This indicates an attack attempt to exploit a Memory Corruption vulnerability in Oracle Java.
The vulnerability is due to improper validation when the vulnerable application handles malicious java files. An attacker can exploit this by tricking an unsuspecting user into visiting a webpage contains a malicious file and executes arbitrary code within the context of the logged in user.
Oracle Java SE 5.0u65
Oracle Java SE 6u75
Oracle Java SE 7u60
Oracle Java SE 8u5
System Compromise: Remote attackers can gain control of vulnerable systems.
Apply the most recent upgrade or patch from the vendor.