9.3
CVSSv2

CVE-2008-1195

Published: 06/03/2008 Updated: 31/07/2019
CVSS v2 Base Score: 9.3 | Impact Score: 10 | Exploitability Score: 8.6
VMScore: 828
Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

Unspecified vulnerability in Sun JDK and Java Runtime Environment (JRE) 6 Update 4 and previous versions and 5.0 Update 14 and previous versions; and SDK and JRE 1.4.2_16 and previous versions; allows remote malicious users to access arbitrary network services on the local host via unspecified vectors related to JavaScript and Java APIs.

Vulnerable Product Search on Vulmon Subscribe to Product

sun jdk 1.5.0

sun jdk 1.6.0

sun jre 1.4.2_5

sun jre 1.4.2_7

sun jre 1.4.2_14

sun jre 1.4.2_16

sun jre 1.5.0

sun jre 1.6.0

sun jre 1.4.2

sun jre 1.4.2_1

sun jre 1.4.2_2

sun jre 1.4.2_3

sun jre 1.4.2_9

sun jre 1.4.2_10

sun jre 1.4.2_11

sun jre 1.4.2_12

sun jre 1.4.2_4

sun jre 1.4.2_6

sun jre 1.4.2_8

sun jre 1.4.2_13

sun jre 1.4.2_15

sun sdk 1.4.2_10

sun sdk 1.4.2_11

sun sdk 1.4.2_12

sun sdk 1.4.2_13

sun sdk 1.4.2_2

sun sdk 1.4.2_3

sun sdk 1.4.2_4

sun sdk 1.4.2_5

sun sdk 1.4.2

sun sdk 1.4.2_7

sun sdk 1.4.2_9

sun sdk 1.4.2_14

sun sdk 1.4.2_16

sun sdk 1.4.2_1

sun sdk 1.4.2_6

sun sdk 1.4.2_8

sun sdk 1.4.2_15

canonical ubuntu linux 6.06

canonical ubuntu linux 6.10

canonical ubuntu linux 7.10

canonical ubuntu linux 7.04

Vendor Advisories

Alexey Proskuryakov, Yosuke Hasegawa and Simon Montagu discovered flaws in Firefox’s character encoding handling If a user were tricked into opening a malicious web page, an attacker could perform cross-site scripting attacks (CVE-2008-0416) ...
Mozilla Foundation Security Advisory 2008-18 Java socket connection to any local port via LiveConnect Announced March 25, 2008 Reporter Gregory Fleischer Impact High Products Firefox, SeaMonkey Fixed in ...

References

CWE-254http://sunsolve.sun.com/search/document.do?assetkey=1-26-233326-1http://www.redhat.com/support/errata/RHSA-2008-0186.htmlhttp://www.securitytracker.com/id?1019553http://secunia.com/advisories/29273http://www.mozilla.org/security/announce/2008/mfsa2008-18.htmlhttp://wiki.rpath.com/wiki/Advisories:rPSA-2008-0128http://www.us-cert.gov/cas/techalerts/TA08-066A.htmlhttp://secunia.com/advisories/29239http://secunia.com/advisories/29560http://www.mandriva.com/security/advisories?name=MDVSA-2008:080http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00000.htmlhttp://www.ubuntu.com/usn/usn-592-1http://www.us-cert.gov/cas/techalerts/TA08-087A.htmlhttp://secunia.com/advisories/29526http://secunia.com/advisories/29541http://secunia.com/advisories/29547http://www.redhat.com/support/errata/RHSA-2008-0210.htmlhttp://secunia.com/advisories/29498http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00002.htmlhttp://secunia.com/advisories/29645http://secunia.com/advisories/29582http://www.gentoo.org/security/en/glsa/glsa-200804-20.xmlhttp://security.gentoo.org/glsa/glsa-200804-28.xmlhttp://lists.opensuse.org/opensuse-security-announce/2008-04/msg00010.htmlhttp://secunia.com/advisories/29858http://secunia.com/advisories/29897http://secunia.com/advisories/30676http://secunia.com/advisories/30780http://www.gentoo.org/security/en/glsa/glsa-200806-11.xmlhttp://www.vmware.com/security/advisories/VMSA-2008-0010.htmlhttp://secunia.com/advisories/31497http://support.apple.com/kb/HT3179http://secunia.com/advisories/32018http://support.apple.com/kb/HT3178http://lists.apple.com/archives/security-announce//2008/Sep/msg00008.htmlhttp://www.redhat.com/support/errata/RHSA-2008-0267.htmlhttp://secunia.com/advisories/30620http://sunsolve.sun.com/search/document.do?assetkey=1-26-238492-1http://www.vupen.com/english/advisories/2008/0770/referenceshttp://www.vupen.com/english/advisories/2008/0998/referenceshttp://www.vupen.com/english/advisories/2008/1856/referenceshttp://www.vupen.com/english/advisories/2008/1793/referenceshttps://exchange.xforce.ibmcloud.com/vulnerabilities/41030https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9486http://www.securityfocus.com/archive/1/490196/100/0/threadedhttps://usn.ubuntu.com/592-1/https://nvd.nist.gov