8.3 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
6.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
Aug. 25, 2021 Andrey Cherepanov 0:11.0.12.7-alt1_0jpp10
- new version
- security fixes:
+ CVE-2021-2341: Improve file transfers
+ CVE-2021-2369: Better jar file validation
+ CVE-2021-2388: Enhance compiler validation
+ CVE-2021-2161: Less ambiguous processing
+ CVE-2021-2163: Enhance opening JARs
+ CVE-2020-14779: Enhance support of Proxy class
+ CVE-2020-14781: Enhanced LDAP contexts
+ CVE-2020-14782: Enhance certificate processing
+ CVE-2020-14792: Better range handling
+ CVE-2020-14796: Improved URI Support
+ CVE-2020-14797: Better Path Validation
+ CVE-2020-14798: Enhanced buffer support
+ CVE-2020-14803: Improved Buffer supports
+ CVE-2020-14562: Enhance TIFF support
+ CVE-2020-14573: Enhance Graal interface handling
+ CVE-2020-14556: Better ForkJoinPool behavior
+ CVE-2020-14577: Enhance certificate verification
+ CVE-2020-14581: Better matrix operations
+ CVE-2020-14583: Better Buffer support
+ CVE-2020-14593: Less Affine Transformations
+ CVE-2020-14621: Better XML namespace handling
+ CVE-2020-2754: Forward references to Nashorn
+ CVE-2020-2755: Improve Nashorn matching
+ CVE-2020-2756: Better mapping of serial ENUMs
+ CVE-2020-2757: Less Blocking Array Queues
+ CVE-2020-2773: Better signatures in XML
+ CVE-2020-2778: More constrained algorithms
+ CVE-2020-2767: Improve TLS verification
+ CVE-2020-2781: Improve TLS session handling
+ CVE-2020-2800: Better Headings for HTTP Servers
+ CVE-2020-2803: Enhance buffering of byte buffers
+ CVE-2020-2805: Enhance typing of methods
+ CVE-2020-2816: Enhance TLS connectivity
+ CVE-2020-2830: Better Scanner conversions
+ CVE-2020-2583: Unlink Set of LinkedHashSets
+ CVE-2020-2590: Improve Kerberos interop capabilities
+ CVE-2020-2593: Normalize normalization for all
+ CVE-2020-2601: Better Ticket Granting Services
+ CVE-2020-2604: Better serial filter handling
+ CVE-2020-2655: Better TLS messaging support
+ CVE-2020-2654: Improve Object Identifier Processing
+ CVE-2019-2933: Windows file handling redux
+ CVE-2019-2945: Better socket support
+ CVE-2019-2949: Better Kerberos ccache handling
+ CVE-2019-2958: Build Better Processes
+ CVE-2019-2964: Better support for patterns
+ CVE-2019-2962: Better Glyph Images
+ CVE-2019-2973: Better pattern compilation
+ CVE-2019-2975: Unexpected exception in jjs
+ CVE-2019-2978: Improved handling of jar files
+ CVE-2019-2977: Improve String index handling
+ CVE-2019-2981: Better Path supports
+ CVE-2019-2983: Better serial attributes
+ CVE-2019-2987: Better rendering of native glyphs
+ CVE-2019-2988: Better Graphics2D drawing
+ CVE-2019-2989: Improve TLS connection support
+ CVE-2019-2992: Enhance font glyph mapping
+ CVE-2019-2999: Commentary on Javadoc comments
+ CVE-2019-2894: Enhance ECDSA operations
+ CVE-2019-2762: Exceptional throw cases
+ CVE-2019-2766: Improve file protocol handling
+ CVE-2019-2769: Better copies of CopiesList
+ CVE-2019-2786: More limited privilege usage
+ CVE-2019-7317: Improve PNG support options
+ CVE-2019-2818: Better Poly1305 support
+ CVE-2019-2816: Normalize normalization
+ CVE-2019-2821: Improve TLS negotiation
+ CVE-2019-2602: Better String parsing
+ CVE-2019-2684: More dynamic RMI interactions
+ CVE-2019-2698: Fuzzing TrueType fonts: setCurrGlyphID()
8.3 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
6.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P