828
VMScore

CVE-2016-3598

Published: 21/07/2016 Updated: 13/05/2022
CVSS v2 Base Score: 9.3 | Impact Score: 10 | Exploitability Score: 8.6
CVSS v3 Base Score: 9.6 | Impact Score: 6 | Exploitability Score: 2.8
VMScore: 828
Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

Unspecified vulnerability in Oracle Java SE 8u92 and Java SE Embedded 8u91 allows remote malicious users to affect confidentiality, integrity, and availability via vectors related to Libraries, a different vulnerability than CVE-2016-3610.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

oracle jdk 1.8.0

oracle jre 1.8.0

oracle linux 5.0

oracle linux 6

oracle linux 7

Vendor Advisories

Synopsis Moderate: java-171-ibm security update Type/Severity Security Advisory: Moderate Topic An update for java-171-ibm is now available for Red HatSatellite 57 and Red Hat Satellite 56Red Hat Product Security has rated this update as having a security impact of Moderate A Common Vulnerability Sc ...
Several security issues were fixed in OpenJDK 8 ...
Several security issues were fixed in OpenJDK 7 ...
Multiple flaws were discovered in the Hotspot and Libraries components in OpenJDK An untrusted Java application or applet could use these flaws to completely bypass Java sandbox restrictions (CVE-2016-3606, CVE-2016-3598, CVE-2016-3610) Multiple denial of service flaws were found in the JAXP component in OpenJDK A specially crafted XML file coul ...
Multiple flaws were discovered in the Hotspot and Libraries components in OpenJDK An untrusted Java application or applet could use these flaws to completely bypass Java sandbox restrictions (CVE-2016-3606, CVE-2016-3587, CVE-2016-3598, CVE-2016-3610) Multiple denial of service flaws were found in the JAXP component in OpenJDK A specially crafte ...

References

NVD-CWE-noinfohttp://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.htmlhttp://www.securityfocus.com/bid/91787http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.htmlhttp://rhn.redhat.com/errata/RHSA-2016-1504.htmlhttp://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.htmlhttp://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.htmlhttp://www.securityfocus.com/bid/91918http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.htmlhttp://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.htmlhttp://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.htmlhttp://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.htmlhttp://rhn.redhat.com/errata/RHSA-2016-1589.htmlhttp://lists.opensuse.org/opensuse-security-announce/2016-09/msg00006.htmlhttp://www.ubuntu.com/usn/USN-3043-1http://rhn.redhat.com/errata/RHSA-2016-1587.htmlhttp://lists.opensuse.org/opensuse-security-announce/2016-09/msg00005.htmlhttps://access.redhat.com/errata/RHSA-2016:1475http://rhn.redhat.com/errata/RHSA-2016-1588.htmlhttp://www.ubuntu.com/usn/USN-3062-1https://access.redhat.com/errata/RHSA-2016:1458http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.htmlhttps://security.gentoo.org/glsa/201701-43https://security.gentoo.org/glsa/201610-08http://www.securitytracker.com/id/1036365https://security.netapp.com/advisory/ntap-20160721-0001/https://access.redhat.com/errata/RHSA-2017:1216https://access.redhat.com/errata/RHSA-2017:1216https://nvd.nist.govhttps://usn.ubuntu.com/3043-1/