The host is installed with Sun JDK or JRE 6 Update 10 or earlier, 5.0 Update 16 or earlier or 1.4.2_18 or earlier and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle unknown vectors. Successful exploitation could allow attackers to crash the service.
The host is installed with Sun JDK or JRE 6 Update 10 or earlier or 5.0 Update 16 or earlier and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle a crafted RSA public key. Successful exploitation could allow attackers to crash the service.
The host is installed with Sun JDK or JRE 6 Update 10 or earlier, 5.0 Update 16 or earlier or 1.4.2_18 or earlier and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle untrusted applications and applets. Successful exploitation could allow attackers to list the contents of the operating user's directory via unknown vectors.
The host is installed with Sun JDK or JRE 6 Update 10 or earlier, 5.0 Update 16 or earlier or 1.4.2_18 or earlier and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle untrusted applications and applets. Successful exploitation could allow attackers to list the contents of the operating user's directory via unknown vectors.
The host is installed with Sun JDK or JRE 6 Update 10 or earlier, 5.0 Update 16 or earlier and is prone to an integer overflow vulnerability. A flaw is present in the application, which fails to properly handle untrusted applications and applets. Successful exploitation could allow attackers to gain privileges.
The host is installed with Sun JDK or JRE 6 Update 10 or earlier, 5.0 Update 16 or earlier or 1.4.2_18 or earlier and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly enforce context of ZoneInfo objects during deserialization. Successful exploitation could allow attackers to run untrusted applets and applications.
The host is installed with Sun JDK or JRE 6 Update 10 or earlier, 5.0 Update 16 or earlier or 1.4.2_18 or earlier and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly enforce context of ZoneInfo objects during deserialization. Successful exploitation could allow attackers to run untrusted applets and applications.
The host is installed with Sun JDK or JRE 6 Update 10 or earlier and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a crafted GIF file. Successful exploitation triggers memory corruption during display of the splash screen.
The host is installed with Sun JDK or JRE 6 Update 10 or earlier, 5.0 Update 16 or earlier, 1.4.2_18 or earlier or 1.3.1_23 or earlier and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle a crafted TrueType font file. Successful exploitation could allow attackers to execute arbitrary code.
The host is installed with Sun JDK or JRE 6 Update 10 or earlier, 5.0 Update 16 or earlier, 1.4.2_18 or earlier or 1.3.1_23 or earlier and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly handle malicious JAR files. Successful exploitation could allow attackers to creates temporary files with predictable file names.