[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249461

 
 

909

 
 

195508

 
 

282

Paid content will be excluded from the download.


Download | Alert*


oval:org.secpod.oval:def:89000551
This update for java-1_7_0-openjdk to version 7u261 fixes the following issues: - CVE-2020-2756: Better mapping of serial ENUMs - CVE-2020-2757: Less Blocking Array Queues - CVE-2020-2773: Better signatures in XML - CVE-2020-2781: Improve TLS session handling - CVE-2020-2800: Better Headings for ...

oval:org.secpod.oval:def:89000313
This update for java-11-openjdk fixes the following issues: Java was updated to jdk-11.0.7+10 . Security issues fixed: - CVE-2020-2754: Fixed an incorrect handling of regular expressions that could have resulted in denial of service . - CVE-2020-2755: Fixed an incorrect handling of regular expressio ...

oval:org.secpod.oval:def:503661
The java-1.7.0-openjdk packages provide the OpenJDK 7 Java Runtime Environment and the OpenJDK 7 Java Software Development Kit. Security Fix: * OpenJDK: Incorrect bounds checks in NIO Buffers * OpenJDK: Incorrect type checks in MethodType.readObject * OpenJDK: Unexpected exceptions raised by DOM ...

oval:org.secpod.oval:def:503662
The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. Security Fix: * OpenJDK: Incorrect bounds checks in NIO Buffers * OpenJDK: Incorrect type checks in MethodType.readObject * OpenJDK: Application data accepted before TLS ...

oval:org.secpod.oval:def:503660
The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit. Security Fix: * OpenJDK: Incorrect bounds checks in NIO Buffers * OpenJDK: Incorrect type checks in MethodType.readObject * OpenJDK: Unexpected exceptions raised by DOM ...

oval:org.secpod.oval:def:503666
The java-1.7.0-openjdk packages provide the OpenJDK 7 Java Runtime Environment and the OpenJDK 7 Java Software Development Kit. Security Fix: * OpenJDK: Incorrect bounds checks in NIO Buffers * OpenJDK: Incorrect type checks in MethodType.readObject * OpenJDK: Unexpected exceptions raised by DOM ...

oval:org.secpod.oval:def:503663
The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit. Security Fix: * OpenJDK: Incorrect bounds checks in NIO Buffers * OpenJDK: Incorrect type checks in MethodType.readObject * OpenJDK: Unexpected exceptions raised by DOM ...

oval:org.secpod.oval:def:118165
The OpenJDK runtime environment 8.

oval:org.secpod.oval:def:1700333
Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE . Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromi ...

oval:org.secpod.oval:def:503664
The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. Security Fix: * OpenJDK: Incorrect bounds checks in NIO Buffers * OpenJDK: Incorrect type checks in MethodType.readObject * OpenJDK: Application data accepted before TLS ...

oval:org.secpod.oval:def:503667
The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit. Security Fix: * OpenJDK: Incorrect bounds checks in NIO Buffers * OpenJDK: Incorrect type checks in MethodType.readObject * OpenJDK: Unexpected exceptions raised by DOM ...

oval:org.secpod.oval:def:705441
openjdk-8: Open Source Java implementation - openjdk-lts: Open Source Java implementation Several security issues were fixed in OpenJDK.

oval:org.secpod.oval:def:70444
The host is missing a patch containing a security fixes, which affects the following package(s): Java

oval:org.secpod.oval:def:1601766
Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE . Supported versions that are affected are Java SE: 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java ...

oval:org.secpod.oval:def:1601127
Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE . Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromi ...

oval:org.secpod.oval:def:62716
The host is installed with Oracle Java SE through 7u251, 8u241, 11.0.6 or 14 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Scripting. Successful exploitation allows attackers to affect availability.

oval:org.secpod.oval:def:1700327
Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE . Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromi ...

oval:org.secpod.oval:def:118227
The OpenJDK runtime environment 8.

oval:org.secpod.oval:def:604816
Several vulnerabilities have been discovered in the OpenJDK Java runtime, resulting in denial of service, insecure TLS handshakes, bypass of sandbox restrictions or HTTP response splitting attacks.

oval:org.secpod.oval:def:1502881
The advisory is missing the security advisory description. For more information please visit the reference link

oval:org.secpod.oval:def:1700318
Further information about this update can be found in the Corretto 11 change log

oval:org.secpod.oval:def:1502880
The advisory is missing the security advisory description. For more information please visit the reference link

oval:org.secpod.oval:def:1502885
The advisory is missing the security advisory description. For more information please visit the reference link

oval:org.secpod.oval:def:1502886
The advisory is missing the security advisory description. For more information please visit the reference link

oval:org.secpod.oval:def:1502883
The advisory is missing the security advisory description. For more information please visit the reference link

oval:org.secpod.oval:def:1502884
The advisory is missing the security advisory description. For more information please visit the reference link

oval:org.secpod.oval:def:63272
Several vulnerabilities have been discovered in the OpenJDK Java runtime, resulting in denial of service, insecure TLS handshakes, bypass of sandbox restrictions or HTTP response splitting attacks.

oval:org.secpod.oval:def:1502888
The advisory is missing the security advisory description. For more information please visit the reference link

oval:org.secpod.oval:def:89000639
This update for java-1_8_0-openjdk to version jdk8u252 fixes the following issues: - CVE-2020-2754: Forward references to Nashorn - CVE-2020-2755: Improve Nashorn matching - CVE-2020-2756: Better mapping of serial ENUMs - CVE-2020-2757: Less Blocking Array Queues - CVE-2020-2773: Better signatur ...

oval:org.secpod.oval:def:70195
openjdk-8: Open Source Java implementation - openjdk-lts: Open Source Java implementation Several security issues were fixed in OpenJDK.

oval:org.secpod.oval:def:90262
The remote host is missing a patch 152928-51 containing a security fix. For more information please visit the reference link.

oval:org.secpod.oval:def:66547
The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit. Security Fix: * OpenJDK: Incorrect bounds checks in NIO Buffers * OpenJDK: Incorrect type checks in MethodType.readObject * OpenJDK: Unexpected exceptions raised by DOM ...

oval:org.secpod.oval:def:66546
The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. Security Fix: * OpenJDK: Incorrect bounds checks in NIO Buffers * OpenJDK: Incorrect type checks in MethodType.readObject * OpenJDK: Application data accepted before TLS ...

oval:org.secpod.oval:def:604821
Several vulnerabilities have been discovered in the OpenJDK Java runtime, resulting in denial of service, insecure TLS handshakes, bypass of sandbox restrictions or HTTP response splitting attacks.

oval:org.secpod.oval:def:89000103
This update for java-1_8_0-openjdk to version jdk8u252 fixes the following issues: - CVE-2020-2754: Forward references to Nashorn - CVE-2020-2755: Improve Nashorn matching - CVE-2020-2756: Better mapping of serial ENUMs - CVE-2020-2757: Less Blocking Array Queues - CVE-2020-2773: Better signatur ...

oval:org.secpod.oval:def:118195
The OpenJDK runtime environment 8.

oval:org.secpod.oval:def:205562
The java-1.7.0-openjdk packages provide the OpenJDK 7 Java Runtime Environment and the OpenJDK 7 Java Software Development Kit. Security Fix: * OpenJDK: Incorrect bounds checks in NIO Buffers * OpenJDK: Incorrect type checks in MethodType.readObject * OpenJDK: Unexpected exceptions raised by DOM ...

oval:org.secpod.oval:def:63508
Several vulnerabilities have been discovered in the OpenJDK Java runtime, resulting in denial of service, insecure TLS handshakes, bypass of sandbox restrictions or HTTP response splitting attacks.

oval:org.secpod.oval:def:205563
The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. Security Fix: * OpenJDK: Incorrect bounds checks in NIO Buffers * OpenJDK: Incorrect type checks in MethodType.readObject * OpenJDK: Application data accepted before TLS ...

oval:org.secpod.oval:def:505947
IBM Java SE version 8 includes the IBM Java Runtime Environment and the IBM Java Software Development Kit. This update upgrades IBM Java SE 8 to version 8 SR6-FP25. Security Fix: * IBM JDK: Stack-based buffer overflow when converting from UTF-8 characters to platform encoding * OpenJDK: Unexpected ...

oval:org.secpod.oval:def:62762
The host is installed with Oracle Java SE through 7u251, 8u241, 11.0.6 or 14 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Scripting. Successful exploitation allows attackers to affect availability.

oval:org.secpod.oval:def:62761
The host is installed with Oracle Java SE through 7u251, 8u241, 11.0.6 or 14 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Scripting. Successful exploitation allows attackers to affect availability.

oval:org.secpod.oval:def:90259
The remote host is missing a patch 152927-51 containing a security fix. For more information please visit the reference link.

oval:org.secpod.oval:def:205551
The java-1.7.0-openjdk packages provide the OpenJDK 7 Java Runtime Environment and the OpenJDK 7 Java Software Development Kit. Security Fix: * OpenJDK: Incorrect bounds checks in NIO Buffers * OpenJDK: Incorrect type checks in MethodType.readObject * OpenJDK: Unexpected exceptions raised by DOM ...

oval:org.secpod.oval:def:89000568
This update for java-11-openjdk fixes the following issues: Java was updated to jdk-11.0.7+10 . Security issues fixed: - CVE-2020-2754: Fixed an incorrect handling of regular expressions that could have resulted in denial of service . - CVE-2020-2755: Fixed an incorrect handling of regular expressio ...

oval:org.secpod.oval:def:505953
IBM Java SE version 8 includes the IBM Java Runtime Environment and the IBM Java Software Development Kit. This update upgrades IBM Java SE 8 to version 8 SR6-FP25. Security Fix: * IBM JDK: Stack-based buffer overflow when converting from UTF-8 characters to platform encoding * OpenJDK: Unexpected ...

oval:org.secpod.oval:def:205557
The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit. Security Fix: * OpenJDK: Incorrect bounds checks in NIO Buffers * OpenJDK: Incorrect type checks in MethodType.readObject * OpenJDK: Unexpected exceptions raised by DOM ...

oval:org.secpod.oval:def:205552
The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit. Security Fix: * OpenJDK: Incorrect bounds checks in NIO Buffers * OpenJDK: Incorrect type checks in MethodType.readObject * OpenJDK: Unexpected exceptions raised by DOM ...

oval:org.secpod.oval:def:62659
The host is installed with Oracle Java SE through 7u251, 8u241, 11.0.6 or 14 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Scripting. Successful exploitation allows attackers to affect availability.

CPE    3
cpe:/o:debian:debian_linux:9.0
cpe:/o:debian:debian_linux:8.0
cpe:/o:canonical:ubuntu_linux:18.04::~~lts~~~
*CVE
CVE-2020-2773

© SecPod Technologies