This document summarizes a white paper about filtering Java vulnerabilities. It describes 3 commonly exploited Java vulnerabilities - CVE-2012-0507, CVE-2013-2465, and CVE-2012-1723. For each vulnerability, it provides technical details on how the vulnerability works and how exploit kits leverage it. It also shows graphs of the prevalence of exploits against these vulnerabilities and discusses how the exploits are used to deliver malware payloads through hidden requests in exploit kit traffic.