Multiple memory corruptions, code execution, certificate spoofing, .jar files signature spoofing, etc.
vulners.com/securityvulns/securityvulns:doc:20108
vulners.com/securityvulns/securityvulns:doc:20109
vulners.com/securityvulns/securityvulns:doc:20110
vulners.com/securityvulns/securityvulns:doc:20111
vulners.com/securityvulns/securityvulns:doc:20112
vulners.com/securityvulns/securityvulns:doc:20113
vulners.com/securityvulns/securityvulns:doc:20114
vulners.com/securityvulns/securityvulns:doc:20115
vulners.com/securityvulns/securityvulns:doc:20116
vulners.com/securityvulns/securityvulns:doc:20117
vulners.com/securityvulns/securityvulns:doc:20118
vulners.com/securityvulns/securityvulns:doc:20119