Versio.io

CVE-2020-14798

Common vulnerabilities & exposures (CVE)

CVE databaseCVE database blogpostRelease & EoL database
 
Published at: - 21-10-2020 05:15
Last modified: - 13-05-2022 04:57
Total changes: - 4

Description

Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.1 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N).

Common Vulnerability Scoring System (CVSS)

CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N
High
Attack complexity
Network
Attack vector
None
Availability
None
Confidentiality
Low
Integrity
None
Privileges required
Unchanged
Scope
Required
User interaction
3.1
Base score
1.6
1.4
Exploitability score
Impact score
 

Verification logic

OR
OR
vendor=oracle AND product=jdk AND version=11.0.8
vendor=oracle AND product=jdk AND version=1.7.0 AND update=update271
vendor=oracle AND product=jdk AND version=15
vendor=oracle AND product=jdk AND version=1.8.0 AND update=update261
vendor=oracle AND product=jre AND version=1.8.0 AND update=update261
OR
vendor=netapp AND product=santricity_cloud_connector AND version=-
vendor=netapp AND product=oncommand_unified_manager AND version=-
vendor=netapp AND product=oncommand_insight AND version=-
vendor=netapp AND product=e-series_santricity_web_services_proxy AND version=-
vendor=netapp AND product=e-series_santricity_storage_manager AND version=-
vendor=netapp AND product=active_iq_unified_manager AND target_software=windows AND versionStartIncluding=7.3
vendor=netapp AND product=active_iq_unified_manager AND target_software=vmware_vsphere AND versionStartIncluding=9.5
vendor=netapp AND product=e-series_santricity_os_controller AND versionEndIncluding=11.60.1 AND versionStartIncluding=11.0.0
vendor=netapp AND product=snapmanager AND version=- AND update=- AND target_software=oracle
vendor=netapp AND product=solidfire AND version=-
vendor=netapp AND product=7-mode_transition_tool AND version=-
vendor=netapp AND product=hci_management_node AND version=-
vendor=netapp AND product=santricity_unified_manager AND version=-
vendor=netapp AND product=snapmanager AND version=- AND update=- AND target_software=sap
vendor=netapp AND product=hci_storage_node AND version=-
OR
vendor=Debian AND product=debian_linux AND version=9.0
vendor=Debian AND product=debian_linux AND version=10.0
OR
vendor=opensuse AND product=leap AND version=15.2
 

Reference

 


Keywords

NVD

 

CVE-2020-14798

 

CVE

 

Common vulnerabilities & exposures

 

CVSS

 

Common vulnerability scoring system

 

Security

 

Vulnerabilities

 

Exposures

 

We use cookies to ensure that we give you the best experience on our website. Read privacy policies for more information.