Total vulnerabilities in the database
Sun Java Runtime Environment (JRE) and SDK 1.4.0_01 and earlier allows untrusted applets to access certain information within trusted applets, which allows attackers to bypass the restrictions of the Java security model.
Software | From | Fixed in |
---|---|---|
sun / jdk | 1.2.2_10 | 1.2.2_10.x |
sun / jre | 1.3.1_03 | 1.3.1_03.x |
sun / jre | 1.4.0_01 | 1.4.0_01.x |
sun / jre | 1.2.2_011 | 1.2.2_011.x |
sun / jdk | 1.3.1_01 | 1.3.1_01.x |
sun / jdk | 1.3.0_05 | 1.3.0_05.x |
sun / jdk | 1.3.0_02 | 1.3.0_02.x |
sun / jdk | 1.2.2_11 | 1.2.2_11.x |
sun / jdk | 1.4.0_01 | 1.4.0_01.x |
sun / jre | 1.3.0 | 1.3.0.x |
sun / jre | 1.3.1-update1 | 1.3.1-update1.x |
sun / jdk | 1.3.1_03 | 1.3.1_03.x |
sun / jdk | 1.4 | 1.4.x |
sun / jre | 1.3.1-update4 | 1.3.1-update4.x |
sun / jre | 1.4 | 1.4.x |
sun / jre | 1.2.2 | 1.2.2.x |
sun / jre | 1.3.0-update5 | 1.3.0-update5.x |
sun / jdk | 1.3.1_04 | 1.3.1_04.x |
sun / jdk | 1.3 | 1.3.x |
sun / jre | 1.2.2-update10 | 1.2.2-update10.x |
sun / jre | 1.2.2_003 | 1.2.2_003.x |
sun / jre | 1.3.0-update2 | 1.3.0-update2.x |
sun / jre | 1.3.1 | 1.3.1.x |
sun / jdk | 1.2.2 | 1.2.2.x |
sun / jdk | 1.2.2_12 | 1.2.2_12.x |
sun / jdk | 1.3.1_01a | 1.3.1_01a.x |
sun / jre | 1.3.0-update4 | 1.3.0-update4.x |
sun / jre | 1.2.2_012 | 1.2.2_012.x |