Total vulnerabilities in the database
Oracle Java SE before 7 Update 6, and OpenJDK 7 before 7u6 build 12 and 8 before build 39, computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table.
Software | From | Fixed in |
---|---|---|
oracle / jdk | - | 1.7.0.x |
oracle / jre | 1.7.0-update3 | 1.7.0-update3.x |
oracle / jdk | 1.7.0-update2 | 1.7.0-update2.x |
oracle / jdk | 1.7.0 | 1.7.0.x |
oracle / jre | 1.7.0-update2 | 1.7.0-update2.x |
oracle / jdk | 1.7.0-update3 | 1.7.0-update3.x |
oracle / jre | - | 1.7.0.x |
oracle / jre | 1.7.0-update4 | 1.7.0-update4.x |
oracle / jre | 1.7.0 | 1.7.0.x |
oracle / jdk | 1.7.0-update1 | 1.7.0-update1.x |
oracle / jdk | 1.7.0-update4 | 1.7.0-update4.x |
oracle / jre | 1.7.0-update1 | 1.7.0-update1.x |
oracle / openjdk | 1.8.0 | 1.8.0.x |
oracle / openjdk | 1.6.0 | 1.6.0.x |
oracle / openjdk | - | 1.7.0.x |