説明
Multiple vulnerabilities were found in Oracle Java. Malicious users can exploit these vulnerabilities to bypass security restrictions, execute arbitrary code, obtain sensitive information.
Below is a complete list of vulnerabilities:
- Validation of untrusted input vulnerability can be exploited to bypass security restrictions.
- Validation of untrusted input vulnerability by using APIs in the specified Component can be used to bypass security restrictions.
- Use after free vulnerability can be exploited to cause denial of service or execute arbitrary code.
- Information disclosure vulnerability can be exploited to obtain sensitive information.
オリジナルアドバイザリー
エクスプロイテーション
Public exploits exist for this vulnerability.
関連製品
CVEリスト
- CVE-2024-25062 critical
- CVE-2023-42950 critical
- CVE-2024-21208 warning
- CVE-2024-21210 warning
- CVE-2024-21235 warning
- CVE-2024-21217 warning
- CVE-2024-21211 warning
も参照してください
お住まいの地域に広がる脆弱性の統計をご覧ください statistics.securelist.com
この脆弱性についての記述に不正確な点がありますか? お知らせください!