Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
redhat icedtea-web 1.1.1 vulnerabilities and exploits
(subscribe to this query)
6.8
CVSSv2
CVE-2012-4540
Off-by-one error in the invoke function in IcedTeaScriptablePluginObject.cc in IcedTea-Web 1.1.x prior to 1.1.7, 1.2.x prior to 1.2.2, 1.3.x prior to 1.3.1, and 1.4.x prior to 1.4.1 allows remote malicious users to obtain sensitive information, cause a denial of service (crash), ...
Opensuse Opensuse 13.2
Opensuse Opensuse 13.1
Redhat Icedtea-web 1.1.2
Redhat Icedtea-web 1.1.1
Redhat Icedtea-web 1.1.6
Redhat Icedtea-web 1.1.5
Redhat Icedtea-web 1.2.1
Redhat Icedtea-web 1.1
Redhat Icedtea-web 1.2
Redhat Icedtea-web 1.3
Redhat Icedtea-web 1.1.4
Redhat Icedtea-web 1.1.3
4.3
CVSSv2
CVE-2011-3377
The web browser plug-in in IcedTea-Web 1.0.x prior to 1.0.6 and 1.1.x prior to 1.1.4 allows remote malicious users to bypass the Same Origin Policy (SOP) and execute arbitrary script or establish network connections to unintended hosts via an applet whose origin has the same seco...
Redhat Icedtea-web 1.1
Redhat Icedtea-web 1.1.1
Redhat Icedtea-web 1.1.2
Redhat Icedtea-web 1.1.3
Redhat Icedtea-web 1.0
Redhat Icedtea-web 1.0.5
Redhat Icedtea-web 1.0.2
Redhat Icedtea-web 1.0.4
Redhat Icedtea-web 1.0.1
Redhat Icedtea-web 1.0.3
Canonical Ubuntu Linux 10.04
Canonical Ubuntu Linux 10.10
Canonical Ubuntu Linux 11.04
Opensuse Opensuse 12.1
Canonical Ubuntu Linux 11.10
5
CVSSv2
CVE-2011-2513
The Java Network Launching Protocol (JNLP) implementation in IcedTea6 1.9.x prior to 1.9.9 and prior to 1.8.9, and IcedTea-Web 1.1.x prior to 1.1.1 and prior to 1.0.4, allows remote malicious users to obtain the username and full path of the home and cache directories by accessin...
Redhat Icedtea-web 1.1
Redhat Icedtea-web
Redhat Icedtea-web 1.0.2
Redhat Icedtea-web 1.0.1
Redhat Icedtea-web 1.0
Redhat Icedtea6 1.8.5
Redhat Icedtea6 1.8.4
Redhat Icedtea6 1.8.3
Redhat Icedtea6 1.8.2
Redhat Icedtea6 1.9.4
Redhat Icedtea6 1.9.5
Redhat Icedtea6 1.9.6
Redhat Icedtea6 1.9.7
Redhat Icedtea6 1.9.1
Redhat Icedtea6 1.9.3
Redhat Icedtea6 1.9.8
Redhat Icedtea6 1.8.7
Redhat Icedtea6 1.8
Redhat Icedtea6 1.9.2
Redhat Icedtea6
Redhat Icedtea6 1.8.6
Redhat Icedtea6 1.8.1
6.8
CVSSv2
CVE-2011-2514
The Java Network Launching Protocol (JNLP) implementation in IcedTea6 1.9.x prior to 1.9.9 and prior to 1.8.9, and IcedTea-Web 1.1.x prior to 1.1.1 and prior to 1.0.4, allows remote malicious users to trick victims into granting access to local files by modifying the content of t...
Redhat Icedtea-web
Redhat Icedtea-web 1.0.2
Redhat Icedtea-web 1.0.1
Redhat Icedtea-web 1.0
Redhat Icedtea-web 1.1
Redhat Icedtea6 1.9.5
Redhat Icedtea6 1.9.6
Redhat Icedtea6 1.9.7
Redhat Icedtea6 1.9.8
Redhat Icedtea6 1.8.4
Redhat Icedtea6 1.8.3
Redhat Icedtea6 1.8.2
Redhat Icedtea6 1.8.1
Redhat Icedtea6 1.9.2
Redhat Icedtea6 1.9.4
Redhat Icedtea6
Redhat Icedtea6 1.8.6
Redhat Icedtea6 1.9.1
Redhat Icedtea6 1.9.3
Redhat Icedtea6 1.8.7
Redhat Icedtea6 1.8.5
Redhat Icedtea6 1.8
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
HTML injection
CVE-2024-35894
SQL
CVE-2024-5105
CVE-2014-100005
CVE-2024-35895
unauthorized
CVE-2024-22120
CVE-2024-35890
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started