Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
sun sdk 1.4.2 2 vulnerabilities and exploits
(subscribe to this query)
4.6
CVSSv2
CVE-2003-1156
Java Runtime Environment (JRE) and Software Development Kit (SDK) 1.4.2 up to and including 1.4.2_02 allows local users to overwrite arbitrary files via a symlink attack on (1) unpack.log, as created by the unpack program, or (2) .mailcap1 and .mime.types1, as created by the RPM ...
Sun Jre 1.4.2
Sun Jdk 1.4.2
Sun Jdk 1.4.2 02
5
CVSSv2
CVE-2004-2540
readObject in (1) Java Runtime Environment (JRE) and (2) Software Development Kit (SDK) 1.4.0 up to and including 1.4.2_05 allows remote malicious users to cause a denial of service (JVM unresponsive) via crafted serialized data.
Sun Jdk 1.4.0 03
Sun Jdk 1.4.1 01
Sun Jdk 1.4.1 03
Sun Jdk 1.4.2
Sun Jdk 1.4.2 03
Sun Jdk 1.4.2 04
Sun Jdk 1.4
Sun Jre 1.4.0 01
Sun Jre 1.4.0 03
Sun Jre 1.4.0 04
Sun Jre 1.4.1
Sun Jre 1.4.1 01
Sun Jre 1.4.2
Sun Jdk 1.4.0 01
Sun Jdk 1.4.0 02
Sun Jdk 1.4.0 4
Sun Jdk 1.4.1
Sun Jdk 1.4.1 02
Sun Jdk 1.4.2 01
Sun Jdk 1.4.2 02
Sun Jdk 1.4.2 05
Sun Jre 1.4.0 02
9.3
CVSSv2
CVE-2004-1029
The Sun Java Plugin capability in Java 2 Runtime Environment (JRE) 1.4.2_01, 1.4.2_04, and possibly earlier versions, does not properly restrict access between Javascript and Java applets during data transfer, which allows remote malicious users to load unsafe classes and execute...
Hp Java Sdk-rte 1.3
Sun Jdk 1.3.1 02
Sun Jdk 1.3.1 03
Sun Jdk 1.3.1 06
Sun Jdk 1.4.0 02
Sun Jdk 1.4.0 03
Sun Jdk 1.4.1
Sun Jdk 1.4.1 03
Sun Jdk 1.4.2 03
Sun Jdk 1.4
Sun Jre 1.3.0
Sun Jre 1.3.1
Sun Jre 1.3.1 02
Sun Jre 1.3.1 05
Sun Jre 1.3.1 06
Sun Jre 1.3.1 09
Sun Jre 1.4.0 03
Sun Jre 1.4.1
Sun Jre 1.4.1 07
Sun Jre 1.4.2
Conectiva Linux 10.0
Sun Jdk 1.3.1 05
1 EDB exploit
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-5324
path traversal
CVE-2024-4743
CVE-2024-5184
TCP
CVE-2024-27822
code injection
CVE-2024-28995
CVE-2023-20938
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3