Computer Security
[EN] securityvulns.ru no-pyccku


Oracle Sun Java WebStart code execution
Published:12.04.2010
Source:
SecurityVulns ID:10752
Type:client
Threat Level:
8/10
Description:Characters injection during javaws/javaws.exe launch allows dynamic library execution in specified location.
Original documentdocumentReversemode, JAVA web start arbitrary command-line injection - "-XXaltjvm" arbitrary dll loading (0day) (12.04.2010)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod