Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2010-1423

Опубликовано: 15 апр. 2010
Источник: ubuntu
Приоритет: medium
CVSS2: 9.3

Описание

Argument injection vulnerability in the URI handler in (a) Java NPAPI plugin and (b) Java Deployment Toolkit in Java 6 Update 10, 19, and other versions, when running on Windows and possibly on Linux, allows remote attackers to execute arbitrary code via the (1) -J or (2) -XXaltjvm argument to javaws.exe, which is processed by the launch method. NOTE: some of these details are obtained from third party information.

РелизСтатусПримечание
dapper

DNE

devel

DNE

hardy

released

6.20dlj-0ubuntu1.8.04
intrepid

ignored

end of life, was needs-triage
jaunty

released

6.20dlj-0ubuntu1.9.04
karmic

released

6.20dlj-0ubuntu1.9.10
lucid

not-affected

6.20dlj-1ubuntu2
upstream

released

6.20

Показывать по

Ссылки на источники

9.3 Critical

CVSS2

Связанные уязвимости

redhat
больше 15 лет назад

Argument injection vulnerability in the URI handler in (a) Java NPAPI plugin and (b) Java Deployment Toolkit in Java 6 Update 10, 19, and other versions, when running on Windows and possibly on Linux, allows remote attackers to execute arbitrary code via the (1) -J or (2) -XXaltjvm argument to javaws.exe, which is processed by the launch method. NOTE: some of these details are obtained from third party information.

nvd
больше 15 лет назад

Argument injection vulnerability in the URI handler in (a) Java NPAPI plugin and (b) Java Deployment Toolkit in Java 6 Update 10, 19, and other versions, when running on Windows and possibly on Linux, allows remote attackers to execute arbitrary code via the (1) -J or (2) -XXaltjvm argument to javaws.exe, which is processed by the launch method. NOTE: some of these details are obtained from third party information.

debian
больше 15 лет назад

Argument injection vulnerability in the URI handler in (a) Java NPAPI ...

github
больше 3 лет назад

Argument injection vulnerability in the URI handler in (a) Java NPAPI plugin and (b) Java Deployment Toolkit in Java 6 Update 10, 19, and other versions, when running on Windows and possibly on Linux, allows remote attackers to execute arbitrary code via the (1) -J or (2) -XXaltjvm argument to javaws.exe, which is processed by the launch method. NOTE: some of these details are obtained from third party information.

9.3 Critical

CVSS2