Количество 29
Количество 29

BDU:2022-03794
Уязвимость компонента JNDI программной платформы Java SE и виртуальной машины Oracle GraalVM Enterprise Edition, позволяющая нарушителю получить доступ на изменение, добавление или удаление данных

ROS-20240529-05
Множественные уязвимости java-17-openjdk

ROS-20240529-04
Множественные уязвимости java-11-openjdk

ROS-20240529-01
Множественные уязвимости java-1.8.0-openjdk

CVE-2022-21496
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JNDI). Supported versions that are affected are Oracle Java SE: 7u331, 8u321, 11.0.14, 17.0.2, 18; Oracle GraalVM Enterprise Edition: 20.3.5, 21.3.1 and 22.0.0.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web servi...

CVE-2022-21496
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JNDI). Supported versions that are affected are Oracle Java SE: 7u331, 8u321, 11.0.14, 17.0.2, 18; Oracle GraalVM Enterprise Edition: 20.3.5, 21.3.1 and 22.0.0.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web servi...

CVE-2022-21496
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JNDI). Supported versions that are affected are Oracle Java SE: 7u331, 8u321, 11.0.14, 17.0.2, 18; Oracle GraalVM Enterprise Edition: 20.3.5, 21.3.1 and 22.0.0.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service
CVE-2022-21496
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition ...
GHSA-ph68-gfg8-7cjx
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JNDI). Supported versions that are affected are Oracle Java SE: 7u331, 8u321, 11.0.14, 17.0.2, 18; Oracle GraalVM Enterprise Edition: 20.3.5, 21.3.1 and 22.0.0.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web servi...

SUSE-SU-2022:2531-1
Security update for java-1_8_0-openjdk

SUSE-SU-2022:2530-1
Security update for java-1_8_0-openjdk

SUSE-SU-2022:1513-1
Security update for java-11-openjdk

SUSE-SU-2022:1474-1
Security update for java-11-openjdk

RLSA-2022:1491
Important: java-1.8.0-openjdk security update

RLSA-2022:1442
Important: java-11-openjdk security update
ELSA-2022-2137
ELSA-2022-2137: java-1.8.0-openjdk security update (IMPORTANT)
ELSA-2022-1728
ELSA-2022-1728: java-11-openjdk security update (IMPORTANT)
ELSA-2022-1491
ELSA-2022-1491: java-1.8.0-openjdk security update (IMPORTANT)
ELSA-2022-1487
ELSA-2022-1487: java-1.8.0-openjdk security, bug fix, and enhancement update (IMPORTANT)
ELSA-2022-1442
ELSA-2022-1442: java-11-openjdk security update (IMPORTANT)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | BDU:2022-03794 Уязвимость компонента JNDI программной платформы Java SE и виртуальной машины Oracle GraalVM Enterprise Edition, позволяющая нарушителю получить доступ на изменение, добавление или удаление данных | CVSS3: 5.3 | 0% Низкий | около 3 лет назад |
![]() | ROS-20240529-05 Множественные уязвимости java-17-openjdk | CVSS3: 9.8 | около 1 года назад | |
![]() | ROS-20240529-04 Множественные уязвимости java-11-openjdk | CVSS3: 9.8 | около 1 года назад | |
![]() | ROS-20240529-01 Множественные уязвимости java-1.8.0-openjdk | CVSS3: 9.8 | около 1 года назад | |
![]() | CVE-2022-21496 Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JNDI). Supported versions that are affected are Oracle Java SE: 7u331, 8u321, 11.0.14, 17.0.2, 18; Oracle GraalVM Enterprise Edition: 20.3.5, 21.3.1 and 22.0.0.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web servi... | CVSS3: 5.3 | 0% Низкий | около 3 лет назад |
![]() | CVE-2022-21496 Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JNDI). Supported versions that are affected are Oracle Java SE: 7u331, 8u321, 11.0.14, 17.0.2, 18; Oracle GraalVM Enterprise Edition: 20.3.5, 21.3.1 and 22.0.0.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web servi... | CVSS3: 5.3 | 0% Низкий | около 3 лет назад |
![]() | CVE-2022-21496 Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JNDI). Supported versions that are affected are Oracle Java SE: 7u331, 8u321, 11.0.14, 17.0.2, 18; Oracle GraalVM Enterprise Edition: 20.3.5, 21.3.1 and 22.0.0.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service | CVSS3: 5.3 | 0% Низкий | около 3 лет назад |
CVE-2022-21496 Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition ... | CVSS3: 5.3 | 0% Низкий | около 3 лет назад | |
GHSA-ph68-gfg8-7cjx Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JNDI). Supported versions that are affected are Oracle Java SE: 7u331, 8u321, 11.0.14, 17.0.2, 18; Oracle GraalVM Enterprise Edition: 20.3.5, 21.3.1 and 22.0.0.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web servi... | CVSS3: 5.3 | 0% Низкий | около 3 лет назад | |
![]() | SUSE-SU-2022:2531-1 Security update for java-1_8_0-openjdk | почти 3 года назад | ||
![]() | SUSE-SU-2022:2530-1 Security update for java-1_8_0-openjdk | почти 3 года назад | ||
![]() | SUSE-SU-2022:1513-1 Security update for java-11-openjdk | около 3 лет назад | ||
![]() | SUSE-SU-2022:1474-1 Security update for java-11-openjdk | около 3 лет назад | ||
![]() | RLSA-2022:1491 Important: java-1.8.0-openjdk security update | около 3 лет назад | ||
![]() | RLSA-2022:1442 Important: java-11-openjdk security update | около 3 лет назад | ||
ELSA-2022-2137 ELSA-2022-2137: java-1.8.0-openjdk security update (IMPORTANT) | почти 3 года назад | |||
ELSA-2022-1728 ELSA-2022-1728: java-11-openjdk security update (IMPORTANT) | почти 3 года назад | |||
ELSA-2022-1491 ELSA-2022-1491: java-1.8.0-openjdk security update (IMPORTANT) | около 3 лет назад | |||
ELSA-2022-1487 ELSA-2022-1487: java-1.8.0-openjdk security, bug fix, and enhancement update (IMPORTANT) | около 3 лет назад | |||
ELSA-2022-1442 ELSA-2022-1442: java-11-openjdk security update (IMPORTANT) | около 3 лет назад |
Уязвимостей на страницу