8.1
CVSSv3

CVE-2016-0636

Published: 24/03/2016 Updated: 13/05/2022
CVSS v2 Base Score: 9.3 | Impact Score: 10 | Exploitability Score: 8.6
CVSS v3 Base Score: 8.1 | Impact Score: 5.9 | Exploitability Score: 2.2
VMScore: 828
Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

Unspecified vulnerability in Oracle Java SE 7u97, 8u73, and 8u74 allows remote malicious users to affect confidentiality, integrity, and availability via unknown vectors related to the Hotspot sub-component.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

redhat enterprise linux desktop 7.0

redhat enterprise linux workstation 7.0

redhat enterprise linux server 7.0

redhat enterprise linux hpc node 6.0

redhat enterprise linux hpc node 7.0

redhat enterprise linux desktop 6.0

redhat enterprise linux server 6.0

redhat enterprise linux workstation 6.0

redhat icedtea7

oracle jdk 1.8.0

oracle jdk 1.7.0

oracle jre 1.7.0

oracle jre 1.8.0

Vendor Advisories

OpenJDK could be made to crash or run programs as your login if it received specially crafted input ...
Several vulnerabilities have been discovered in OpenJDK, an implementation of the Oracle Java platform, resulting in breakouts of the Java sandbox, denial of service or information disclosure For the stable distribution (jessie), these problems have been fixed in version 7u101-266-1~deb8u1 We recommend that you upgrade your openjdk-7 packages ...
An improper type safety check was discovered in the Hotspot component An untrusted Java application or applet could use this flaw to bypass Java Sandbox restrictions ...
An improper type safety check was discovered in the Hotspot component An untrusted Java application or applet could use this flaw to bypass Java Sandbox restrictions ...

Recent Articles

Patch Java now, says Oracle. Leave the Easter chocolate until later
The Register • Simon Sharwood • 24 Mar 2016

Malicious web page could achieve remote PC takeover without authentication

Oracle is urging Java users to upgrade, ASAP, to crimp a very nasty bug in the desktop and browser plug-in versions of the software. Labelled CVE-2016-0636, the flaw scored a 9.3 on the Common Vulnerability Scoring System bug severity rating. That high score comes about because the flaw means attackers “can impact the availability, integrity, and confidentiality of the user's system.” Worse still, an attacker can do that remotely, without authentication. In other words, visit the wrong web s...