CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
AI Score
Confidence
High
EPSS
Percentile
91.7%
Multiple unspecified vulnerabilities in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 7, JDK and JRE 5.0 before Update 16, SDK and JRE 1.4.x before 1.4.2_18, and SDK and JRE 1.3.x before 1.3.1_23 allow remote attackers to violate the security model for an applet’s outbound connections by connecting to localhost services running on the machine that loaded the applet.
Vendor | Product | Version | CPE |
---|---|---|---|
sun | jdk | * | cpe:2.3:a:sun:jdk:*:update_15:*:*:*:*:*:* |
sun | jdk | * | cpe:2.3:a:sun:jdk:*:update_6:*:*:*:*:*:* |
sun | jdk | 1.5.0 | cpe:2.3:a:sun:jdk:1.5.0:update_12:*:*:*:*:*:* |
sun | jdk | 5.0 | cpe:2.3:a:sun:jdk:5.0:update_1:*:*:*:*:*:* |
sun | jdk | 5.0 | cpe:2.3:a:sun:jdk:5.0:update_10:*:*:*:*:*:* |
sun | jdk | 5.0 | cpe:2.3:a:sun:jdk:5.0:update_11:*:*:*:*:*:* |
sun | jdk | 5.0 | cpe:2.3:a:sun:jdk:5.0:update_12:*:*:*:*:*:* |
sun | jdk | 5.0 | cpe:2.3:a:sun:jdk:5.0:update_13:*:*:*:*:*:* |
sun | jdk | 5.0 | cpe:2.3:a:sun:jdk:5.0:update_14:*:*:*:*:*:* |
sun | jdk | 5.0 | cpe:2.3:a:sun:jdk:5.0:update_2:*:*:*:*:*:* |
lists.apple.com/archives/security-announce//2008/Sep/msg00008.html
lists.opensuse.org/opensuse-security-announce/2008-08/msg00005.html
lists.opensuse.org/opensuse-security-announce/2008-09/msg00000.html
lists.opensuse.org/opensuse-security-announce/2008-09/msg00002.html
lists.opensuse.org/opensuse-security-announce/2008-12/msg00003.html
lists.opensuse.org/opensuse-security-announce/2009-05/msg00000.html
marc.info/?l=bugtraq&m=122331139823057&w=2
rhn.redhat.com/errata/RHSA-2008-0955.html
secunia.com/advisories/31010
secunia.com/advisories/31055
secunia.com/advisories/31269
secunia.com/advisories/31320
secunia.com/advisories/31497
secunia.com/advisories/31600
secunia.com/advisories/31736
secunia.com/advisories/32018
secunia.com/advisories/32179
secunia.com/advisories/32180
secunia.com/advisories/32436
secunia.com/advisories/32826
secunia.com/advisories/33194
secunia.com/advisories/33236
secunia.com/advisories/33237
secunia.com/advisories/33238
secunia.com/advisories/35065
secunia.com/advisories/37386
security.gentoo.org/glsa/glsa-200911-02.xml
sunsolve.sun.com/search/document.do?assetkey=1-66-238968-1
support.apple.com/kb/HT3178
support.apple.com/kb/HT3179
support.avaya.com/elmodocs2/security/ASA-2008-428.htm
support.avaya.com/elmodocs2/security/ASA-2008-507.htm
support.avaya.com/elmodocs2/security/ASA-2008-509.htm
www.redhat.com/support/errata/RHSA-2008-0594.html
www.redhat.com/support/errata/RHSA-2008-0595.html
www.redhat.com/support/errata/RHSA-2008-0790.html
www.redhat.com/support/errata/RHSA-2008-0906.html
www.redhat.com/support/errata/RHSA-2008-1043.html
www.redhat.com/support/errata/RHSA-2008-1044.html
www.redhat.com/support/errata/RHSA-2008-1045.html
www.securityfocus.com/archive/1/497041/100/0/threaded
www.securityfocus.com/bid/30140
www.securitytracker.com/id?1020459
www.us-cert.gov/cas/techalerts/TA08-193A.html
www.vmware.com/security/advisories/VMSA-2008-0016.html
www.vupen.com/english/advisories/2008/2056/references
www.vupen.com/english/advisories/2008/2740
exchange.xforce.ibmcloud.com/vulnerabilities/43662
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9565