Redhat

Icedtea-web

10 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.5%
  • Published 14.05.2014 00:55:04
  • Last modified 12.04.2025 10:46:40

The Java Network Launching Protocol (JNLP) implementation in IcedTea6 1.9.x before 1.9.9 and before 1.8.9, and IcedTea-Web 1.1.x before 1.1.1 and before 1.0.4, allows remote attackers to obtain the username and full path of the home and cache directo...

  • EPSS 0.88%
  • Published 14.05.2014 00:55:04
  • Last modified 12.04.2025 10:46:40

The Java Network Launching Protocol (JNLP) implementation in IcedTea6 1.9.x before 1.9.9 and before 1.8.9, and IcedTea-Web 1.1.x before 1.1.1 and before 1.0.4, allows remote attackers to trick victims into granting access to local files by modifying ...

Exploit
  • EPSS 0.06%
  • Published 03.03.2014 16:55:04
  • Last modified 12.04.2025 10:46:40

The LiveConnect implementation in plugin/icedteanp/IcedTeaNPPlugin.cc in IcedTea-Web before 1.4.2 allows local users to read the messages between a Java applet and a web browser by pre-creating a temporary socket file with a predictable name in /tmp.

  • EPSS 0.97%
  • Published 05.02.2014 19:55:28
  • Last modified 11.04.2025 00:51:21

The web browser plug-in in IcedTea-Web 1.0.x before 1.0.6 and 1.1.x before 1.1.4 allows remote attackers to bypass the Same Origin Policy (SOP) and execute arbitrary script or establish network connections to unintended hosts via an applet whose orig...

  • EPSS 0.7%
  • Published 29.04.2013 22:55:08
  • Last modified 11.04.2025 00:51:21

The IcedTea-Web plugin before 1.2.3 and 1.3.x before 1.3.2 uses the same class loader for applets with the same codebase path but from different domains, which allows remote attackers to obtain sensitive information or possibly alter other applets vi...

  • EPSS 2.19%
  • Published 29.04.2013 22:55:08
  • Last modified 11.04.2025 00:51:21

The IcedTea-Web plugin before 1.2.3 and 1.3.x before 1.3.2 allows remote attackers to execute arbitrary code via a crafted file that validates as both a GIF and a Java JAR file, aka "GIFAR."

  • EPSS 0.93%
  • Published 11.11.2012 13:00:54
  • Last modified 11.04.2025 00:51:21

Off-by-one error in the invoke function in IcedTeaScriptablePluginObject.cc in IcedTea-Web 1.1.x before 1.1.7, 1.2.x before 1.2.2, 1.3.x before 1.3.1, and 1.4.x before 1.4.1 allows remote attackers to obtain sensitive information, cause a denial of s...

  • EPSS 0.89%
  • Published 07.08.2012 21:55:01
  • Last modified 11.04.2025 00:51:21

The getFirstInTableInstance function in the IcedTea-Web plugin before 1.2.1 returns an uninitialized pointer when the instance_to_id_map hash is empty, which allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary ...

Exploit
  • EPSS 2.48%
  • Published 07.08.2012 21:55:01
  • Last modified 11.04.2025 00:51:21

The IcedTea-Web plugin before 1.2.1 does not properly handle NPVariant NPStrings without NUL terminators, which allows remote attackers to cause a denial of service (crash), obtain sensitive information from memory, or execute arbitrary code via a cr...

  • EPSS 1.33%
  • Published 19.02.2011 01:00:03
  • Last modified 11.04.2025 00:51:21

The JNLPClassLoader class in IcedTea-Web before 1.0.1, as used in OpenJDK Runtime Environment 1.6.0, allows remote attackers to gain privileges via unknown vectors related to multiple signers and the assignment of "an inappropriate security descripto...