[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250039

 
 

909

 
 

195882

 
 

282

Paid content will be excluded from the download.


Download | Alert*


oval:org.secpod.oval:def:400013
Sun Java 1.6 was updated to Update 24 fixing various bugs and security issues. The update is rated critical by Sun

oval:org.secpod.oval:def:505811
The Sun 1.6.0 Java release includes the Sun Java 6 Runtime Environment and the Sun Java 6 Software Development Kit. This update fixes several vulnerabilities in the Sun Java 6 Runtime Environment and the Sun Java 6 Software Development Kit. Further information about these flaws can be found on the O ...

oval:org.secpod.oval:def:3051
The host is missing an update according to APPLE-SA-2011-03-08-2 and is prone to multiple vulnerabilities. Multiple flaws are present in the application, which fails to handle crafted data. Successful exploitation could allow attackers to affect confidentiality, integrity and availability.

oval:org.secpod.oval:def:2741
The host is missing a security update according to APPLE-SA-2011-03-08-1. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to sanitize crafted input. Successful exploitation could allow attackers to affect confidentiality, integrity, and a ...

oval:org.secpod.oval:def:2740
The host is installed with Oracle Java SE and Java for Business 6 Update 23 and earlier, 5.0 Update 27 and earlier, and 1.4.2_29 and earlier and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted string that triggers an infinite loop ...

oval:org.secpod.oval:def:581
The host is installed with Oracle Java SE and is prone to unspecified vulnerability. A flaw is present in the application, which fails to properly handle vectors related to Java Language and unspecified APIs. Successful exploitation allow remote attackers to affect availability.

oval:org.secpod.oval:def:600170
It was discovered that the floating point parser in OpenJDK, an implementation of the Java platform, can enter an infinite loop when processing certain input strings. Such input strings represent valid numbers and can be contained in data supplied by an attacker over the network, leading to a denial ...

oval:org.secpod.oval:def:201660
These packages provide the OpenJDK 6 Java Runtime Environment and the OpenJDK 6 Software Development Kit. A denial of service flaw was found in the way certain strings were converted to Double objects. A remote attacker could use this flaw to cause Java-based applications to hang, for instance if th ...

oval:org.secpod.oval:def:505805
The IBM 1.5.0 Java release includes the IBM Java 2 Runtime Environment and the IBM Java 2 Software Development Kit. A denial of service flaw was found in the way certain strings were converted to Double objects. A remote attacker could use this flaw to cause Java based applications to hang, for exam ...

oval:org.secpod.oval:def:505817
The IBM 1.6.0 Java release includes the IBM Java 2 Runtime Environment and the IBM Java 2 Software Development Kit. A denial of service flaw was found in the way certain strings were converted to Double objects. A remote attacker could use this flaw to cause Java based applications to hang, for exam ...

oval:org.secpod.oval:def:201523
These packages provide the OpenJDK 6 Java Runtime Environment and the OpenJDK 6 Software Development Kit. A denial of service flaw was found in the way certain strings were converted to Double objects. A remote attacker could use this flaw to cause Java-based applications to hang, for instance if th ...

oval:org.secpod.oval:def:201543
Apache Tomcat is a servlet container for the Java Servlet and JavaServer Pages technologies. A denial of service flaw was found in the way certain strings were converted to Double objects. A remote attacker could use this flaw to cause Tomcat to hang via a specially-crafted HTTP request. Users of ...

oval:org.secpod.oval:def:102703
The OpenJDK runtime environment.

oval:org.secpod.oval:def:300427
Multiple vulnerabilities has been identified and fixed in java-1.6.0-openjdk: The JNLP SecurityManager in IcedTea 1.7 before 1.7.7, 1.8 before 1.8.4, and 1.9 before 1.9.4 for Java OpenJDK returns from the checkPermission method instead of throwing an exception in certain circumstances, which might ...

oval:org.secpod.oval:def:700261
USN-1079-1 fixed vulnerabilities in OpenJDK 6 for non-armel architectures. This update provides the corresponding updates for OpenJDK 6 for use with the armel architectures. In order to build the armel OpenJDK 6 update for Ubuntu 10.04 LTS, it was necessary to rebuild binutils and gcj-4.4 from Ub ...

oval:org.secpod.oval:def:700265
USN-1079-2 fixed vulnerabilities in OpenJDK 6 for armel architectures in Ubuntu 9.10 and Ubuntu 10.04 LTS. This update fixes vulnerabilities in OpenJDK 6 for armel architectures for Ubuntu 10.10. Original advisory details: It was discovered that untrusted Java applets could create domain name reso ...

oval:org.secpod.oval:def:103016
The OpenJDK runtime environment.

oval:org.secpod.oval:def:700254
It was discovered that untrusted Java applets could create domain name resolution cache entries, allowing an attacker to manipulate name resolution within the JVM. It was discovered that the Java launcher did not did not properly setup the LD_LIBRARY_PATH environment variable. A local attacker coul ...

oval:org.secpod.oval:def:102711
The OpenJDK runtime environment.

oval:org.secpod.oval:def:103032
The OpenJDK runtime environment.

oval:org.secpod.oval:def:102757
The OpenJDK runtime environment.

oval:org.secpod.oval:def:102980
The OpenJDK runtime environment.

oval:org.secpod.oval:def:103201
The OpenJDK runtime environment.

oval:org.secpod.oval:def:500100
These packages provide the OpenJDK 6 Java Runtime Environment and the OpenJDK 6 Software Development Kit. A denial of service flaw was found in the way certain strings were converted to Double objects. A remote attacker could use this flaw to cause Java-based applications to hang, for instance if th ...

oval:org.secpod.oval:def:1503343
Updated java-1.6.0-openjdk packages that fix one security issue are now available for Red Hat Enterprise Linux 5 and 6. The Red Hat Security Response Team has rated this update as having moderate security impact. Common Vulnerability Scoring System base scores, which give detailed severity ratings, ...

oval:org.secpod.oval:def:500105
Apache Tomcat is a servlet container for the Java Servlet and JavaServer Pages technologies. A denial of service flaw was found in the way certain strings were converted to Double objects. A remote attacker could use this flaw to cause Tomcat to hang via a specially-crafted HTTP request. Users of ...

oval:org.secpod.oval:def:200336
Apache Tomcat is a servlet container for the Java Servlet and JavaServer Pages technologies. A denial of service flaw was found in the way certain strings were converted to Double objects. A remote attacker could use this flaw to cause Tomcat to hang via a specially-crafted HTTP request. Users of ...

oval:org.secpod.oval:def:500009
Apache Tomcat is a servlet container for the Java Servlet and JavaServer Pages technologies. A denial of service flaw was found in the way certain strings were converted to Double objects. A remote attacker could use this flaw to cause Tomcat to hang via a specially-crafted HTTP request. A flaw wa ...

oval:org.secpod.oval:def:1503426
Updated tomcat6 packages that fix two security issues and one bug are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having important security impact. Common Vulnerability Scoring System base scores, which give detailed severity ratings, ar ...

oval:org.secpod.oval:def:600197
It was discovered that the floating point parser in OpenJDK, an implementation of the Java platform, can enter an infinite loop when processing certain input strings. Such input strings represent valid numbers and can be contained in data supplied by an attacker over the network, leading to a denial ...

oval:org.secpod.oval:def:103115
The OpenJDK runtime environment.

CPE    154
cpe:/a:sun:jdk:1.5.0:update17
cpe:/a:sun:jdk:1.5.0:update18
cpe:/a:sun:jdk:1.5.0:update19
cpe:/a:sun:jre
...
*CVE
CVE-2010-4476

© SecPod Technologies