Show filters
156 Total Results
Displaying 151-156 of 156
Sort by:
Attacker Value
Unknown
CVE-2014-0453
Disclosure Date: April 16, 2014 (last updated October 05, 2023)
Unspecified vulnerability in Oracle Java SE 5.0u61, 6u71, 7u51, and 8; JRockit R27.8.1 and R28.3.1; and Java SE Embedded 7u51 allows remote attackers to affect confidentiality and integrity via unknown vectors related to Security.
0
Attacker Value
Unknown
CVE-2014-2398
Disclosure Date: April 16, 2014 (last updated October 05, 2023)
Unspecified vulnerability in Oracle Java SE 5.0u61, 6u71, 7u51, and 8; JavaFX 2.2.51; and JRockit R27.8.1 and R28.3.1 allows remote authenticated users to affect integrity via unknown vectors related to Javadoc.
0
Attacker Value
Unknown
CVE-2014-0429
Disclosure Date: April 16, 2014 (last updated October 05, 2023)
Unspecified vulnerability in Oracle Java SE 5.0u61, 6u71, 7u51, and 8; JRockit R27.8.1 and R28.3.1; and Java SE Embedded 7u51 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.
0
Attacker Value
Unknown
CVE-2014-0446
Disclosure Date: April 16, 2014 (last updated October 05, 2023)
Unspecified vulnerability in Oracle Java SE 5.0u61, 6u71, 7u51, and 8, and Java SE Embedded 7u51, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries.
0
Attacker Value
Unknown
CVE-2009-2625
Disclosure Date: August 06, 2009 (last updated October 04, 2023)
XMLScanner.java in Apache Xerces2 Java, as used in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15 and JDK and JRE 5.0 before Update 20, and in other products, allows remote attackers to cause a denial of service (infinite loop and application hang) via malformed XML input, as demonstrated by the Codenomicon XML fuzzing framework.
0
Attacker Value
Unknown
CVE-2004-1029
Disclosure Date: March 01, 2005 (last updated February 22, 2025)
The Sun Java Plugin capability in Java 2 Runtime Environment (JRE) 1.4.2_01, 1.4.2_04, and possibly earlier versions, does not properly restrict access between Javascript and Java applets during data transfer, which allows remote attackers to load unsafe classes and execute arbitrary code by using the reflection API to access private Java packages.
0