'; } else{ echo ''; } echo 'Hillstone Networks'; } elseif ($_SERVER[HTTP_HOST] == "update1.huaantech.com.cn") { echo ''; echo 'huaantech'; } elseif ($_SERVER[HTTP_HOST] == "update1.dcnetworks.com.cn") { echo ''; echo 'dcnetworks'; } elseif ($_SERVER[HTTP_HOST] == "update1.w-ibeda.com") { if (false===strpos($_SERVER[REQUEST_URI],"/en/")) echo ''; else echo ''; echo 'w-ibeda'; } elseif ($_SERVER[HTTP_HOST] == "update1.hp-telecom.com") { echo ''; echo 'hp-telecom'; } elseif ($_SERVER[HTTP_HOST] == "update1.maipu.com") { echo ''; echo 'Maipu'; } elseif ($_SERVER[HTTP_HOST] == "update1.ncurity.com") { echo ''; echo 'Ncurity'; } elseif ($_SERVER[HTTP_HOST] == "update1.socusnetwork.com") { echo ''; echo 'Socusnetwork'; } else{ echo ''; echo 'Hillstone Networks'; } ?>
 
   
 

RULE(RULE ID:323281)

Rule General Information
Release Date: 2019-09-19
Rule Name: Oracle Java Web Start JNLP java-vm-args Command Argument Injection Vulnerability (CVE-2012-0500)
Severity:
CVE ID:
Rule Protection Details
Description: Oracle Java SE is a standard version of the Java platform that provides users with a program development environment. This program development environment provides development tools such as compilers for developing and running Java software, software libraries and Java virtual machines. It is also the foundation of the Java 2 platform, Enterprise Edition, and Java Web Services. An unknown vulnerability exists in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, and JavaFX 2.0.2 and earlier. The vulnerability allows remote untrusted Java Web Start applications and untrusted Java applets to affect the confidentiality, integrity, and availability of unknown deployment-related vectors.
Impact: An attacker could exploit this vulnerability to have unspecified effect.
Affected OS: Windows, Others
Reference: SecurityFocusBID:52015
http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00010.html
http://marc.info/?l=bugtraq&m=133364885411663&w=2
http://marc.info/?l=bugtraq&m=133847939902305&w=2
Solutions
The vendors have released upgrade patches to fix vulnerabilities, please visit:
http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html