It exists that OpenJDK incorrectly handled converting certain object arguments into their textual representations. An attacker could possibly use this issue to cause a denial of service. (CVE-2022-21434)
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
oracle graalvm 21.3.1 |
||
oracle graalvm 22.0.0.2 |
||
oracle jdk 18 |
||
oracle jdk 17.0.2 |
||
debian debian linux 10.0 |
||
debian debian linux 11.0 |
||
netapp oncommand workflow automation - |
||
netapp oncommand insight - |
||
netapp cloud insights - |
||
netapp e-series santricity storage manager - |
||
netapp e-series santricity web services - |
||
netapp solidfire \\& hci management node - |
||
netapp santricity unified manager - |
||
netapp hci compute node - |
||
netapp 7-mode transition tool - |
||
netapp active iq unified manager - |
||
netapp e-series santricity os controller 11.0 |
||
netapp solidfire\\, enterprise sds \\& hci storage node - |
Get our weekly newsletter Whole new meaning for zero consequences
Java versions 15 to 18 contain a flaw in its ECDSA signature validation that makes it trivial for miscreants to digitally sign files and other data as if they were legit organizations.
Cyber-criminals could therefore pass off cryptographically signed malicious downloads and bogus information as if it were real, and affected Java applications and services won't know the difference.
The scope of the damage that could be done is wide: encrypted communications, authentication tokens, cod...