Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
redhat icedtea-web 1.0 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2012-3423
The IcedTea-Web plugin prior to 1.2.1 does not properly handle NPVariant NPStrings without NUL terminators, which allows remote malicious users to cause a denial of service (crash), obtain sensitive information from memory, or execute arbitrary code via a crafted Java applet.
Redhat Icedtea-web
Redhat Icedtea-web 1.1
Redhat Icedtea-web 1.0
NA
CVE-2012-3422
The getFirstInTableInstance function in the IcedTea-Web plugin prior to 1.2.1 returns an uninitialized pointer when the instance_to_id_map hash is empty, which allows remote malicious users to cause a denial of service (crash) and possibly execute arbitrary code via a crafted web...
Redhat Icedtea-web
Redhat Icedtea-web 1.1
Redhat Icedtea-web 1.0
NA
CVE-2011-3377
The web browser plug-in in IcedTea-Web 1.0.x prior to 1.0.6 and 1.1.x prior to 1.1.4 allows remote malicious users to bypass the Same Origin Policy (SOP) and execute arbitrary script or establish network connections to unintended hosts via an applet whose origin has the same seco...
Redhat Icedtea-web 1.1
Redhat Icedtea-web 1.1.1
Redhat Icedtea-web 1.1.2
Redhat Icedtea-web 1.1.3
Redhat Icedtea-web 1.0
Redhat Icedtea-web 1.0.5
Redhat Icedtea-web 1.0.2
Redhat Icedtea-web 1.0.4
Redhat Icedtea-web 1.0.1
Redhat Icedtea-web 1.0.3
Canonical Ubuntu Linux 10.04
Canonical Ubuntu Linux 10.10
Canonical Ubuntu Linux 11.04
Opensuse Opensuse 12.1
Canonical Ubuntu Linux 11.10
NA
CVE-2011-0706
The JNLPClassLoader class in IcedTea-Web prior to 1.0.1, as used in OpenJDK Runtime Environment 1.6.0, allows remote malicious users to gain privileges via unknown vectors related to multiple signers and the assignment of "an inappropriate security descriptor."
Redhat Icedtea-web 1.0
Redhat Icedtea-web 1.0.1
Sun Jdk 1.6.0
NA
CVE-2011-2513
The Java Network Launching Protocol (JNLP) implementation in IcedTea6 1.9.x prior to 1.9.9 and prior to 1.8.9, and IcedTea-Web 1.1.x prior to 1.1.1 and prior to 1.0.4, allows remote malicious users to obtain the username and full path of the home and cache directories by accessin...
Redhat Icedtea-web 1.1
Redhat Icedtea-web
Redhat Icedtea-web 1.0.2
Redhat Icedtea-web 1.0.1
Redhat Icedtea-web 1.0
Redhat Icedtea6 1.8.5
Redhat Icedtea6 1.8.4
Redhat Icedtea6 1.8.3
Redhat Icedtea6 1.8.2
Redhat Icedtea6 1.9.4
Redhat Icedtea6 1.9.5
Redhat Icedtea6 1.9.6
Redhat Icedtea6 1.9.7
Redhat Icedtea6 1.9.1
Redhat Icedtea6 1.9.3
Redhat Icedtea6 1.9.8
Redhat Icedtea6 1.8.7
Redhat Icedtea6 1.8
Redhat Icedtea6 1.9.2
Redhat Icedtea6
Redhat Icedtea6 1.8.6
Redhat Icedtea6 1.8.1
NA
CVE-2011-2514
The Java Network Launching Protocol (JNLP) implementation in IcedTea6 1.9.x prior to 1.9.9 and prior to 1.8.9, and IcedTea-Web 1.1.x prior to 1.1.1 and prior to 1.0.4, allows remote malicious users to trick victims into granting access to local files by modifying the content of t...
Redhat Icedtea-web
Redhat Icedtea-web 1.0.2
Redhat Icedtea-web 1.0.1
Redhat Icedtea-web 1.0
Redhat Icedtea-web 1.1
Redhat Icedtea6 1.9.5
Redhat Icedtea6 1.9.6
Redhat Icedtea6 1.9.7
Redhat Icedtea6 1.9.8
Redhat Icedtea6 1.8.4
Redhat Icedtea6 1.8.3
Redhat Icedtea6 1.8.2
Redhat Icedtea6 1.8.1
Redhat Icedtea6 1.9.2
Redhat Icedtea6 1.9.4
Redhat Icedtea6
Redhat Icedtea6 1.8.6
Redhat Icedtea6 1.9.1
Redhat Icedtea6 1.9.3
Redhat Icedtea6 1.8.7
Redhat Icedtea6 1.8.5
Redhat Icedtea6 1.8
NA
CVE-2011-3389
The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle malicious users...
Opera Opera Browser -
Microsoft Internet Explorer -
Microsoft Windows -
Google Chrome -
Mozilla Firefox -
Siemens Simatic Rf68xr Firmware
Siemens Simatic Rf615r Firmware
Haxx Curl
Redhat Enterprise Linux Server 5.0
Redhat Enterprise Linux Server Aus 6.2
Redhat Enterprise Linux Workstation 5.0
Redhat Enterprise Linux Desktop 6.0
Redhat Enterprise Linux Server 6.0
Redhat Enterprise Linux Workstation 6.0
Redhat Enterprise Linux Desktop 5.0
Redhat Enterprise Linux Eus 6.2
Debian Debian Linux 5.0
Debian Debian Linux 6.0
Canonical Ubuntu Linux 10.10
Canonical Ubuntu Linux 11.04
Canonical Ubuntu Linux 11.10
Canonical Ubuntu Linux 10.04
2 Github repositories
1 Article
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2022-48654
CVE-2024-2757
authentication bypass
CVE-2024-3194
CVE-2024-33640
CVE-2024-21111
dos
insecure direct object reference
CVE-2024-21345
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started