[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

Paid content will be excluded from the download.


Download | Alert*


oval:org.secpod.oval:def:603027
Several vulnerabilities have been discovered in OpenJDK, an implementation of the Oracle Java platform, resulting in sandbox bypass, use of insecure cryptography, side channel attacks, information disclosure, the execution of arbitrary code, denial of service or bypassing Jar verification.

oval:org.secpod.oval:def:1600820
It was discovered that the Security component of OpenJDK could fail to properly enforce restrictions defined for processing of X.509 certificate chains. A remote attacker could possibly use this flaw to make Java accept certificate using one of the disabled algorithms. Vulnerability in the Java SE, ...

oval:org.secpod.oval:def:1502086
The advisory is missing the security advisory description. For more information please visit the reference link

oval:org.secpod.oval:def:1600737
Incorrect enforcement of certificate path restrictions:It was discovered that the Security component of OpenJDK could fail to properly enforce restrictions defined for processing of X.509 certificate chains. A remote attacker could possibly use this flaw to make Java accept certificate using one of ...

oval:org.secpod.oval:def:51854
openjdk-8: Open Source Java implementation Several security issues were fixed in OpenJDK 8.

oval:org.secpod.oval:def:1501932
The advisory is missing the security advisory description. For more information please visit the reference link

oval:org.secpod.oval:def:204719
The java-1.7.0-openjdk packages provide the OpenJDK 7 Java Runtime Environment and the OpenJDK 7 Java Software Development Kit. Security Fix: * Multiple flaws were discovered in the RMI and Hotspot components in OpenJDK. An untrusted Java application or applet could use these flaws to completely byp ...

oval:org.secpod.oval:def:204718
The java-1.7.0-openjdk packages provide the OpenJDK 7 Java Runtime Environment and the OpenJDK 7 Java Software Development Kit. Security Fix: * Multiple flaws were discovered in the RMI and Hotspot components in OpenJDK. An untrusted Java application or applet could use these flaws to completely byp ...

oval:org.secpod.oval:def:1501934
The advisory is missing the security advisory description. For more information please visit the reference link

oval:org.secpod.oval:def:204543
The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit. Security Fix: * It was discovered that the DCG implementation in the RMI component of OpenJDK failed to correctly handle references. A remote attacker could possibly use th ...

oval:org.secpod.oval:def:502069
The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit. Security Fix: * It was discovered that the DCG implementation in the RMI component of OpenJDK failed to correctly handle references. A remote attacker could possibly use th ...

oval:org.secpod.oval:def:53103
Several vulnerabilities have been discovered in OpenJDK, an implementation of the Oracle Java platform, resulting in sandbox bypass, use of insecure cryptography, side channel attacks, information disclosure, the execution of arbitrary code, denial of service or bypassing Jar verification.

oval:org.secpod.oval:def:204542
The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit. Security Fix: * It was discovered that the DCG implementation in the RMI component of OpenJDK failed to correctly handle references. A remote attacker could possibly use th ...

oval:org.secpod.oval:def:1502076
The advisory is missing the security advisory description. For more information please visit the reference link

oval:org.secpod.oval:def:89044467
This java-1_8_0-openjdk update to version jdk8u141 fixes the following issues: Security issues fixed: - CVE-2017-10053: Improved image post-processing steps - CVE-2017-10067: Additional jar validation steps - CVE-2017-10074: Image conversion improvements - CVE-2017-10078: Better script accessibi ...

oval:org.secpod.oval:def:502207
The java-1.7.0-openjdk packages provide the OpenJDK 7 Java Runtime Environment and the OpenJDK 7 Java Software Development Kit. Security Fix: * Multiple flaws were discovered in the RMI and Hotspot components in OpenJDK. An untrusted Java application or applet could use these flaws to completely byp ...

oval:org.secpod.oval:def:603077
Several vulnerabilities have been discovered in OpenJDK, an implementation of the Oracle Java platform, resulting in sandbox bypass, incorrect authentication, the execution of arbitrary code, denial of service, information disclosure, use of insecure cryptography or bypassing Jar verification.

oval:org.secpod.oval:def:703724
openjdk-8: Open Source Java implementation Several security issues were fixed in OpenJDK 8.

oval:org.secpod.oval:def:1000761
The remote host is missing a patch 152101-43 containing a security fix. For more information please visit the reference link.

oval:org.secpod.oval:def:1000735
The remote host is missing a patch 152077-61 containing a security fix. For more information please visit the reference link.

oval:org.secpod.oval:def:1000729
The remote host is missing a patch 152078-61 containing a security fix. For more information please visit the reference link.

oval:org.secpod.oval:def:1000765
The remote host is missing a patch 152076-61 containing a security fix. For more information please visit the reference link.

oval:org.secpod.oval:def:1000668
The remote host is missing a patch 152100-43 containing a security fix. For more information please visit the reference link.

oval:org.secpod.oval:def:1000648
The remote host is missing a patch 152079-61 containing a security fix. For more information please visit the reference link.

oval:org.secpod.oval:def:41358
The host is installed with Oracle Java SE through 6u151, 7u141 or 8u131 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Security. Successful exploitation allows attackers to affect Confidentiality.

*CVE
CVE-2017-10198

© SecPod Technologies