Kaspersky ID:
KLA65636
Erkennungsdatum:
04/16/2024
Aktualisiert:
01/28/2026

Beschreibung

Multiple vulnerabilities were found in Oracle Java SE and GraalVM. Malicious users can exploit these vulnerabilities to execute arbitrary code, obtain sensitive information, cause denial of service.

Below is a complete list of vulnerabilities:

  1. Code execution vulnerability in JavaFX can be exploited to execute arbitrary code.
  2. Elevation of privilege vulnerability in Node can be exploited remotely to gain privileges.
  3. Information disclosure vulnerability in Compiler can be exploited to obtain sensitive information.
  4. Denial of service vulnerability in Compiler can be exploited to cause denial of service.
  5. Denial of service vulnerability in Concurrency can be exploited to cause denial of service.
  6. Code execution vulnerability in Hotspot can be exploited to execute arbitrary code.
  7. Code execution vulnerability in Networking can be exploited to execute arbitrary code.
  8. Denial of service vulnerability in Hotspot can be exploited to cause denial of service.

Ursprüngliche Informationshinweise

Ausnutzung

Public exploits exist for this vulnerability.

Betroffene Produkte

CVE Liste

  • CVE-2023-41993
    critical
  • CVE-2024-21892
    critical
  • CVE-2024-21004
    warning
  • CVE-2024-20954
    warning
  • CVE-2024-21098
    warning
  • CVE-2024-21085
    warning
  • CVE-2024-21003
    warning
  • CVE-2024-21068
    warning
  • CVE-2024-21012
    warning
  • CVE-2024-21011
    warning
  • CVE-2024-21002
    warning
  • CVE-2024-21094
    warning
  • CVE-2024-21005
    warning

Mehr erfahren

Informieren Sie sich über die Statistiken der in Ihrer Region verbreiteten Sicherheitslücken statistics.securelist.com

Sie haben einen Fehler in der Beschreibung der Schwachstelle gefunden? Mitteilen!
Kaspersky Next
Let´s go Next: Cybersicherheit neu gedacht
Erfahren Sie mehr
Neu: Kaspersky!
Dein digitales Leben verdient umfassenden Schutz!
Erfahren Sie mehr
Do you want to save your changes?
Your message has been sent successfully.