Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2009-2671

Опубликовано: 05 авг. 2009
Источник: redhat
CVSS2: 4.3
EPSS Низкий

Описание

The SOCKS proxy implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows remote attackers to discover the username of the account that invoked an untrusted (1) applet or (2) Java Web Start application via unspecified vectors.

Дополнительная информация

Статус:

Important
https://bugzilla.redhat.com/show_bug.cgi?id=512907OpenJDK Proxy mechanism information leaks (6801071)

EPSS

Процентиль: 90%
0.06121
Низкий

4.3 Medium

CVSS2

Связанные уязвимости

ubuntu
почти 16 лет назад

The SOCKS proxy implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows remote attackers to discover the username of the account that invoked an untrusted (1) applet or (2) Java Web Start application via unspecified vectors.

nvd
почти 16 лет назад

The SOCKS proxy implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows remote attackers to discover the username of the account that invoked an untrusted (1) applet or (2) Java Web Start application via unspecified vectors.

debian
почти 16 лет назад

The SOCKS proxy implementation in Sun Java Runtime Environment (JRE) i ...

github
около 3 лет назад

The SOCKS proxy implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows remote attackers to discover the username of the account that invoked an untrusted (1) applet or (2) Java Web Start application via unspecified vectors.

oracle-oval
почти 16 лет назад

ELSA-2009-1201: java-1.6.0-openjdk security and bug fix update (IMPORTANT)

EPSS

Процентиль: 90%
0.06121
Низкий

4.3 Medium

CVSS2