Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
sun jdk 1.1.8 vulnerabilities and exploits
(subscribe to this query)
668
VMScore
CVE-2002-0076
Java Runtime Environment (JRE) Bytecode Verifier allows remote malicious users to escape the Java sandbox and execute commands via an applet containing an illegal cast operation, as seen in (1) Microsoft VM build 3802 and previous versions as used in Internet Explorer 4.x and 5.x...
Hp Java Jre-jdk 1.1.8
Hp Java Jre-jdk 1.2.2
Sun Jre 1.2.2
Sun Jre 1.3.0
Sun Jre 1.1.8
Hp Java Jre-jdk 1.3
Microsoft Virtual Machine 3802
Sun Jre 1.3.1
Sun Sdk 1.3.1 01
Sun Sdk 1.3.1 01a
Sun Sdk 1.3 05
Sun Jdk 1.1.8
Sun Sdk 1.2.2 010
Sun Sdk 1.2.2 10
445
VMScore
CVE-2009-1190
Algorithmic complexity vulnerability in the java.util.regex.Pattern.compile method in Sun Java Development Kit (JDK) prior to 1.6, when used with spring.jar in SpringSource Spring Framework 1.1.0 up to and including 2.5.6 and 3.0.0.M1 up to and including 3.0.0.M2 and dm Server 1....
Sun Jdk 1.3.1 11
Sun Jdk 1.3.1 12
Sun Jdk 1.3.1 13
Sun Jdk 1.3.1 06
Sun Jdk 1.3.1 05
Sun Jdk 1.3.0 05
Sun Jdk 1.3.0 04
Sun Jdk 1.3.1 14
Sun Jdk 1.3.0 01
Sun Jdk 1.3.1 04
Sun Jdk 1.3.1 03
Sun Jdk 1.3.0 03
Sun Jdk 1.3.0 02
Sun Jdk 1.1.8
Sun Jdk 1.2.2
Sun Jdk 1.2.1
Sun Jdk 1.3.1 24
Sun Jdk 1.3.1 23
Sun Jdk 1.3.1 21
Sun Jdk 1.3.1 28
Sun Jdk 1.4.2 14
Sun Jdk 1.4.2 13
445
VMScore
CVE-2002-0058
Vulnerability in Java Runtime Environment (JRE) allows remote malicious web sites to hijack or sniff a web client's sessions, when an HTTP proxy is being used, via a Java applet that redirects the session to another server, as seen in (1) Netscape 6.0 up to and including 6.1...
Sun Jre 1.2.2
Sun Jre 1.3.0
Sun Jre 1.1.8
Microsoft Virtual Machine 3802
Sun Sdk 1.1.8 007
Sun Sdk 1.2.2 010
Sun Jdk 1.1.8
Sun Sdk 1.2.2 10
Sun Sdk 1.3 02
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-33228
CVE-2024-20361
log injection
bypass
CVE-2024-4985
CVE-2024-35223
CVE-2024-29849
CVE-2024-31893
IMAP
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started