![]() ![]() CVSS 3.0 Base Score 5.9 (Confidentiality impacts). It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. ![]() This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. Changelog for java-180-openjdk-javadoc-1.8.0.322-3.64.2.noarch.rpm: Sat - Update to version jdk8u322 (icedtea-3.22. Note: This vulnerability applies to client and server deployment of Java. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded, JRockit accessible data. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1 Java SE Embedded: 8u151 JRockit: R28.3.16. Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JCE). See How to fix? for Centos:6 relevant versions. Note: Versions mentioned in the description apply to the upstream java-1.8.0-openjdk-devel-debug package. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |