Executive Summary

Informations
Name CVE-2006-4302 First vendor Publication 2006-08-22
Vendor Cve Last vendor Modification 2011-10-11

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:N/I:P/A:N)
Cvss Base Score 5 Attack Range Network
Cvss Impact Score 2.9 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

The Java Plug-in J2SE 1.3.0_02 through 5.0 Update 5, and Java Web Start 1.0 through 1.2 and J2SE 1.4.2 through 5.0 Update 5, allows remote attackers to exploit vulnerabilities by specifying a JRE version that contain vulnerabilities.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4302

CAPEC : Common Attack Pattern Enumeration & Classification

Id Name
CAPEC-220 Client-Server Protocol Manipulation

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-264 Permissions, Privileges, and Access Controls

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 5
Application 5

Open Source Vulnerability Database (OSVDB)

Id Description
28109 Sun Java Plugin and Web Start Version Specification Weakness

Sun Microsystems, Inc. Java Plug-in and Java Web Start contain a flaw that may allow a malicious user to bypass certain security restrictions. The issue is triggered when vulnerable versions of the Java Plugin and Java Web Start are installed, and a specially crafted applet specifies the vulnerable versions in which to run. It is possible that the flaw may allow applets or applications to run with a specified version of the JRE that does not have the latest security fixes resulting in a loss of integrity.

Nessus® Vulnerability Scanner

Date Description
2004-12-08 Name : The remote Windows host contains a runtime environment that is affected by mu...
File : java_jre_version_invocation.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

Source Url
BID http://www.securityfocus.com/bid/11757
http://www.securityfocus.com/bid/8879
BUGTRAQ http://www.securityfocus.com/archive/1/382413
CONFIRM http://support.avaya.com/elmodocs2/security/ASA-2006-205.htm
OSVDB http://www.osvdb.org/28109
SECTRACK http://securitytracker.com/id?1016732
http://securitytracker.com/id?1016733
SECUNIA http://secunia.com/advisories/21570
SUNALERT http://sunsolve.sun.com/search/document.do?assetkey=1-26-102557-1
VUPEN http://www.vupen.com/english/advisories/2006/3354

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
Date Informations
2021-05-04 12:04:28
  • Multiple Updates
2021-04-22 01:05:07
  • Multiple Updates
2020-05-23 00:18:16
  • Multiple Updates
2016-06-28 15:55:23
  • Multiple Updates
2016-04-26 14:59:24
  • Multiple Updates
2014-02-17 10:36:58
  • Multiple Updates
2013-05-11 11:06:50
  • Multiple Updates