Количество 23
Количество 23
openSUSE-SU-2019:1911-1
Security update for icedtea-web
SUSE-SU-2022:1259-1
Security update for icedtea-web
SUSE-SU-2019:2033-1
Security update for icedtea-web
ELSA-2019-2004
ELSA-2019-2004: icedtea-web security update (IMPORTANT)
ELSA-2019-2003
ELSA-2019-2003: icedtea-web security update (IMPORTANT)
CVE-2019-10185
It was found that icedtea-web up to and including 1.7.2 and 1.8.2 was vulnerable to a zip-slip attack during auto-extraction of a JAR file. An attacker could use this flaw to write files to arbitrary locations. This could also be used to replace the main running application and, possibly, break out of the sandbox.
CVE-2019-10185
It was found that icedtea-web up to and including 1.7.2 and 1.8.2 was vulnerable to a zip-slip attack during auto-extraction of a JAR file. An attacker could use this flaw to write files to arbitrary locations. This could also be used to replace the main running application and, possibly, break out of the sandbox.
CVE-2019-10185
It was found that icedtea-web up to and including 1.7.2 and 1.8.2 was vulnerable to a zip-slip attack during auto-extraction of a JAR file. An attacker could use this flaw to write files to arbitrary locations. This could also be used to replace the main running application and, possibly, break out of the sandbox.
CVE-2019-10185
It was found that icedtea-web up to and including 1.7.2 and 1.8.2 was ...
GHSA-3q3x-68j9-f9vv
It was found that icedtea-web up to and including 1.7.2 and 1.8.2 was vulnerable to a zip-slip attack during auto-extraction of a JAR file. An attacker could use this flaw to write files to arbitrary locations. This could also be used to replace the main running application and, possibly, break out of the sandbox.
BDU:2019-02868
Уязвимость плагина IcedTea-Web, связанная с неверным ограничением имени пути к каталогу с ограниченным доступом, позволяющая нарушителю записать произвольные файлы в файловую систему устройства
CVE-2019-10182
It was found that icedtea-web though 1.7.2 and 1.8.2 did not properly sanitize paths from <jar/> elements in JNLP files. An attacker could trick a victim into running a specially crafted application and use this flaw to upload arbitrary files to arbitrary locations in the context of the user.
CVE-2019-10182
It was found that icedtea-web though 1.7.2 and 1.8.2 did not properly sanitize paths from <jar/> elements in JNLP files. An attacker could trick a victim into running a specially crafted application and use this flaw to upload arbitrary files to arbitrary locations in the context of the user.
CVE-2019-10182
It was found that icedtea-web though 1.7.2 and 1.8.2 did not properly sanitize paths from <jar/> elements in JNLP files. An attacker could trick a victim into running a specially crafted application and use this flaw to upload arbitrary files to arbitrary locations in the context of the user.
CVE-2019-10182
It was found that icedtea-web though 1.7.2 and 1.8.2 did not properly ...
CVE-2019-10181
It was found that in icedtea-web up to and including 1.7.2 and 1.8.2 executable code could be injected in a JAR file without compromising the signature verification. An attacker could use this flaw to inject code in a trusted JAR. The code would be executed inside the sandbox.
CVE-2019-10181
It was found that in icedtea-web up to and including 1.7.2 and 1.8.2 executable code could be injected in a JAR file without compromising the signature verification. An attacker could use this flaw to inject code in a trusted JAR. The code would be executed inside the sandbox.
CVE-2019-10181
It was found that in icedtea-web up to and including 1.7.2 and 1.8.2 executable code could be injected in a JAR file without compromising the signature verification. An attacker could use this flaw to inject code in a trusted JAR. The code would be executed inside the sandbox.
CVE-2019-10181
It was found that in icedtea-web up to and including 1.7.2 and 1.8.2 e ...
GHSA-xv8g-hcfj-ppcw
It was found that in icedtea-web up to and including 1.7.2 and 1.8.2 executable code could be injected in a JAR file without compromising the signature verification. An attacker could use this flaw to inject code in a trusted JAR. The code would be executed inside the sandbox.
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
openSUSE-SU-2019:1911-1 Security update for icedtea-web | больше 6 лет назад | |||
SUSE-SU-2022:1259-1 Security update for icedtea-web | почти 4 года назад | |||
SUSE-SU-2019:2033-1 Security update for icedtea-web | больше 6 лет назад | |||
ELSA-2019-2004 ELSA-2019-2004: icedtea-web security update (IMPORTANT) | больше 6 лет назад | |||
ELSA-2019-2003 ELSA-2019-2003: icedtea-web security update (IMPORTANT) | больше 6 лет назад | |||
CVE-2019-10185 It was found that icedtea-web up to and including 1.7.2 and 1.8.2 was vulnerable to a zip-slip attack during auto-extraction of a JAR file. An attacker could use this flaw to write files to arbitrary locations. This could also be used to replace the main running application and, possibly, break out of the sandbox. | CVSS3: 8.6 | 2% Низкий | больше 6 лет назад | |
CVE-2019-10185 It was found that icedtea-web up to and including 1.7.2 and 1.8.2 was vulnerable to a zip-slip attack during auto-extraction of a JAR file. An attacker could use this flaw to write files to arbitrary locations. This could also be used to replace the main running application and, possibly, break out of the sandbox. | CVSS3: 8.2 | 2% Низкий | больше 6 лет назад | |
CVE-2019-10185 It was found that icedtea-web up to and including 1.7.2 and 1.8.2 was vulnerable to a zip-slip attack during auto-extraction of a JAR file. An attacker could use this flaw to write files to arbitrary locations. This could also be used to replace the main running application and, possibly, break out of the sandbox. | CVSS3: 8.6 | 2% Низкий | больше 6 лет назад | |
CVE-2019-10185 It was found that icedtea-web up to and including 1.7.2 and 1.8.2 was ... | CVSS3: 8.6 | 2% Низкий | больше 6 лет назад | |
GHSA-3q3x-68j9-f9vv It was found that icedtea-web up to and including 1.7.2 and 1.8.2 was vulnerable to a zip-slip attack during auto-extraction of a JAR file. An attacker could use this flaw to write files to arbitrary locations. This could also be used to replace the main running application and, possibly, break out of the sandbox. | CVSS3: 8.6 | 2% Низкий | больше 3 лет назад | |
BDU:2019-02868 Уязвимость плагина IcedTea-Web, связанная с неверным ограничением имени пути к каталогу с ограниченным доступом, позволяющая нарушителю записать произвольные файлы в файловую систему устройства | CVSS3: 8.6 | 2% Низкий | больше 6 лет назад | |
CVE-2019-10182 It was found that icedtea-web though 1.7.2 and 1.8.2 did not properly sanitize paths from <jar/> elements in JNLP files. An attacker could trick a victim into running a specially crafted application and use this flaw to upload arbitrary files to arbitrary locations in the context of the user. | CVSS3: 8.2 | 1% Низкий | больше 6 лет назад | |
CVE-2019-10182 It was found that icedtea-web though 1.7.2 and 1.8.2 did not properly sanitize paths from <jar/> elements in JNLP files. An attacker could trick a victim into running a specially crafted application and use this flaw to upload arbitrary files to arbitrary locations in the context of the user. | CVSS3: 8.2 | 1% Низкий | больше 6 лет назад | |
CVE-2019-10182 It was found that icedtea-web though 1.7.2 and 1.8.2 did not properly sanitize paths from <jar/> elements in JNLP files. An attacker could trick a victim into running a specially crafted application and use this flaw to upload arbitrary files to arbitrary locations in the context of the user. | CVSS3: 8.2 | 1% Низкий | больше 6 лет назад | |
CVE-2019-10182 It was found that icedtea-web though 1.7.2 and 1.8.2 did not properly ... | CVSS3: 8.2 | 1% Низкий | больше 6 лет назад | |
CVE-2019-10181 It was found that in icedtea-web up to and including 1.7.2 and 1.8.2 executable code could be injected in a JAR file without compromising the signature verification. An attacker could use this flaw to inject code in a trusted JAR. The code would be executed inside the sandbox. | CVSS3: 8.1 | 0% Низкий | больше 6 лет назад | |
CVE-2019-10181 It was found that in icedtea-web up to and including 1.7.2 and 1.8.2 executable code could be injected in a JAR file without compromising the signature verification. An attacker could use this flaw to inject code in a trusted JAR. The code would be executed inside the sandbox. | CVSS3: 6.3 | 0% Низкий | больше 6 лет назад | |
CVE-2019-10181 It was found that in icedtea-web up to and including 1.7.2 and 1.8.2 executable code could be injected in a JAR file without compromising the signature verification. An attacker could use this flaw to inject code in a trusted JAR. The code would be executed inside the sandbox. | CVSS3: 8.1 | 0% Низкий | больше 6 лет назад | |
CVE-2019-10181 It was found that in icedtea-web up to and including 1.7.2 and 1.8.2 e ... | CVSS3: 8.1 | 0% Низкий | больше 6 лет назад | |
GHSA-xv8g-hcfj-ppcw It was found that in icedtea-web up to and including 1.7.2 and 1.8.2 executable code could be injected in a JAR file without compromising the signature verification. An attacker could use this flaw to inject code in a trusted JAR. The code would be executed inside the sandbox. | CVSS3: 8.1 | 0% Низкий | больше 3 лет назад |
Уязвимостей на страницу