Java Exploits

359 exploits tracked across all sources.

Sort: Activity Stars
CVE-2018-3245 EXPLOITDB CRITICAL java
Oracle WebLogic Server <12.2.1.3 - RCE
Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: WLS Core Components). Supported versions that are affected are 10.3.6.0, 12.1.3.0 and 12.2.1.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via T3 to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
by allyshka
CVSS 9.8
CVE-2017-8046 EXPLOITDB CRITICAL java
Vmware Spring Boot < 1.5.9 - Improper Input Validation
Malicious PATCH requests submitted to servers using Spring Data REST versions prior to 2.6.9 (Ingalls SR9), versions prior to 3.0.1 (Kay SR1) and Spring Boot versions prior to 1.5.9, 2.0 M6 can use specially crafted JSON data to run arbitrary Java code.
by Antonio Francesco Sardella
CVSS 9.8
CVE-2017-0784 GITHUB HIGH java
Android <7.1.2 - Privilege Escalation
A elevation of privilege vulnerability in the Android system (nfc). Product: Android. Versions: 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2. Android ID: A-37287958.
by heeeeen
5 stars
CVSS 8.8
CVE-2017-0645 GITHUB MEDIUM java
Android <7.1.2 - Privilege Escalation
An elevation of privilege vulnerability in Bluetooth could enable a local malicious application to access data outside of its permission levels. This issue is rated as Moderate because it is a local bypass of user interaction requirements. Product: Android. Versions: 6.0.1, 7.0, 7.1.1, 7.1.2. Android ID: A-35385327.
by heeeeen
5 stars
CVSS 5.5
CVE-2017-0601 GITHUB MEDIUM java
Google Android - Incorrect Permission Assignment
An Elevation of Privilege vulnerability in Bluetooth could potentially enable a local malicious application to accept harmful files shared via bluetooth without user permission. This issue is rated as Moderate due to local bypass of user interaction requirements. Product: Android. Versions: 7.0, 7.1.1, 7.1.2. Android ID: A-35258579.
by heeeeen
5 stars
CVSS 5.5
CVE-2017-5586 EXPLOITDB CRITICAL java
Opentext Documentum D2 - Improper Input Validation
OpenText Documentum D2 (formerly EMC Documentum D2) 4.x allows remote attackers to execute arbitrary commands via a crafted serialized Java object, related to the BeanShell (bsh) and Apache Commons Collections (ACC) libraries.
by Andrey B. Panfilov
CVSS 9.8
EIP-2026-100045 EXPLOITDB java VERIFIED
Samsung Devices KNOX Extensions - OTP TrustZone Trustlet Stack Buffer Overflow
by Google Security Research
EIP-2026-100044 EXPLOITDB java VERIFIED
Samsung Devices KNOX Extensions - OTP Service Heap Overflow
by Google Security Research
EIP-2026-118129 EXPLOITDB java VERIFIED
WinPower 4.9.0.4 - Local Privilege Escalation
by Kacper Szurek
EIP-2026-102382 EXPLOITDB java
JBoss JMXInvokerServlet JMXInvoker 0.3 - Remote Command Execution
by ikki
CVE-2014-2227 EXPLOITDB java VERIFIED
Ubiquiti Networks UniFi Video <3.0.1 - CSRF
The default Flash cross-domain policy (crossdomain.xml) in Ubiquiti Networks UniFi Video (formerly AirVision aka AirVision Controller) before 3.0.1 does not restrict access to the application, which allows remote attackers to bypass the Same Origin Policy via a crafted SWF file.
by Seth Art
CVE-2013-1727 EXPLOITDB java VERIFIED
Mozilla Firefox < 23.0.1 - XSS
Mozilla Firefox before 24.0 on Android allows attackers to bypass the Same Origin Policy, and consequently conduct cross-site scripting (XSS) attacks or obtain password or cookie information, by using a symlink in conjunction with a file: URL for a local file.
by Takeshi Terada
EIP-2026-104677 EXPLOITDB java
phpLDAPadmin 0.9.4b - Denial of Service
by Alguien
CVE-2011-2357 EXPLOITDB java VERIFIED
Google Android - Improper Input Validation
Cross-application scripting vulnerability in the Browser URL loading functionality in Android 2.3.4 and 3.1 allows local applications to bypass the sandbox and execute arbitrary Javascript in arbitrary domains by (1) causing the MAX_TAB number of tabs to be opened, then loading a URI to the targeted domain into the current tab, or (2) making two startActivity function calls beginning with the targeted domain's URI followed by the malicious Javascript while the UI focus is still associated with the targeted domain.
by Roee Hay
EIP-2026-104140 EXPLOITDB java VERIFIED
Zend Java Bridge - Remote Code Execution
by ikki
CVE-2009-3867 EXPLOITDB java VERIFIED
Sun Java JRE getSoundbank file:// URI Buffer Overflow
Stack-based buffer overflow in the HsbParser.getSoundBank function in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to execute arbitrary code via a long file: URL in an argument, aka Bug Id 6854303.
by Tometzky
CVE-2009-3867 EXPLOITDB java VERIFIED
Sun Java JRE getSoundbank file:// URI Buffer Overflow
Stack-based buffer overflow in the HsbParser.getSoundBank function in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to execute arbitrary code via a long file: URL in an argument, aka Bug Id 6854303.
by Tometzky
EIP-2026-117214 EXPLOITDB java VERIFIED
FTPShell Client 4.1 RC2 - Name Session Stack Overflow
by zec
CVE-2008-5659 EXPLOITDB java VERIFIED
GNU Classpath <0.97.2 - Info Disclosure
The gnu.java.security.util.PRNG class in GNU Classpath 0.97.2 and earlier uses a predictable seed based on the system time, which makes it easier for context-dependent attackers to conduct brute force attacks against cryptographic routines that use this class for randomness, as demonstrated against DSA private keys.
by Jack Lloyd
CVE-2008-4910 EXPLOITDB java VERIFIED
SUN Java Web Start - Improper Input Validation
The BasicService in Sun Java Web Start allows remote attackers to execute arbitrary programs on a client machine via a file:// URL argument to the showDocument method.
by Varun Srivastava
CVE-2008-0455 EXPLOITDB java VERIFIED
Apache HTTP Server < 2.2.23 - XSS
Cross-site scripting (XSS) vulnerability in the mod_negotiation module in the Apache HTTP Server 2.2.6 and earlier in the 2.2.x series, 2.0.61 and earlier in the 2.0.x series, and 1.3.39 and earlier in the 1.3.x series allows remote authenticated users to inject arbitrary web script or HTML by uploading a file with a name containing XSS sequences and a file extension, which leads to injection within a (1) "406 Not Acceptable" or (2) "300 Multiple Choices" HTTP response when the extension is omitted in a request for the file.
by Stefano Di Paola
CVE-2007-5636 EXPLOITDB java VERIFIED
Nortel IP Softphone 2050 - Memory Corruption
Buffer overflow in the Nortel UNIStim IP Softphone 2050 allows remote attackers to cause a denial of service (application abort) and possibly execute arbitrary code via a flood of invalid characters to the RTCP port (5678/udp) that triggers a Windows error message, aka "extraneous messaging."
by Cyrill Brunschwiler
CVE-2007-4920 EXPLOITDB java VERIFIED
Php Webquest < 2.5 - SQL Injection
SQL injection vulnerability in soporte_derecha_w.php in PHP Webquest 2.5 and earlier allows remote attackers to execute arbitrary SQL commands via the id_actividad parameter.
by D4real_TeaM
CVE-2007-4385 EXPLOITDB java VERIFIED
OWASP Stinger <2.5 - Auth Bypass
OWASP Stinger before 2.5 allows remote attackers to bypass input validation routines by using multipart encoded requests instead of form-urlencoded requests. NOTE: this might be used to expose vulnerabilities in applications that would otherwise be protected by the validation routines.
by Meder Kydyraliev
CVE-2007-0243 EXPLOITDB java VERIFIED
SUN Jdk < 1.5.0 - Memory Corruption
Buffer overflow in Sun JDK and Java Runtime Environment (JRE) 5.0 Update 9 and earlier, SDK and JRE 1.4.2_12 and earlier, and SDK and JRE 1.3.1_18 and earlier allows applets to gain privileges via a GIF image with a block with a 0 width field, which triggers memory corruption.
by luoluo