Description
Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-2412-1 | openjdk-8 security update |
Debian DSA |
DSA-4779-1 | openjdk-11 security update |
EUVD |
EUVD-2020-6918 | Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N). |
Ubuntu USN |
USN-4607-1 | OpenJDK vulnerabilities |
Ubuntu USN |
USN-4607-2 | OpenJDK regressions |
References
History
Tue, 27 May 2025 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Oracle openjdk
|
|
| CPEs | cpe:2.3:a:oracle:jre:1.7.0:update271:*:*:*:*:*:* cpe:2.3:a:oracle:jre:11.0.8:*:*:*:*:*:*:* cpe:2.3:a:oracle:jre:15:*:*:*:*:*:*:* cpe:2.3:a:oracle:openjdk:11.0.1:*:*:*:*:*:*:* cpe:2.3:a:oracle:openjdk:11.0.2:*:*:*:*:*:*:* cpe:2.3:a:oracle:openjdk:11.0.3:*:*:*:*:*:*:* cpe:2.3:a:oracle:openjdk:11.0.4:*:*:*:*:*:*:* cpe:2.3:a:oracle:openjdk:11.0.5:*:*:*:*:*:*:* cpe:2.3:a:oracle:openjdk:11.0.6:*:*:*:*:*:*:* cpe:2.3:a:oracle:openjdk:11.0.7:*:*:*:*:*:*:* cpe:2.3:a:oracle:openjdk:11.0.8:*:*:*:*:*:*:* cpe:2.3:a:oracle:openjdk:11:*:*:*:*:*:*:* cpe:2.3:a:oracle:openjdk:13.0.1:*:*:*:*:*:*:* cpe:2.3:a:oracle:openjdk:13.0.2:*:*:*:*:*:*:* cpe:2.3:a:oracle:openjdk:13.0.3:*:*:*:*:*:*:* cpe:2.3:a:oracle:openjdk:13.0.4:*:*:*:*:*:*:* cpe:2.3:a:oracle:openjdk:13:*:*:*:*:*:*:* cpe:2.3:a:oracle:openjdk:15:*:*:*:*:*:*:* cpe:2.3:a:oracle:openjdk:7:-:*:*:*:*:*:* cpe:2.3:a:oracle:openjdk:7:update101:*:*:*:*:*:* cpe:2.3:a:oracle:openjdk:7:update10:*:*:*:*:*:* cpe:2.3:a:oracle:openjdk:7:update111:*:*:*:*:*:* cpe:2.3:a:oracle:openjdk:7:update11:*:*:*:*:*:* cpe:2.3:a:oracle:openjdk:7:update121:*:*:*:*:*:* cpe:2.3:a:oracle:openjdk:7:update131:*:*:*:*:*:* cpe:2.3:a:oracle:openjdk:7:update13:*:*:*:*:*:* cpe:2.3:a:oracle:openjdk:7:update141:*:*:*:*:*:* cpe:2.3:a:oracle:openjdk:7:update151:*:*:*:*:*:* cpe:2.3:a:oracle:openjdk:7:update15:*:*:*:*:*:* cpe:2.3:a:oracle:openjdk:7:update161:*:*:*:*:*:* cpe:2.3:a:oracle:openjdk:7:update171:*:*:*:*:*:* cpe:2.3:a:oracle:openjdk:7:update17:*:*:*:*:*:* cpe:2.3:a:oracle:openjdk:7:update181:*:*:*:*:*:* cpe:2.3:a:oracle:openjdk:7:update191:*:*:*:*:*:* cpe:2.3:a:oracle:openjdk:7:update1:*:*:*:*:*:* cpe:2.3:a:oracle:openjdk:7:update201:*:*:*:*:*:* cpe:2.3:a:oracle:openjdk:7:update211:*:*:*:*:*:* cpe:2.3:a:oracle:openjdk:7:update21:*:*:*:*:*:* cpe:2.3:a:oracle:openjdk:7:update221:*:*:*:*:*:* cpe:2.3:a:oracle:openjdk:7:update231:*:*:*:*:*:* cpe:2.3:a:oracle:openjdk:7:update241:*:*:*:*:*:* cpe:2.3:a:oracle:openjdk:7:update251:*:*:*:*:*:* cpe:2.3:a:oracle:openjdk:7:update25:*:*:*:*:*:* cpe:2.3:a:oracle:openjdk:7:update261:*:*:*:*:*:* cpe:2.3:a:oracle:openjdk:7:update271:*:*:*:*:*:* cpe:2.3:a:oracle:openjdk:7:update2:*:*:*:*:*:* cpe:2.3:a:oracle:openjdk:8:-:*:*:*:*:*:* cpe:2.3:a:oracle:openjdk:8:milestone1:*:*:*:*:*:* cpe:2.3:a:oracle:openjdk:8:milestone2:*:*:*:*:*:* cpe:2.3:a:oracle:openjdk:8:milestone3:*:*:*:*:*:* cpe:2.3:a:oracle:openjdk:8:milestone4:*:*:*:*:*:* cpe:2.3:a:oracle:openjdk:8:milestone5:*:*:*:*:*:* cpe:2.3:a:oracle:openjdk:8:milestone6:*:*:*:*:*:* cpe:2.3:a:oracle:openjdk:8:milestone7:*:*:*:*:*:* cpe:2.3:a:oracle:openjdk:8:milestone8:*:*:*:*:*:* cpe:2.3:a:oracle:openjdk:8:milestone9:*:*:*:*:*:* cpe:2.3:a:oracle:openjdk:8:update101:*:*:*:*:*:* cpe:2.3:a:oracle:openjdk:8:update102:*:*:*:*:*:* cpe:2.3:a:oracle:openjdk:8:update111:*:*:*:*:*:* cpe:2.3:a:oracle:openjdk:8:update112:*:*:*:*:*:* cpe:2.3:a:oracle:openjdk:8:update11:*:*:*:*:*:* cpe:2.3:a:oracle:openjdk:8:update121:*:*:*:*:*:* cpe:2.3:a:oracle:openjdk:8:update131:*:*:*:*:*:* cpe:2.3:a:oracle:openjdk:8:update141:*:*:*:*:*:* cpe:2.3:a:oracle:openjdk:8:update151:*:*:*:*:*:* cpe:2.3:a:oracle:openjdk:8:update152:*:*:*:*:*:* cpe:2.3:a:oracle:openjdk:8:update161:*:*:*:*:*:* cpe:2.3:a:oracle:openjdk:8:update162:*:*:*:*:*:* cpe:2.3:a:oracle:openjdk:8:update171:*:*:*:*:*:* cpe:2.3:a:oracle:openjdk:8:update172:*:*:*:*:*:* cpe:2.3:a:oracle:openjdk:8:update181:*:*:*:*:*:* cpe:2.3:a:oracle:openjdk:8:update191:*:*:*:*:*:* cpe:2.3:a:oracle:openjdk:8:update192:*:*:*:*:*:* cpe:2.3:a:oracle:openjdk:8:update201:*:*:*:*:*:* cpe:2.3:a:oracle:openjdk:8:update202:*:*:*:*:*:* cpe:2.3:a:oracle:openjdk:8:update20:*:*:*:*:*:* cpe:2.3:a:oracle:openjdk:8:update211:*:*:*:*:*:* cpe:2.3:a:oracle:openjdk:8:update212:*:*:*:*:*:* cpe:2.3:a:oracle:openjdk:8:update221:*:*:*:*:*:* cpe:2.3:a:oracle:openjdk:8:update222:*:*:*:*:*:* cpe:2.3:a:oracle:openjdk:8:update231:*:*:*:*:*:* cpe:2.3:a:oracle:openjdk:8:update232:*:*:*:*:*:* cpe:2.3:a:oracle:openjdk:8:update241:*:*:*:*:*:* cpe:2.3:a:oracle:openjdk:8:update242:*:*:*:*:*:* cpe:2.3:a:oracle:openjdk:8:update252:*:*:*:*:*:* cpe:2.3:a:oracle:openjdk:8:update25:*:*:*:*:*:* cpe:2.3:a:oracle:openjdk:8:update262:*:*:*:*:*:* |
|
| Vendors & Products |
Oracle openjdk
|
Thu, 26 Sep 2024 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Subscriptions
Debian
Subscribe
Debian Linux
Subscribe
Mcafee
Subscribe
Epolicy Orchestrator
Subscribe
Netapp
Subscribe
Active Iq Unified Manager
Subscribe
E-series Performance Analyzer
Subscribe
E-series Santricity Management Plug-ins
Subscribe
E-series Santricity Os Controller
Subscribe
E-series Santricity Storage Manager
Subscribe
E-series Santricity Web Services Proxy
Subscribe
Oncommand Insight
Subscribe
Oncommand Workflow Automation
Subscribe
Santricity Unified Manager
Subscribe
Steelstore Cloud Integrated Storage
Subscribe
Opensuse
Subscribe
Leap
Subscribe
Oracle
Subscribe
Jdk
Subscribe
Jre
Subscribe
Openjdk
Subscribe
Redhat
Subscribe
Enterprise Linux
Subscribe
Rhel E4s
Subscribe
Rhel Eus
Subscribe
Rhel Extras
Subscribe
Status: PUBLISHED
Assigner: oracle
Published:
Updated: 2024-09-26T20:23:59.582Z
Reserved: 2020-06-19T00:00:00.000Z
Link: CVE-2020-14782
Updated: 2024-08-04T12:53:43.289Z
Status : Analyzed
Published: 2020-10-21T15:15:18.517
Modified: 2025-05-27T16:40:51.027
Link: CVE-2020-14782
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
Debian DSA
EUVD
Ubuntu USN