly handle NPVariant NPStrings without NUL terminators, which allows remote malicious users to cause a denial of service (crash), obtain sensitive information from memory, or execute arbitrary code via a crafted Java applet.
Redhat Icedtea-web
Redhat Icedtea-web 1.1
Redhat Icedtea-web 1.0
6.8
CVSSv2
CVE-2012-3422
The getFirstInTableInstance function in the IcedTea-Web plugin prior to 1.2.1 returns an uninitialized pointer when the instance_to_id_map hash is empty, which allows remote malicious users to cause a denial of service (crash) and possibly execute arbitrary code via a crafted web...
Redhat Icedtea-web
Redhat Icedtea-web 1.1
Redhat Icedtea-web 1.0
4.3
CVSSv2
CVE-2011-3377
The web browser plug-in in IcedTea-Web 1.0.x prior to 1.0.6 and 1.1.x prior to 1.1.4 allows remote malicious users to bypass the Same Origin Policy (SOP) and execute arbitrary script or establish network connections to unintended hosts via an applet whose origin has the same seco...
Redhat Icedtea-web 1.1
Redhat Icedtea-web 1.1.1
Redhat Icedtea-web 1.1.2
Redhat Icedtea-web 1.1.3
Redhat Icedtea-web 1.0
Redhat Icedtea-web 1.0.5
Redhat Icedtea-web 1.0.2
Redhat Icedtea-web 1.0.4
Redhat Icedtea-web 1.0.1
Redhat Icedtea-web 1.0.3
Canonical Ubuntu Linux 10.04
Canonical Ubuntu Linux 10.10
Canonical Ubuntu Linux 11.04
Opensuse Opensuse 12.1
Canonical Ubuntu Linux 11.10
7.5
CVSSv2
CVE-2011-0706
The JNLPClassLoader class in IcedTea-Web prior to 1.0.1, as used in OpenJDK Runtime Environment 1.6.0, allows remote malicious users to gain privileges via unknown vectors related to multiple signers and the assignment of "an inappropriate security descriptor."
Redhat Icedtea-web 1.0
Redhat Icedtea-web 1.0.1
Sun Jdk 1.6.0
5
CVSSv2
CVE-2011-2513
The Java Network Launching Protocol (JNLP) implementation in IcedTea6 1.9.x prior to 1.9.9 and prior to 1.8.9, and IcedTea-Web 1.1.x prior to 1.1.1 and prior to 1.0.4, allows remote malicious users to obtain the username and full path of the home and cache directories by accessin...
Redhat Icedtea-web 1.1
Redhat Icedtea-web
Redhat Icedtea-web 1.0.2
Redhat Icedtea-web 1.0.1
Redhat Icedtea-web 1.0
Redhat Icedtea6 1.8.5
Redhat Icedtea6 1.8.4
Redhat Icedtea6 1.8.3
Redhat Icedtea6 1.8.2
Redhat Icedtea6 1.9.4
Redhat Icedtea6 1.9.5
Redhat Icedtea6 1.9.6
Redhat Icedtea6 1.9.7
Redhat Icedtea6 1.9.1
Redhat Icedtea6 1.9.3
Redhat Icedtea6 1.9.8
Redhat Icedtea6 1.8.7
Redhat Icedtea6 1.8
Redhat Icedtea6 1.9.2
Redhat Icedtea6
Redhat Icedtea6 1.8.6
Redhat Icedtea6 1.8.1
6.8
CVSSv2
CVE-2011-2514
The Java Network Launching Protocol (JNLP) implementation in IcedTea6 1.9.x prior to 1.9.9 and prior to 1.8.9, and IcedTea-Web 1.1.x prior to 1.1.1 and prior to 1.0.4, allows remote malicious users to trick victims into granting access to local files by modifying the content of t...
Redhat Icedtea-web
Redhat Icedtea-web 1.0.2
Redhat Icedtea-web 1.0.1
Redhat Icedtea-web 1.0
Redhat Icedtea-web 1.1
Redhat Icedtea6 1.9.5
Redhat Icedtea6 1.9.6
Redhat Icedtea6 1.9.7
Redhat Icedtea6 1.9.8
Redhat Icedtea6 1.8.4
Redhat Icedtea6 1.8.3
Redhat Icedtea6 1.8.2
Redhat Icedtea6 1.8.1
Redhat Icedtea6 1.9.2
Redhat Icedtea6 1.9.4
Redhat Icedtea6
Redhat Icedtea6 1.8.6
Redhat Icedtea6 1.9.1
Redhat Icedtea6 1.9.3
Redhat Icedtea6 1.8.7
Redhat Icedtea6 1.8.5
Redhat Icedtea6 1.8
4.3
CVSSv2
CVE-2011-3389
The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle malicious users...
Opera Opera Browser -
Microsoft Internet Explorer -
Microsoft Windows -
Google Chrome -
Mozilla Firefox -
Siemens Simatic Rf68xr Firmware
Siemens Simatic Rf615r Firmware
Haxx Curl
Redhat Enterprise Linux Server 5.0
Redhat Enterprise Linux Server Aus 6.2
Redhat Enterprise Linux Workstation 5.0
Redhat Enterprise Linux Desktop 6.0
Redhat Enterprise Linux Server 6.0
Redhat Enterprise Linux Workstation 6.0
Redhat Enterprise Linux Desktop 5.0
Redhat Enterprise Linux Eus 6.2
Debian Debian Linux 5.0
Debian Debian Linux 6.0
Canonical Ubuntu Linux 10.10
Canonical Ubuntu Linux 11.04
Canonical Ubuntu Linux 11.10
Canonical Ubuntu Linux 10.04
2 Github repositories
1 Article
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-27322
CVE-2006-4304
wireless
CVE-2023-23022
local file inclusion
CVE-2024-27058
CVE-2024-33820
open redirect
CVE-2024-27079
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started