Vulnerabilities > SUN > JDK > 1.4.2.24

DATE CVE VULNERABILITY TITLE RISK
2011-06-14 CVE-2011-0815 Remote Java Runtime Environment vulnerability in SUN JDK and JRE
Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 6 Update 25 and earlier, 5.0 Update 29 and earlier, and 1.4.2_31 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to AWT.
network
low complexity
sun
critical
10.0
2011-06-14 CVE-2011-0814 Remote Java Runtime Environment vulnerability in SUN JDK and JRE
Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 6 Update 25 and earlier, 5.0 Update 29 and earlier, and 1.4.2_31 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Sound, a different vulnerability than CVE-2011-0802.
network
low complexity
sun
critical
10.0
2011-06-14 CVE-2011-0802 Remote Integer Overflow vulnerability in SUN JDK and JRE
Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 6 Update 25 and earlier, 5.0 Update 29 and earlier, and 1.4.2_31 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Sound, a different vulnerability than CVE-2011-0814.
network
low complexity
sun
critical
10.0
2008-03-06 CVE-2008-1191 Unspecified vulnerability in SUN JDK and JRE
Unspecified vulnerability in Java Web Start in Sun JDK and JRE 6 Update 4 and earlier allows remote attackers to create arbitrary files via an untrusted application, a different issue than CVE-2008-1190, aka "The fifth issue."
network
sun
6.8
2008-02-07 CVE-2008-0657 Permissions, Privileges, and Access Controls vulnerability in SUN JDK and JRE
Multiple unspecified vulnerabilities in the Java Runtime Environment in Sun JDK and JRE 6 Update 1 and earlier, and 5.0 Update 13 and earlier, allow context-dependent attackers to gain privileges via an untrusted (1) application or (2) applet, as demonstrated by an application or applet that grants itself privileges to (a) read local files, (b) write to local files, or (c) execute local programs.
network
low complexity
sun CWE-264
critical
10.0