Description
Vulnerability in the Java SE product of Oracle Java SE (component: Deployment). The supported version that is affected is Java SE: 8u301. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H).
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-22196 | Vulnerability in the Java SE product of Oracle Java SE (component: Deployment). The supported version that is affected is Java SE: 8u301. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H). |
References
History
Tue, 24 Feb 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Oracle java Se
|
|
| CPEs | cpe:2.3:a:oracle:java_se:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Oracle java Se
|
|
| Metrics |
ssvc
|
Subscriptions
Netapp
Subscribe
E-series Santricity Os Controller
Subscribe
E-series Santricity Storage Manager
Subscribe
E-series Santricity Web Services
Subscribe
Oncommand Insight
Subscribe
Santricity Unified Manager
Subscribe
Oracle
Subscribe
Java Se
Subscribe
Openjdk
Subscribe
Redhat
Subscribe
Enterprise Linux
Subscribe
Rhel Extras
Subscribe
Status: PUBLISHED
Assigner: oracle
Published:
Updated: 2024-09-06T18:54:39.750Z
Reserved: 2021-06-28T00:00:00.000Z
Link: CVE-2021-35560
Updated: 2024-08-04T00:40:47.356Z
Status : Modified
Published: 2021-10-20T11:16:35.240
Modified: 2024-11-21T06:12:31.217
Link: CVE-2021-35560
OpenCVE Enrichment
No data.
Weaknesses
EUVD