An attacker could use this to specially construct a jpeg image file that when opened by a Java application would cause a denial of service. (CVE-2017-10053)
An attacker could use this to modify the signed contents of a JAR file. (CVE-2017-10067)
An attacker could use this to specially construct an untrusted Java application or applet that could escape sandbox restrictions and cause a denial of service or possibly execute arbitrary code. (CVE-2017-10074)
An attacker could use this to specially craft JavaScript code to bypass access restrictions. (CVE-2017-10078)
An attacker could use this to specially construct an untrusted Java application or applet that could escape sandbox restrictions. (CVE-2017-10081)
An attacker could use this to specially construct an untrusted Java application or applet that could escape sandbox restrictions and possibly execute arbitrary code. (CVE-2017-10087)
An attacker could use this to specially construct an untrusted Java application or applet that escaped sandbox restrictions. (CVE-2017-10089)
An attacker could use this to specially construct an untrusted Java application or applet that could escape sandbox restrictions. (CVE-2017-10090)
An attacker could use this to specially construct an untrusted Java application or applet that could escape sandbox restrictions. (CVE-2017-10096)
An attacker could use this to specially construct an untrusted Java application or applet that could escape sandbox restrictions. (CVE-2017-10101)
A remote attacker could possibly use this to execute arbitrary code. (CVE-2017-10102)
An attacker could use this to specially construct an untrusted Java application or applet that could escape sandbox restrictions. (CVE-2017-10107)
An attacker could use this to cause a denial of service (memory consumption). (CVE-2017-10108)
An attacker could use this to cause a denial of service (memory consumption). (CVE-2017-10109)
An attacker could use this to specially construct an untrusted Java application or applet that could escape sandbox restrictions (CVE-2017-10110)
An attacker could use this to specially construct an untrusted Java application or applet that could escape sandbox restrictions and possibly execute arbitrary code. (CVE-2017-10111)
An attacker could use this to expose sensitive information. (CVE-2017-10115)
An attacker could use this to specially craft an LDAP referral URL that exposes sensitive information or bypass access restrictions. (CVE-2017-10116)
An attacker could use this to expose sensitive information. (CVE-2017-10118)
An attacker could use this to expose sensitive information. (CVE-2017-10135)
An attacker could use this to expose sensitive information. (CVE-2017-10176)
An attacker could use this to specially construct an untrusted Java application or applet that could escape sandbox restrictions. (CVE-2017-10193)
An attacker could use this to expose sensitive information or escape sandbox restrictions. (CVE-2017-10198)
An attacker could use this to expose sensitive information. (CVE-2017-10243)