Количество 39
Количество 39

CVE-2022-21624
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JNDI). Supported versions that are affected are Oracle Java SE: 8u341, 8u345-perf, 11.0.16.1, 17.0.4.1, 19; Oracle GraalVM Enterprise Edition: 20.3.7, 21.3.3 and 22.2.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a ...

CVE-2022-21624
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JNDI). Supported versions that are affected are Oracle Java SE: 8u341, 8u345-perf, 11.0.16.1, 17.0.4.1, 19; Oracle GraalVM Enterprise Edition: 20.3.7, 21.3.3 and 22.2.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a ...

CVE-2022-21624
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JNDI). Supported versions that are affected are Oracle Java SE: 8u341, 8u345-perf, 11.0.16.1, 17.0.4.1, 19; Oracle GraalVM Enterprise Edition: 20.3.7, 21.3.3 and 22.2.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web
CVE-2022-21624
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition ...
GHSA-h547-5jph-p9qq
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JNDI). Supported versions that are affected are Oracle Java SE: 8u341, 8u345-perf, 11.0.16.1, 17.0.4.1, 19; Oracle GraalVM Enterprise Edition: 20.3.7, 21.3.3 and 22.2.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a ...

BDU:2023-05202
Уязвимость компонента JNDI программной платформы Oracle Java SE и виртуальной машины Oracle GraalVM Enterprise Edition, позволяющая нарушителю получить доступ на изменение, добавление или удаление данных

SUSE-SU-2022:4452-1
Security update for java-1_8_0-openjdk

SUSE-SU-2022:4373-1
Security update for java-1_8_0-openjdk

RLSA-2022:7006
Moderate: java-1.8.0-openjdk security update
ELSA-2022-7007
ELSA-2022-7007: java-1.8.0-openjdk security update (MODERATE)
ELSA-2022-7006
ELSA-2022-7006: java-1.8.0-openjdk security update (MODERATE)
ELSA-2022-7002
ELSA-2022-7002: java-1.8.0-openjdk security and bug fix update (MODERATE)

SUSE-SU-2022:4250-1
Security update for java-1_8_0-openj9

SUSE-SU-2022:4079-1
Security update for java-17-openjdk

SUSE-SU-2022:4290-1
Security update for java-1_8_0-ibm

SUSE-SU-2022:4080-1
Security update for java-11-openjdk

SUSE-SU-2022:4078-1
Security update for java-11-openjdk

RLSA-2022:7012
Moderate: java-11-openjdk security and bug fix update

RLSA-2022:7000
Moderate: java-17-openjdk security and bug fix update
ELSA-2022-7013
ELSA-2022-7013: java-11-openjdk security and bug fix update (MODERATE)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2022-21624 Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JNDI). Supported versions that are affected are Oracle Java SE: 8u341, 8u345-perf, 11.0.16.1, 17.0.4.1, 19; Oracle GraalVM Enterprise Edition: 20.3.7, 21.3.3 and 22.2.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a ... | CVSS3: 3.7 | 0% Низкий | больше 2 лет назад |
![]() | CVE-2022-21624 Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JNDI). Supported versions that are affected are Oracle Java SE: 8u341, 8u345-perf, 11.0.16.1, 17.0.4.1, 19; Oracle GraalVM Enterprise Edition: 20.3.7, 21.3.3 and 22.2.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a ... | CVSS3: 3.7 | 0% Низкий | больше 2 лет назад |
![]() | CVE-2022-21624 Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JNDI). Supported versions that are affected are Oracle Java SE: 8u341, 8u345-perf, 11.0.16.1, 17.0.4.1, 19; Oracle GraalVM Enterprise Edition: 20.3.7, 21.3.3 and 22.2.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web | CVSS3: 3.7 | 0% Низкий | больше 2 лет назад |
CVE-2022-21624 Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition ... | CVSS3: 3.7 | 0% Низкий | больше 2 лет назад | |
GHSA-h547-5jph-p9qq Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JNDI). Supported versions that are affected are Oracle Java SE: 8u341, 8u345-perf, 11.0.16.1, 17.0.4.1, 19; Oracle GraalVM Enterprise Edition: 20.3.7, 21.3.3 and 22.2.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a ... | CVSS3: 3.7 | 0% Низкий | больше 2 лет назад | |
![]() | BDU:2023-05202 Уязвимость компонента JNDI программной платформы Oracle Java SE и виртуальной машины Oracle GraalVM Enterprise Edition, позволяющая нарушителю получить доступ на изменение, добавление или удаление данных | CVSS3: 3.7 | 0% Низкий | больше 2 лет назад |
![]() | SUSE-SU-2022:4452-1 Security update for java-1_8_0-openjdk | больше 2 лет назад | ||
![]() | SUSE-SU-2022:4373-1 Security update for java-1_8_0-openjdk | больше 2 лет назад | ||
![]() | RLSA-2022:7006 Moderate: java-1.8.0-openjdk security update | больше 2 лет назад | ||
ELSA-2022-7007 ELSA-2022-7007: java-1.8.0-openjdk security update (MODERATE) | больше 2 лет назад | |||
ELSA-2022-7006 ELSA-2022-7006: java-1.8.0-openjdk security update (MODERATE) | больше 2 лет назад | |||
ELSA-2022-7002 ELSA-2022-7002: java-1.8.0-openjdk security and bug fix update (MODERATE) | больше 2 лет назад | |||
![]() | SUSE-SU-2022:4250-1 Security update for java-1_8_0-openj9 | больше 2 лет назад | ||
![]() | SUSE-SU-2022:4079-1 Security update for java-17-openjdk | больше 2 лет назад | ||
![]() | SUSE-SU-2022:4290-1 Security update for java-1_8_0-ibm | больше 2 лет назад | ||
![]() | SUSE-SU-2022:4080-1 Security update for java-11-openjdk | больше 2 лет назад | ||
![]() | SUSE-SU-2022:4078-1 Security update for java-11-openjdk | больше 2 лет назад | ||
![]() | RLSA-2022:7012 Moderate: java-11-openjdk security and bug fix update | больше 2 лет назад | ||
![]() | RLSA-2022:7000 Moderate: java-17-openjdk security and bug fix update | больше 2 лет назад | ||
ELSA-2022-7013 ELSA-2022-7013: java-11-openjdk security and bug fix update (MODERATE) | больше 2 лет назад |
Уязвимостей на страницу