Download
| Alert*
oval:org.secpod.oval:def:75567
The host is installed with Oracle Java SE through 8u301 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Deployment. Successful exploitation allows attackers to affect Confidentiality, Integrity and Availability. oval:org.secpod.oval:def:75582 The host is installed with Oracle Java SE through 8u301 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Deployment. Successful exploitation allows attackers to affect Confidentiality, Integrity and Availability. oval:org.secpod.oval:def:89045938 This update for java-1_8_0-ibm fixes the following issues: - Update to Java 8.0 Service Refresh 7 Fix Pack 0 - CVE-2021-41035: before version 0.29.0, the openj9 JVM does not throw IllegalAccessError for MethodHandles that invoke inaccessible interface methods. - CVE-2021-35586: Excessive memory all ... oval:org.secpod.oval:def:89045937 This update for java-1_8_0-ibm fixes the following issues: - Update to Java 8.0 Service Refresh 7 Fix Pack 0 - CVE-2021-41035: before version 0.29.0, the openj9 JVM does not throw IllegalAccessError for MethodHandles that invoke inaccessible interface methods. - CVE-2021-35586: Excessive memory all ... oval:org.secpod.oval:def:506622 IBM Java SE version 8 includes the IBM Java Runtime Environment and the IBM Java Software Development Kit. This update upgrades IBM Java SE 8 to version 8 SR7. Security Fix: * Oracle JDK: unspecified vulnerability fixed in 8u311 * OpenJDK: Loop in HttpsServer triggered during TLS session close * ... oval:org.secpod.oval:def:78638 The host is missing a patch containing a security fixes, which affects the following package(s): Java oval:org.secpod.oval:def:2106968 Oracle Solaris 11 - ( CVE-2021-3518 ) oval:org.secpod.oval:def:75414 The host is installed with Oracle Java SE through 8u301 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Deployment. Successful exploitation allows attackers to affect confidentiality, integrity and availability. |