The first vulnerability involves the Java Database Connectivity (JDBC) classes, which provide features that allow Java applications to connect to and use data from a wide variety of data sources, ranging from flat files to SQL Server databases.
The second vulnerability also involves the JDBC classes, and occurs because certain functions in the classes don’t correctly validate handles that are provided as input.
The third vulnerability involves a class that provides support for the use of XML by Java applications.
|