Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2009-3886

Опубликовано: 09 нояб. 2009
Источник: debian
EPSS Низкий

Описание

The Java Web Start implementation in Sun Java SE 6 before Update 17 does not properly handle the interaction between a signed JAR file and a JNLP (1) application or (2) applet, which has unspecified impact and attack vectors, related to a "regression," aka Bug Id 6870531.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
openjdk-6fixed6b17-1.7-1package
sun-java6fixed6-17-1package
sun-java6fixed6-20-0lenny1lennypackage

EPSS

Процентиль: 63%
0.00453
Низкий

Связанные уязвимости

ubuntu
около 16 лет назад

The Java Web Start implementation in Sun Java SE 6 before Update 17 does not properly handle the interaction between a signed JAR file and a JNLP (1) application or (2) applet, which has unspecified impact and attack vectors, related to a "regression," aka Bug Id 6870531.

redhat
около 16 лет назад

The Java Web Start implementation in Sun Java SE 6 before Update 17 does not properly handle the interaction between a signed JAR file and a JNLP (1) application or (2) applet, which has unspecified impact and attack vectors, related to a "regression," aka Bug Id 6870531.

nvd
около 16 лет назад

The Java Web Start implementation in Sun Java SE 6 before Update 17 does not properly handle the interaction between a signed JAR file and a JNLP (1) application or (2) applet, which has unspecified impact and attack vectors, related to a "regression," aka Bug Id 6870531.

github
больше 3 лет назад

The Java Web Start implementation in Sun Java SE 6 before Update 17 does not properly handle the interaction between a signed JAR file and a JNLP (1) application or (2) applet, which has unspecified impact and attack vectors, related to a "regression," aka Bug Id 6870531.

EPSS

Процентиль: 63%
0.00453
Низкий