we track for your security since 1999
The Vigil@nce team watches vulnerabilities impacting your computers, and then offers solutions, a database and tools to correct them.
Vulnerabilities of Sun J2SE
Sun J2SE vulnerability: code execution via MethodHandle
An attacker can create a malicious applet, using MethodHandle and sun.misc.reflect.Trampoline, in order to execute arbitrary Java code.
Sun J2SE vulnerability: several vulnerabilities
Several vulnerabilities of Java JRE/JDK can be used by a malicious applet/application in order to execute code or to obtain information. A legitimate applet/application, handling malicious data, can also be forced to execute code.
Sun J2SE vulnerability: code execution via Java Plug-in
An attacker can create an HTML page containing a malicious Java applet, in order to execute code on victim's computer.
Sun J2SE vulnerability: file access via BasicService
A Java application can use BasicService of Java Web Start in order to open a document.
Sun J2SE vulnerability: code execution via XSLT style sheets
When a XML signature contains a malicious style sheet, code can run with privileges of application.
Display other vulnerabilities of Sun J2SE described by Vigil@nce...
Display information about Sun J2SE:
. Vigil@nce is a service from
Orange Business Services