Since Industrial HiVision release 08.1.04, OPC UA communications are encrypted by default. To use
unencrypted communications between the OPC UA client and server, perform the following steps:
| Vulnerability |
Description |
| Java CVE-2019-2745 |
Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Security). Supported versions that are
affected are Java SE: 7u221, 8u212 and 11.0.3. Difficult to exploit vulnerability allows unauthenticated attacker
with logon to the infrastructure where Java SE executes to compromise Java SE. Successful attacks of this
vulnerability can result in unauthorized access to critical data or complete access to all Java SE accessible data.
Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start
applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes
from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using
APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base
Score 5.1 (Confidentiality impacts). |
| Java CVE-2019-2762 |
Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Utilities). Supported
versions that are affected are Java SE: 7u221, 8u212, 11.0.3 and 12.0.1; Java SE Embedded: 8u211. Easily exploitable
vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE,
Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial
denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments,
typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that
load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security.
This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which
supplies data to the APIs. CVSS 3.0 Base Score 5.3 (Availability impacts). |
| Java CVE-2019-2766 |
Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Networking). Supported
versions that are affected are Java SE: 7u221, 8u212, 11.0.3 and 12.0.1; Java SE Embedded: 8u211. Difficult to
exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise
Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker.
Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE
Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running
sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted
code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can
also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to
the APIs. CVSS 3.0 Base Score 3.1 (Confidentiality impacts). |
| Java CVE-2019-2769 |
Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Utilities). Supported
versions that are affected are Java SE: 7u221, 8u212, 11.0.3 and 12.0.1; Java SE Embedded: 8u211. Easily exploitable
vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE,
Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial
denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments,
typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that
load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security.
This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which
supplies data to the APIs. CVSS 3.0 Base Score 5.3 (Availability impacts). |
| Java CVE-2019-2786 |
Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Security). Supported
versions that are affected are Java SE: 8u212, 11.0.3 and 12.0.1; Java SE Embedded: 8u211. Difficult to exploit
vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE,
Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while
the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful
attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded
accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java
Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted
code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can
also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the
APIs. CVSS 3.0 Base Score 3.4 (Confidentiality impacts). |
| Java CVE-2019-2816 |
Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Networking). Supported
versions that are affected are Java SE: 7u221, 8u212, 11.0.3 and 12.0.1; Java SE Embedded: 8u211. Difficult to
exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise
Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or
delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset
of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in
clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run
untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability
can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to
the APIs. CVSS 3.0 Base Score 4.8 (Confidentiality and Integrity impacts). |
| Java CVE-2019-2842 |
Vulnerability in the Java SE component of Oracle Java SE (subcomponent: JCE). The supported version that is
affected is Java SE: 8u212. Difficult to exploit vulnerability allows unauthenticated attacker with network access
via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized
ability to cause a partial denial of service (partial DOS) of Java SE. Note: This vulnerability applies to Java
deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8),
that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security.
This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which
supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). |
| Vulnerability |
Description |
| Java CVE-2020-2754 |
Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Scripting). Supported versions
that are affected are Java SE: 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows
unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful
attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of
Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited
through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to
APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as
through a web service. |
| Java CVE-2020-2755 |
Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Scripting). Supported versions
that are affected are Java SE: 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows
unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful
attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of
Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited
through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to
APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as
through a web service. |
| Java CVE-2020-2756 |
Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Serialization). Supported versions
that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability
allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful
attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE,
Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed
Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified
Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. |
| Java CVE-2020-2757 |
Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Serialization). Supported versions
that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability
allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful
attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE,
Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed
Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified
Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. |
| Java CVE-2020-2773 |
Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Security). Supported versions that
are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows
unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful
attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of
Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited
through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to
APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as
through a web service. |
| Java CVE-2020-2781 |
Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JSSE). Supported versions
that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Easily exploitable vulnerability
allows unauthenticated attacker with network access via HTTPS to compromise Java SE, Java SE Embedded. Successful
attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS)
of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited
through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to
APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as
through a web service. |
| Java CVE-2020-2800 |
Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Lightweight HTTP Server). Supported
versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability
allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful
attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded
accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This
vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start
applications or Untrusted Java applets, such as through a web service. |
| Java CVE-2020-2830 |
Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Concurrency). Supported versions
that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Easily exploitable vulnerability
allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded.
Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS)
of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited
through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs
in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. |
| Java CVE-2020-14556 |
Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions
that are affected are Java SE: 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Difficult to exploit vulnerability
allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded.
Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE,
Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible
data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java
Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified
Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. |
| Java CVE-2020-14577 |
Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JSSE). Supported versions that
are affected are Java SE: 7u261, 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Difficult to exploit vulnerability
allows unauthenticated attacker with network access via TLS to compromise Java SE, Java SE Embedded. Successful attacks
of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data.
Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web
Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified
Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. |
| Java CVE-2020-14578 |
Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions
that are affected are Java SE: 7u261 and 8u251; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows
unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful
attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of
Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited
through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to
APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as
through a web service. |
| Java CVE-2020-14579 |
Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions
that are affected are Java SE: 7u261 and 8u251; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows
unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful
attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of
Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited
through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to
APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as
through a web service. |
| Java CVE-2020-14581 |
Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: 2D). Supported versions that are
affected are Java SE: 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows
unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful
attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible
data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java
Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified
Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. |
| Java CVE-2020-14621 |
Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JAXP). Supported versions that
are affected are Java SE: 7u261, 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Easily exploitable vulnerability
allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded.
Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE,
Java SE Embedded accessible data. Note: This vulnerability can only be exploited by supplying data to APIs in the specified
Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. |
| Java CVE-2020-18197 |
In xsltCopyText in transform.c in libxslt 1.1.33, a pointer variable isn't reset under certain circumstances. If the
relevant memory area happened to be freed and reused in a certain way, a bounds check could fail and memory outside a
buffer could be written to, or uninitialized data could be disclosed. |
| Vulnerability |
Description |
| Java CVE-2020-2583 |
Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Serialization). Supported
versions that are affected are Java SE and Java SE Embedded. Difficult to exploit vulnerability allows
unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded.
Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service
(partial DOS) of Java SE, Java SE Embedded. |
| Java CVE-2020-2590 |
Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Security). Supported
versions that are affected are Java SE and Java SE Embedded. Difficult to exploit vulnerability allows
unauthenticated attacker with network access via Kerberos to compromise Java SE, Java SE Embedded. Successful
attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE,
Java SE Embedded accessible data. |
| Java CVE-2020-2593 |
Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Networking). Supported
versions that are affected are Java SE and Java SE Embedded. Difficult to exploit vulnerability allows
unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded.
Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of
Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE
Embedded accessible data. |
| Java CVE-2020-2601 |
Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Security). Supported
versions that are affected are Java SE and Java SE Embedded. Difficult to exploit vulnerability allows
unauthenticated attacker with network access via Kerberos to compromise Java SE, Java SE Embedded. While
the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products.
Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access
to all Java SE, Java SE Embedded accessible data. |
| Java CVE-2020-2604 |
Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Serialization). Supported
versions that are affected are Java SE and Java SE Embedded. Difficult to exploit vulnerability allows
unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded.
Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. |
| Java CVE-2020-2654 |
Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported
versions that are affected is Java SE. Difficult to exploit vulnerability allows unauthenticated attacker with
network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result
in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE. |
| Java CVE-2020-2659 |
Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Networking). Supported
versions that are affected are Java SE and Java SE Embedded. Difficult to exploit vulnerability allows
unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded.
Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service
(partial DOS) of Java SE, Java SE Embedded. |
| Java CVE-2020-8840 |
FasterXML jackson-databind 2.0.0 through 2.9.10.2 lacks certain xbean-reflect/JNDI blocking, as demonstrated
by org.apache.xbean.propertyeditor.JndiConverter. |
| Java CVE-2020-9546 |
FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and
typing, related to org.apache.hadoop.shaded.com.zaxxer.hikari.HikariConfig (aka shaded hikari-config). |
| Java CVE-2020-9547 |
FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and
typing, related to com.ibatis.sqlmap.engine.transaction.jta.JtaTransactionConfig (aka ibatis-sqlmap). |
| Java CVE-2020-9548 |
FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and
typing, related to br.com.anteros.dbcp.AnterosDBCPConfig (aka anteros-core). |
| Java CVE-2019-20330 |
FasterXML jackson-databind 2.x before 2.9.10.2 lacks certain net.sf.ehcache blocking. |
| Vulnerability |
Description |
| Java CVE-2019-2894 |
Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE
(component: Security). Difficult to exploit vulnerability allows unauthenticated attacker with network access via
multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in
unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. |
| Java CVE-2019-2933 |
Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE
(component: Libraries). Difficult to exploit vulnerability allows unauthenticated attacker with network access via
multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person
other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of
Java SE, Java SE Embedded accessible data. |
| Java CVE-2019-2945 |
Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE
(component: Networking). Difficult to exploit vulnerability allows unauthenticated attacker with network access via
multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person
other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial
denial of service (partial DOS) of Java SE, Java SE Embedded. |
| Java CVE-2019-2958 |
Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE
(component: Libraries). Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple
protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized
creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. |
| Java CVE-2019-2962 |
Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE
(component: 2D). Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple
protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized
ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. |
| Java CVE-2019-2964 |
Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE
(component: Concurrency). Difficult to exploit vulnerability allows unauthenticated attacker with network access via
multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in
unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. |
| Java CVE-2019-2978 |
Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE
(component: Networking). Difficult to exploit vulnerability allows unauthenticated attacker with network access via
multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in
unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. |
| Java CVE-2019-2983 |
Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE
(component: Serialization). Difficult to exploit vulnerability allows unauthenticated attacker with network access via
multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in
unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. |
| Java CVE-2019-2988 |
Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE
(component: 2D). Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple
protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized
ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. |
| Java CVE-2019-2989 |
Vulnerability in the Oracle GraalVM Enterprise Edition product of
Oracle GraalVM (component: Java). Difficult to exploit vulnerability allows unauthenticated attacker with network
access via multiple protocols to compromise Oracle GraalVM Enterprise Edition. While the vulnerability is in Oracle
GraalVM Enterprise Edition, attacks may significantly impact additional products. Successful attacks of this
vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle
GraalVM Enterprise Edition accessible data. |
| Java CVE-2019-2992 |
Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE
(component: 2D). Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple
protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized
ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. |
| Java CVE-2019-2996 |
Vulnerability in the Java SE, Java SE Embedded product of Oracle
Java SE (component: Deployment). Difficult to exploit vulnerability allows unauthenticated attacker with network access
via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person
other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete
access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE,
Java SE Embedded accessible data. |
| Java CVE-2019-10086 |
In Apache Commons Beanutils 1.9.2, a special BeanIntrospector
class was added which allows suppressing the ability for an attacker to access the classloader via the class property
available on all Java objects. However, this is not used by the default characteristic of the PropertyUtilsBean. |
| Java CVE-2019-12384 |
FasterXML jackson-databind 2.x before 2.9.9.1 might allow attackers
to have a variety of impacts by leveraging failure to block the logback-core class from polymorphic deserialization.
Depending on the class-path content, remote code execution may be possible. |
| Java CVE-2019-14379 |
SubTypeValidator.java in FasterXML jackson-databind before 2.9.9.2
mishandles default typing when ehcache is used (because of net.sf.ehcache.transaction.manager.DefaultTransactionManagerLookup),
leading to remote code execution. |
| Java CVE-2019-14439 |
A Polymorphic Typing issue was discovered in FasterXML
jackson-databind 2.x before 2.9.9.2. This occurs when Default Typing is enabled (either globally or for a specific property)
for an externally exposed JSON endpoint and the service has the logback jar in the classpath. |
| Java CVE-2019-14540 |
A Polymorphic Typing issue was discovered in FasterXML jackson-databind
before 2.9.10. It is related to com.zaxxer.hikari.HikariConfig. |
| Java CVE-2019-16335 |
A Polymorphic Typing issue was discovered in FasterXML jackson-databind
before 2.9.10. It is related to com.zaxxer.hikari.HikariDataSource. This is a different vulnerability than CVE-2019-14540. |
You can find the JAVA version used in this release (OpenJDK 8u302b08) in the following dialogs:
The JAVA use in the GUI is found in Help> About> Program Info> Systeminfo
The JAVA use in the kernal is found in Help> Kernel Info> System