Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JAXP). Supported versions that are affected are Java SE: 7u171, 8u162 and 10; Java SE Embedded: 8u161; JRockit: R28.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
Configuration 6 (hide)
|
Configuration 7 (hide)
|
Configuration 8 (hide)
|
History
22 Nov 2023, 19:35
Type | Values Removed | Values Added |
---|---|---|
References | (SECTRACK) http://www.securitytracker.com/id/1040697 - Broken Link, Third Party Advisory, VDB Entry | |
References | () https://lists.apache.org/thread.html/b53d4601ecd9ec63c799dbe1bc5b78e0d52f4cef429da2dfe63cf06d%40%3Cfop-dev.xmlgraphics.apache.org%3E - Mailing List, Third Party Advisory | |
References | () https://lists.apache.org/thread.html/r449b5d89c7b2ba3762584cf6c38e01867d4b24706e023cf2a9911307%40%3Cuser.spark.apache.org%3E - Mailing List, Third Party Advisory | |
References | (BID) http://www.securityfocus.com/bid/103872 - Broken Link, Third Party Advisory, VDB Entry | |
References | () https://lists.apache.org/thread.html/49dc6702104a86ecbb40292dcd329ce9ae4c32b74733199ecab14a73%40%3Cj-users.xerces.apache.org%3E - Issue Tracking, Mailing List, Third Party Advisory | |
CPE | cpe:2.3:a:oracle:jdk:1.10.0:*:*:*:*:*:*:* |
cpe:2.3:a:oracle:jdk:10:*:*:*:*:*:*:* cpe:2.3:a:oracle:jre:10:*:*:*:*:*:*:* |
07 Nov 2023, 02:58
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
06 Oct 2022, 18:56
Type | Values Removed | Values Added |
---|---|---|
References | (MLIST) https://lists.apache.org/thread.html/r449b5d89c7b2ba3762584cf6c38e01867d4b24706e023cf2a9911307@%3Cuser.spark.apache.org%3E - Mailing List, Third Party Advisory | |
References | (BID) http://www.securityfocus.com/bid/103872 - Broken Link | |
References | (SECTRACK) http://www.securitytracker.com/id/1040697 - Broken Link | |
References | (MLIST) https://lists.apache.org/thread.html/b53d4601ecd9ec63c799dbe1bc5b78e0d52f4cef429da2dfe63cf06d@%3Cfop-dev.xmlgraphics.apache.org%3E - Mailing List, Third Party Advisory |
13 May 2022, 14:57
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:oracle:jre:1.8.0:update_162:*:*:*:*:*:* |
cpe:2.3:a:oracle:jre:1.8.0:update162:*:*:*:*:*:* cpe:2.3:a:oracle:jre:1.7.0:update171:*:*:*:*:*:* |
Information
Published : 2018-04-19 02:29
Updated : 2023-12-10 12:30
NVD link : CVE-2018-2799
Mitre link : CVE-2018-2799
CVE.ORG link : CVE-2018-2799
JSON object : View
Products Affected
debian
- debian_linux
redhat
- enterprise_linux_server_aus
- enterprise_linux_server_eus
- enterprise_linux_server_tus
- enterprise_linux_server
- enterprise_linux_workstation
- satellite
- enterprise_linux_desktop
oracle
- jdk
- jre
- jrockit
schneider-electric
- struxureware_data_center_expert
apache
- xerces-j
hp
- xp7_command_view
canonical
- ubuntu_linux
CWE