
CVE-2004-0651
https://notcve.org/view.php?id=CVE-2004-0651
13 Jul 2004 — Unknown vulnerability in Sun Java Runtime Environment (JRE) 1.4.2 through 1.4.2_03 allows remote attackers to cause a denial of service (virtual machine hang). Vulnerabilidad desconocida en Sun Java Runtime Environment (JRE) 1.4.2 a 1.4.2_03 permite a atacantes remotos causar una denegación de servicio (cuelgue de la máquina virtual). • http://marc.info/?l=bugtraq&m=108559041910233&w=2 •

CVE-2003-1301
https://notcve.org/view.php?id=CVE-2003-1301
31 Dec 2003 — Sun Java Runtime Environment (JRE) 1.x before 1.4.2_11 and 1.5.x before 1.5.0_06, and as used in multiple web browsers, allows remote attackers to cause a denial of service (application crash) via deeply nested object arrays, which are not properly handled by the garbage collector and trigger invalid memory accesses. • http://bugs.sun.com/bugdatabase/view_bug.do?bug_id=4396719 •

CVE-2003-1156
https://notcve.org/view.php?id=CVE-2003-1156
31 Dec 2003 — Java Runtime Environment (JRE) and Software Development Kit (SDK) 1.4.2 through 1.4.2_02 allows local users to overwrite arbitrary files via a symlink attack on (1) unpack.log, as created by the unpack program, or (2) .mailcap1 and .mime.types1, as created by the RPM program. • http://www.securityfocus.com/archive/1/343038 •

CVE-2003-1123 – Sun JRE/SDK 1.x - Untrusted Applet Java Security Model Violation
https://notcve.org/view.php?id=CVE-2003-1123
31 Dec 2003 — Sun Java Runtime Environment (JRE) and SDK 1.4.0_01 and earlier allows untrusted applets to access certain information within trusted applets, which allows attackers to bypass the restrictions of the Java security model. • https://www.exploit-db.com/exploits/22732 •

CVE-2003-1229
https://notcve.org/view.php?id=CVE-2003-1229
31 Dec 2003 — X509TrustManager in (1) Java Secure Socket Extension (JSSE) in SDK and JRE 1.4.0 through 1.4.0_01, (2) JSSE before 1.0.3, (3) Java Plug-in SDK and JRE 1.3.0 through 1.4.1, and (4) Java Web Start 1.0 through 1.2 incorrectly calls the isClientTrusted method when determining server trust, which results in improper validation of digital certificate and allows remote attackers to (1) falsely authenticate peers for SSL or (2) incorrectly validate signed JAR files. • http://archives.neohapsis.com/archives/bugtraq/2003-01/0334.html • CWE-295: Improper Certificate Validation •

CVE-2003-0896 – Sun Java Virtual Machine 1.x - Slash Path Security Model Circumvention
https://notcve.org/view.php?id=CVE-2003-0896
25 Oct 2003 — The loadClass method of the sun.applet.AppletClassLoader class in the Java Virtual Machine (JVM) in Sun SDK and JRE 1.4.1_03 and earlier allows remote attackers to bypass sandbox restrictions and execute arbitrary code via a loaded class name that contains "/" (slash) instead of "." (dot) characters, which bypasses a call to the Security Manager's checkPackageAccess method. El método loadClass de la clase sun.applet.AppletClassLoader en la Máquina Virtual de Java (JVM) en Sun SDK y JRE 1.4.1_03 y anteriores... • https://www.exploit-db.com/exploits/23276 •

CVE-2002-2072 – Sun Java Virtual Machine 1.2.2/1.3.1 - Segmentation Violation
https://notcve.org/view.php?id=CVE-2002-2072
31 Dec 2002 — java.security.AccessController in Sun Java Virtual Machine (JVM) in JRE 1.2.2 and 1.3.1 allows remote attackers to cause a denial of service (JVM crash) via a Java program that calls the doPrivileged method with a null argument. • https://www.exploit-db.com/exploits/21259 •

CVE-2002-0076
https://notcve.org/view.php?id=CVE-2002-0076
19 Mar 2002 — Java Runtime Environment (JRE) Bytecode Verifier allows remote attackers to escape the Java sandbox and execute commands via an applet containing an illegal cast operation, as seen in (1) Microsoft VM build 3802 and earlier as used in Internet Explorer 4.x and 5.x, (2) Netscape 6.2.1 and earlier, and possibly other implementations that use vulnerable versions of SDK or JDK, aka a variant of the "Virtual Machine Verifier" vulnerability. El verificador de bytecode del "Java Runtime Enviroment" (entorno de eje... • http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/218 •

CVE-2002-0058
https://notcve.org/view.php?id=CVE-2002-0058
07 Mar 2002 — Vulnerability in Java Runtime Environment (JRE) allows remote malicious web sites to hijack or sniff a web client's sessions, when an HTTP proxy is being used, via a Java applet that redirects the session to another server, as seen in (1) Netscape 6.0 through 6.1 and 4.79 and earlier, (2) Microsoft VM build 3802 and earlier as used in Internet Explorer 4.x and 5.x, and possibly other implementations that use vulnerable versions of SDK or JDK. Esta vulnerabilidad en el "Java Runtime Enviroment" (entorno de e... • http://marc.info/?l=bugtraq&m=101534535304228&w=2 •

CVE-2001-1480
https://notcve.org/view.php?id=CVE-2001-1480
31 Dec 2001 — Java Runtime Environment (JRE) and SDK 1.2 through 1.3.0_04 allows untrusted applets to access the system clipboard. • http://cert.uni-stuttgart.de/archive/bugtraq/2001/10/msg00120.html •