Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
oracle jrockit r28.0.0 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2013-2380
Unspecified vulnerability in the Oracle JRockit component in Oracle Fusion Middleware R27.7.4 and previous versions and R28.2.6 and previous versions allows remote malicious users to affect confidentiality, integrity, and availability via unknown vectors. NOTE: this might be a du...
Oracle Jrockit R27.3
Oracle Jrockit R28.1.0
Oracle Jrockit R28.1.1
Oracle Jrockit R28.1.3
Oracle Jrockit R27.3.1
Oracle Jrockit R28.0.1
Oracle Fusion Middleware -
Oracle Jrockit R27.2
Oracle Jrockit
Oracle Jrockit R28.0.2
Oracle Jrockit R27.1
Oracle Jrockit R28.0.0
Oracle Jrockit R28.1.4
NA
CVE-2011-3551
Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and previous versions, and JRockit R28.1.4 and previous versions allows remote malicious users to affect confidentiality, integrity, and availability via unknown vecto...
Sun Jre 1.7.0
Sun Jdk 1.7.0
Oracle Jrockit
Oracle Jrockit R28.1.0
Oracle Jrockit R28.1.1
Oracle Jrockit R28.1.3
Oracle Jrockit R28.0.1
Oracle Jrockit R28.0.2
Oracle Jrockit R28.0.0
Sun Jdk 1.6.0
Sun Jre 1.6.0
Sun Jre
Sun Jdk
NA
CVE-2011-3553
Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and previous versions, and JRockit R28.1.4 and previous versions allows remote authenticated users to affect confidentiality, related to JAXWS.
Sun Jre 1.7.0
Sun Jdk 1.7.0
Oracle Jrockit
Oracle Jrockit R28.1.0
Oracle Jrockit R28.1.1
Oracle Jrockit R28.1.3
Oracle Jrockit R28.0.1
Oracle Jrockit R28.0.2
Oracle Jrockit R28.0.0
Sun Jdk 1.6.0
Sun Jre 1.6.0
Sun Jre
Sun Jdk
NA
CVE-2011-3556
Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and previous versions, 5.0 Update 31 and previous versions, 1.4.2_33 and previous versions, and JRockit R28.1.4 and previous versions allows remote malicious users to ...
Sun Jre 1.7.0
Sun Jdk 1.7.0
Oracle Jrockit
Oracle Jrockit R28.1.0
Oracle Jrockit R28.1.1
Oracle Jrockit R28.1.3
Oracle Jrockit R28.0.1
Oracle Jrockit R28.0.2
Oracle Jrockit R28.0.0
Sun Jdk 1.6.0
Sun Jre 1.6.0
Sun Jre
Sun Jdk
Sun Jre 1.5.0
Sun Jdk 1.5.0
Sun Jre 1.4.2 26
Sun Jdk 1.4.2 13
Sun Jdk 1.4.2 30
Sun Jre 1.4.2 7
Sun Jre 1.4.2 27
Sun Jdk 1.4.2 12
Sun Jdk 1.4.2 31
1 EDB exploit
1 Github repository
NA
CVE-2011-3557
Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and previous versions, 5.0 Update 31 and previous versions, 1.4.2_33 and previous versions, and JRockit R28.1.4 and previous versions allows remote malicious users to ...
Sun Jre 1.7.0
Sun Jdk 1.7.0
Oracle Jrockit
Oracle Jrockit R28.1.0
Oracle Jrockit R28.1.1
Oracle Jrockit R28.1.3
Oracle Jrockit R28.0.1
Oracle Jrockit R28.0.2
Oracle Jrockit R28.0.0
Sun Jdk 1.6.0
Sun Jre 1.6.0
Sun Jre
Sun Jdk
Sun Jre 1.5.0
Sun Jdk 1.5.0
Sun Jre 1.4.2 26
Sun Jdk 1.4.2 13
Sun Jdk 1.4.2 30
Sun Jre 1.4.2 7
Sun Jre 1.4.2 27
Sun Jdk 1.4.2 12
Sun Jdk 1.4.2 31
NA
CVE-2011-3545
Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 6 Update 27 and previous versions, 5.0 Update 31 and previous versions, and 1.4.2_33 and previous versions, and JRockit R28.1.4 and previous versions, allows remote malicious users t...
Oracle Jrockit
Oracle Jrockit R28.1.0
Oracle Jrockit R28.1.1
Oracle Jrockit R28.1.3
Oracle Jrockit R28.0.1
Oracle Jrockit R28.0.2
Oracle Jrockit R28.0.0
Sun Jdk 1.6.0
Sun Jre 1.6.0
Sun Jre
Sun Jdk
Sun Jre 1.5.0
Sun Jdk 1.5.0
Sun Jre 1.4.2 26
Sun Jdk 1.4.2 13
Sun Jdk 1.4.2 30
Sun Jre 1.4.2 7
Sun Jre 1.4.2 27
Sun Jdk 1.4.2 12
Sun Jdk 1.4.2 31
Sun Jre 1.4.2 16
Sun Jdk 1.4.2 3
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
type confusion
IMAP
CVE-2024-36103
CVE-2024-28995
CVE-2024-37325
CVE-2024-30078
CVE-2024-30082
SQL injection
CVE-2024-30052
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started