Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-87v3-hpq8-qpc6

Опубликовано: 02 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The Java Web Start implementation in Sun Java SE 6 before Update 17 does not properly handle the interaction between a signed JAR file and a JNLP (1) application or (2) applet, which has unspecified impact and attack vectors, related to a "regression," aka Bug Id 6870531.

The Java Web Start implementation in Sun Java SE 6 before Update 17 does not properly handle the interaction between a signed JAR file and a JNLP (1) application or (2) applet, which has unspecified impact and attack vectors, related to a "regression," aka Bug Id 6870531.

EPSS

Процентиль: 63%
0.00453
Низкий

Связанные уязвимости

ubuntu
около 16 лет назад

The Java Web Start implementation in Sun Java SE 6 before Update 17 does not properly handle the interaction between a signed JAR file and a JNLP (1) application or (2) applet, which has unspecified impact and attack vectors, related to a "regression," aka Bug Id 6870531.

redhat
около 16 лет назад

The Java Web Start implementation in Sun Java SE 6 before Update 17 does not properly handle the interaction between a signed JAR file and a JNLP (1) application or (2) applet, which has unspecified impact and attack vectors, related to a "regression," aka Bug Id 6870531.

nvd
около 16 лет назад

The Java Web Start implementation in Sun Java SE 6 before Update 17 does not properly handle the interaction between a signed JAR file and a JNLP (1) application or (2) applet, which has unspecified impact and attack vectors, related to a "regression," aka Bug Id 6870531.

debian
около 16 лет назад

The Java Web Start implementation in Sun Java SE 6 before Update 17 do ...

EPSS

Процентиль: 63%
0.00453
Низкий