Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
redhat icedtea 1.8.1 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2010-3860
IcedTea 1.7.x prior to 1.7.6, 1.8.x prior to 1.8.3, and 1.9.x prior to 1.9.2, as based on OpenJDK 6, declares multiple sensitive variables as public, which allows remote malicious users to obtain sensitive information including (1) user.name, (2) user.home, and (3) java.home syst...
Redhat Icedtea 1.8.1
Redhat Icedtea 1.8
Redhat Icedtea 1.6
Redhat Icedtea
Redhat Icedtea 1.5
Redhat Icedtea 1.8.2
Redhat Icedtea 1.9
Redhat Icedtea 1.7
NA
CVE-2010-4351
The JNLP SecurityManager in IcedTea (IcedTea.so) 1.7 prior to 1.7.7, 1.8 prior to 1.8.4, and 1.9 prior to 1.9.4 for Java OpenJDK returns from the checkPermission method instead of throwing an exception in certain circumstances, which might allow context-dependent malicious users ...
Redhat Icedtea 1.7
Redhat Icedtea 1.7.1
Redhat Icedtea 1.7.2
Redhat Icedtea 1.7.3
Redhat Icedtea 1.7.4
Redhat Icedtea 1.7.5
Redhat Icedtea 1.7.6
Redhat Icedtea 1.8
Redhat Icedtea 1.8.1
Redhat Icedtea 1.8.2
Redhat Icedtea 1.8.3
Redhat Icedtea 1.9
Redhat Icedtea 1.9.1
Redhat Icedtea 1.9.2
Redhat Icedtea 1.9.3
NA
CVE-2011-0025
IcedTea 1.7 prior to 1.7.8, 1.8 prior to 1.8.5, and 1.9 prior to 1.9.5 does not properly verify signatures for JAR files that (1) are "partially signed" or (2) signed by multiple entities, which allows remote malicious users to trick users into executing code that appea...
Redhat Icedtea 1.9.3
Redhat Icedtea 1.8.1
Redhat Icedtea 1.9.4
Redhat Icedtea 1.7.7
Redhat Icedtea 1.7.2
Redhat Icedtea 1.8.3
Redhat Icedtea 1.8
Redhat Icedtea 1.7.3
Redhat Icedtea 1.7.5
Redhat Icedtea 1.8.4
Redhat Icedtea 1.7.4
Redhat Icedtea 1.7.6
Redhat Icedtea 1.8.2
Redhat Icedtea 1.7.1
Redhat Icedtea 1.9.2
Redhat Icedtea 1.9
Redhat Icedtea 1.9.1
Redhat Icedtea 1.7
NA
CVE-2011-2513
The Java Network Launching Protocol (JNLP) implementation in IcedTea6 1.9.x prior to 1.9.9 and prior to 1.8.9, and IcedTea-Web 1.1.x prior to 1.1.1 and prior to 1.0.4, allows remote malicious users to obtain the username and full path of the home and cache directories by accessin...
Redhat Icedtea-web 1.0.2
Redhat Icedtea-web
Redhat Icedtea-web 1.1
Redhat Icedtea-web 1.0.1
Redhat Icedtea-web 1.0
Redhat Icedtea6 1.9.2
Redhat Icedtea6 1.8.4
Redhat Icedtea6 1.9.6
Redhat Icedtea6 1.8.5
Redhat Icedtea6 1.8.3
Redhat Icedtea6 1.8.2
Redhat Icedtea6 1.8.1
Redhat Icedtea6 1.9.3
Redhat Icedtea6 1.9.4
Redhat Icedtea6 1.9.1
Redhat Icedtea6 1.8
Redhat Icedtea6 1.8.6
Redhat Icedtea6 1.9.5
Redhat Icedtea6 1.9.8
Redhat Icedtea6
Redhat Icedtea6 1.8.7
Redhat Icedtea6 1.9.7
NA
CVE-2011-2514
The Java Network Launching Protocol (JNLP) implementation in IcedTea6 1.9.x prior to 1.9.9 and prior to 1.8.9, and IcedTea-Web 1.1.x prior to 1.1.1 and prior to 1.0.4, allows remote malicious users to trick victims into granting access to local files by modifying the content of t...
Redhat Icedtea-web 1.0.2
Redhat Icedtea-web
Redhat Icedtea-web 1.1
Redhat Icedtea-web 1.0.1
Redhat Icedtea-web 1.0
Redhat Icedtea6 1.9.2
Redhat Icedtea6 1.8.4
Redhat Icedtea6 1.9.6
Redhat Icedtea6 1.8.5
Redhat Icedtea6 1.8.3
Redhat Icedtea6 1.8.2
Redhat Icedtea6 1.8.1
Redhat Icedtea6 1.9.3
Redhat Icedtea6 1.9.4
Redhat Icedtea6 1.9.1
Redhat Icedtea6 1.8
Redhat Icedtea6 1.8.6
Redhat Icedtea6 1.9.5
Redhat Icedtea6 1.9.8
Redhat Icedtea6
Redhat Icedtea6 1.8.7
Redhat Icedtea6 1.9.7
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
type confusion
IMAP
CVE-2024-36103
CVE-2024-28995
CVE-2024-37325
CVE-2024-30078
CVE-2024-30082
SQL injection
CVE-2024-30052
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started