java-1.6.0-openjdk-debuginfo vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the java-1.6.0-openjdk-debuginfo package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • C
Deserialization of Untrusted Data

<1:1.6.0.41-1.13.13.1.78.amzn1
  • C
Deserialization of Untrusted Data

<1:1.6.0.41-1.13.13.1.78.amzn1
  • H
Improper Access Control

<1:1.6.0.41-1.13.13.1.77.amzn1
  • H
CVE-2016-5542

<1:1.6.0.41-1.13.13.1.77.amzn1
  • H
CVE-2016-5554

<1:1.6.0.41-1.13.13.1.77.amzn1
  • H
Information Exposure

<1:1.6.0.41-1.13.13.1.77.amzn1
  • H
Access Restriction Bypass

<1:1.6.0.41-1.13.13.1.77.amzn1
  • H
Allocation of Resources Without Limits or Throttling

<1:1.6.0.40-1.13.12.6.75.amzn1
  • H
CVE-2016-3500

<1:1.6.0.40-1.13.12.6.75.amzn1
  • H
CVE-2016-3550

<1:1.6.0.40-1.13.12.6.75.amzn1
  • H
CVE-2016-3606

<1:1.6.0.40-1.13.12.6.75.amzn1
  • H
CVE-2016-3458

<1:1.6.0.40-1.13.12.6.75.amzn1
  • C
CVE-2016-3427

<1:1.6.0.39-1.13.11.1.74.amzn1
  • C
CVE-2016-0687

<1:1.6.0.39-1.13.11.1.74.amzn1
  • C
CVE-2016-0686

<1:1.6.0.39-1.13.11.1.74.amzn1
  • C
CVE-2016-3425

<1:1.6.0.39-1.13.11.1.74.amzn1
  • C
CVE-2016-0695

<1:1.6.0.39-1.13.11.1.74.amzn1
  • H
CVE-2016-0466

<1:1.6.0.38-1.13.10.0.73.amzn1
  • H
CVE-2016-0494

<1:1.6.0.38-1.13.10.0.73.amzn1
  • H
CVE-2016-0483

<1:1.6.0.38-1.13.10.0.73.amzn1
  • H
CVE-2016-0448

<1:1.6.0.38-1.13.10.0.73.amzn1
  • H
CVE-2016-0402

<1:1.6.0.38-1.13.10.0.73.amzn1
  • H
CVE-2015-4881

<1:1.6.0.37-1.13.9.4.72.amzn1
  • H
CVE-2015-4911

<1:1.6.0.37-1.13.9.4.72.amzn1
  • H
CVE-2015-4893

<1:1.6.0.37-1.13.9.4.72.amzn1
  • H
CVE-2015-4883

<1:1.6.0.37-1.13.9.4.72.amzn1
  • H
CVE-2015-4860

<1:1.6.0.37-1.13.9.4.72.amzn1
  • H
CVE-2015-4903

<1:1.6.0.37-1.13.9.4.72.amzn1
  • H
CVE-2015-4882

<1:1.6.0.37-1.13.9.4.72.amzn1
  • H
CVE-2015-4844

<1:1.6.0.37-1.13.9.4.72.amzn1
  • H
CVE-2015-4843

<1:1.6.0.37-1.13.9.4.72.amzn1
  • H
CVE-2015-4872

<1:1.6.0.37-1.13.9.4.72.amzn1
  • H
CVE-2015-4835

<1:1.6.0.37-1.13.9.4.72.amzn1
  • H
CVE-2015-4842

<1:1.6.0.37-1.13.9.4.72.amzn1
  • H
CVE-2015-4734

<1:1.6.0.37-1.13.9.4.72.amzn1
  • H
CVE-2015-4805

<1:1.6.0.37-1.13.9.4.72.amzn1
  • H
CVE-2015-4806

<1:1.6.0.37-1.13.9.4.72.amzn1
  • H
CVE-2015-4803

<1:1.6.0.37-1.13.9.4.72.amzn1
  • H
CVE-2015-4760

<1:1.6.0.36-1.13.8.1.71.amzn1
  • H
CVE-2015-4733

<1:1.6.0.36-1.13.8.1.71.amzn1
  • H
CVE-2015-4748

<1:1.6.0.36-1.13.8.1.71.amzn1
  • H
CVE-2015-4749

<1:1.6.0.36-1.13.8.1.71.amzn1
  • H
CVE-2015-4731

<1:1.6.0.36-1.13.8.1.71.amzn1
  • H
CVE-2015-4732

<1:1.6.0.36-1.13.8.1.71.amzn1
  • H
Use of a Broken or Risky Cryptographic Algorithm

<1:1.6.0.36-1.13.8.1.71.amzn1
  • H
Cryptographic Issues

<1:1.6.0.36-1.13.8.1.71.amzn1
  • H
CVE-2015-2628

<1:1.6.0.36-1.13.8.1.71.amzn1
  • H
CVE-2015-2632

<1:1.6.0.36-1.13.8.1.71.amzn1
  • H
CVE-2015-2625

<1:1.6.0.36-1.13.8.1.71.amzn1
  • H
CVE-2015-2601

<1:1.6.0.36-1.13.8.1.71.amzn1
  • H
CVE-2015-2621

<1:1.6.0.36-1.13.8.1.71.amzn1
  • H
CVE-2015-2590

<1:1.6.0.36-1.13.8.1.71.amzn1
  • H
CVE-2015-0488

<1:1.6.0.35-1.13.7.1.70.amzn1
  • H
CVE-2015-0477

<1:1.6.0.35-1.13.7.1.70.amzn1
  • H
CVE-2015-0478

<1:1.6.0.35-1.13.7.1.70.amzn1
  • H
CVE-2005-1080

<1:1.6.0.35-1.13.7.1.70.amzn1
  • H
CVE-2015-0469

<1:1.6.0.35-1.13.7.1.70.amzn1
  • H
CVE-2015-0460

<1:1.6.0.35-1.13.7.1.70.amzn1
  • H
CVE-2015-0480

<1:1.6.0.35-1.13.7.1.70.amzn1
  • H
CVE-2015-0410

<1:1.6.0.34-67.1.13.6.0.69.amzn1
  • H
CVE-2015-0412

<1:1.6.0.34-67.1.13.6.0.69.amzn1
  • H
CVE-2015-0408

<1:1.6.0.34-67.1.13.6.0.69.amzn1
  • H
CVE-2015-0407

<1:1.6.0.34-67.1.13.6.0.69.amzn1
  • H
CVE-2015-0383

<1:1.6.0.34-67.1.13.6.0.69.amzn1
  • H
CVE-2015-0395

<1:1.6.0.34-67.1.13.6.0.69.amzn1
  • H
CVE-2014-6601

<1:1.6.0.34-67.1.13.6.0.69.amzn1
  • H
Cryptographic Issues

<1:1.6.0.34-67.1.13.6.0.69.amzn1
  • H
CVE-2014-6587

<1:1.6.0.34-67.1.13.6.0.69.amzn1
  • H
CVE-2014-6591

<1:1.6.0.34-67.1.13.6.0.69.amzn1
  • H
CVE-2014-6585

<1:1.6.0.34-67.1.13.6.0.69.amzn1
  • H
CVE-2014-6593

<1:1.6.0.34-67.1.13.6.0.69.amzn1
  • H
CVE-2014-6558

<1:1.6.0.33-67.1.13.5.0.67.amzn1
  • H
CVE-2014-6531

<1:1.6.0.33-67.1.13.5.0.67.amzn1
  • H
CVE-2014-6511

<1:1.6.0.33-67.1.13.5.0.67.amzn1
  • H
CVE-2014-6519

<1:1.6.0.33-67.1.13.5.0.67.amzn1
  • H
CVE-2014-6512

<1:1.6.0.33-67.1.13.5.0.67.amzn1
  • H
CVE-2014-6502

<1:1.6.0.33-67.1.13.5.0.67.amzn1
  • H
CVE-2014-6504

<1:1.6.0.33-67.1.13.5.0.67.amzn1
  • H
CVE-2014-6517

<1:1.6.0.33-67.1.13.5.0.67.amzn1
  • H
CVE-2014-6457

<1:1.6.0.33-67.1.13.5.0.67.amzn1
  • H
CVE-2014-6506

<1:1.6.0.33-67.1.13.5.0.67.amzn1
  • H
CVE-2014-4263

<1:1.6.0.0-67.1.13.4.65.amzn1
  • H
CVE-2014-4252

<1:1.6.0.0-67.1.13.4.65.amzn1
  • H
CVE-2014-4244

<1:1.6.0.0-67.1.13.4.65.amzn1
  • H
CVE-2014-4219

<1:1.6.0.0-67.1.13.4.65.amzn1
  • H
CVE-2014-4218

<1:1.6.0.0-67.1.13.4.65.amzn1
  • H
CVE-2014-4266

<1:1.6.0.0-67.1.13.4.65.amzn1
  • H
CVE-2014-4262

<1:1.6.0.0-67.1.13.4.65.amzn1
  • H
CVE-2014-4216

<1:1.6.0.0-67.1.13.4.65.amzn1
  • H
CVE-2014-4209

<1:1.6.0.0-67.1.13.4.65.amzn1
  • H
CVE-2014-2490

<1:1.6.0.0-67.1.13.4.65.amzn1
  • H
CVE-2014-2423

<1:1.6.0.0-67.1.13.3.64.amzn1
  • H
CVE-2014-2427

<1:1.6.0.0-67.1.13.3.64.amzn1
  • H
CVE-2014-2421

<1:1.6.0.0-67.1.13.3.64.amzn1
  • H
CVE-2014-2412

<1:1.6.0.0-67.1.13.3.64.amzn1
  • H
Link Following

<1:1.6.0.0-67.1.13.3.64.amzn1
  • H
CVE-2014-2403

<1:1.6.0.0-67.1.13.3.64.amzn1
  • H
CVE-2014-2398

<1:1.6.0.0-67.1.13.3.64.amzn1
  • H
CVE-2014-2397

<1:1.6.0.0-67.1.13.3.64.amzn1
  • H
CVE-2014-2414

<1:1.6.0.0-67.1.13.3.64.amzn1
  • H
CVE-2014-0458

<1:1.6.0.0-67.1.13.3.64.amzn1
  • H
CVE-2014-0461

<1:1.6.0.0-67.1.13.3.64.amzn1
  • H
CVE-2014-0460

<1:1.6.0.0-67.1.13.3.64.amzn1
  • H
CVE-2014-0457

<1:1.6.0.0-67.1.13.3.64.amzn1
  • H
CVE-2014-0456

<1:1.6.0.0-67.1.13.3.64.amzn1
  • H
CVE-2014-0429

<1:1.6.0.0-67.1.13.3.64.amzn1
  • H
CVE-2014-0451

<1:1.6.0.0-67.1.13.3.64.amzn1
  • H
CVE-2014-0453

<1:1.6.0.0-67.1.13.3.64.amzn1
  • H
CVE-2013-5797

<1:1.6.0.0-67.1.13.3.64.amzn1
  • H
CVE-2014-0446

<1:1.6.0.0-67.1.13.3.64.amzn1
  • H
CVE-2014-0452

<1:1.6.0.0-67.1.13.3.64.amzn1
  • H
CVE-2014-0428

<1:1.6.0.0-66.1.13.1.62.amzn1
  • H
CVE-2014-0422

<1:1.6.0.0-66.1.13.1.62.amzn1
  • H
CVE-2014-0416

<1:1.6.0.0-66.1.13.1.62.amzn1
  • H
CVE-2014-0376

<1:1.6.0.0-66.1.13.1.62.amzn1
  • H
CVE-2014-0368

<1:1.6.0.0-66.1.13.1.62.amzn1
  • H
CVE-2014-0373

<1:1.6.0.0-66.1.13.1.62.amzn1
  • H
CVE-2013-5896

<1:1.6.0.0-66.1.13.1.62.amzn1
  • H
CVE-2013-5910

<1:1.6.0.0-66.1.13.1.62.amzn1
  • H
CVE-2014-0411

<1:1.6.0.0-66.1.13.1.62.amzn1
  • H
CVE-2014-0423

<1:1.6.0.0-66.1.13.1.62.amzn1
  • H
CVE-2013-5907

<1:1.6.0.0-66.1.13.1.62.amzn1
  • H
CVE-2013-5878

<1:1.6.0.0-66.1.13.1.62.amzn1
  • H
CVE-2013-5884

<1:1.6.0.0-66.1.13.1.62.amzn1
  • H
CVE-2013-5840

<1:1.6.0.0-65.1.11.14.57.amzn1
  • H
CVE-2013-5850

<1:1.6.0.0-65.1.11.14.57.amzn1
  • H
CVE-2013-5830

<1:1.6.0.0-65.1.11.14.57.amzn1
  • H
CVE-2013-5842

<1:1.6.0.0-65.1.11.14.57.amzn1
  • H
CVE-2013-5849

<1:1.6.0.0-65.1.11.14.57.amzn1
  • H
CVE-2013-5823

<1:1.6.0.0-65.1.11.14.57.amzn1
  • H
CVE-2013-5814

<1:1.6.0.0-65.1.11.14.57.amzn1
  • H
CVE-2013-5825

<1:1.6.0.0-65.1.11.14.57.amzn1
  • H
CVE-2013-5820

<1:1.6.0.0-65.1.11.14.57.amzn1
  • H
CVE-2013-5817

<1:1.6.0.0-65.1.11.14.57.amzn1
  • H
CVE-2013-5804

<1:1.6.0.0-65.1.11.14.57.amzn1
  • H
CVE-2013-5803

<1:1.6.0.0-65.1.11.14.57.amzn1
  • H
CVE-2013-5809

<1:1.6.0.0-65.1.11.14.57.amzn1
  • H
CVE-2013-5802

<1:1.6.0.0-65.1.11.14.57.amzn1
  • H
CVE-2013-5797

<1:1.6.0.0-65.1.11.14.57.amzn1
  • H
CVE-2013-5784

<1:1.6.0.0-65.1.11.14.57.amzn1
  • H
CVE-2013-5829

<1:1.6.0.0-65.1.11.14.57.amzn1
  • H
CVE-2013-5778

<1:1.6.0.0-65.1.11.14.57.amzn1
  • H
CVE-2013-5774

<1:1.6.0.0-65.1.11.14.57.amzn1
  • H
CVE-2013-5790

<1:1.6.0.0-65.1.11.14.57.amzn1
  • H
CVE-2013-5783

<1:1.6.0.0-65.1.11.14.57.amzn1
  • H
CVE-2013-5780

<1:1.6.0.0-65.1.11.14.57.amzn1
  • H
CVE-2013-5782

<1:1.6.0.0-65.1.11.14.57.amzn1
  • H
CVE-2013-4002

<1:1.6.0.0-65.1.11.14.57.amzn1
  • H
CVE-2013-3829

<1:1.6.0.0-65.1.11.14.57.amzn1
  • H
CVE-2013-5772

<1:1.6.0.0-65.1.11.14.57.amzn1
  • H
CVE-2013-2473

<1:1.6.0.0-62.1.11.11.90.55.amzn1
  • H
CVE-2013-2472

<1:1.6.0.0-62.1.11.11.90.55.amzn1
  • H
CVE-2013-2465

<1:1.6.0.0-62.1.11.11.90.55.amzn1
  • H
CVE-2013-2469

<1:1.6.0.0-62.1.11.11.90.55.amzn1
  • H
CVE-2013-2471

<1:1.6.0.0-62.1.11.11.90.55.amzn1
  • H
CVE-2013-2470

<1:1.6.0.0-62.1.11.11.90.55.amzn1
  • H
CVE-2013-2461

<1:1.6.0.0-62.1.11.11.90.55.amzn1
  • H
CVE-2013-2459

<1:1.6.0.0-62.1.11.11.90.55.amzn1
  • H
CVE-2013-2456

<1:1.6.0.0-62.1.11.11.90.55.amzn1
  • H
CVE-2013-2453

<1:1.6.0.0-62.1.11.11.90.55.amzn1
  • H
CVE-2013-2450

<1:1.6.0.0-62.1.11.11.90.55.amzn1
  • H
CVE-2013-2463

<1:1.6.0.0-62.1.11.11.90.55.amzn1
  • H
CVE-2013-2448

<1:1.6.0.0-62.1.11.11.90.55.amzn1
  • H
CVE-2013-2452

<1:1.6.0.0-62.1.11.11.90.55.amzn1
  • H
CVE-2013-2445

<1:1.6.0.0-62.1.11.11.90.55.amzn1
  • H
CVE-2013-2457

<1:1.6.0.0-62.1.11.11.90.55.amzn1
  • H
CVE-2013-2446

<1:1.6.0.0-62.1.11.11.90.55.amzn1
  • H
CVE-2013-2407

<1:1.6.0.0-62.1.11.11.90.55.amzn1
  • H
CVE-2013-2447

<1:1.6.0.0-62.1.11.11.90.55.amzn1
  • H
CVE-2013-1571

<1:1.6.0.0-62.1.11.11.90.55.amzn1
  • H
CVE-2013-2412

<1:1.6.0.0-62.1.11.11.90.55.amzn1
  • H
CVE-2013-2455

<1:1.6.0.0-62.1.11.11.90.55.amzn1
  • H
CVE-2013-2444

<1:1.6.0.0-62.1.11.11.90.55.amzn1
  • H
CVE-2013-1500

<1:1.6.0.0-62.1.11.11.90.55.amzn1
  • H
CVE-2013-2443

<1:1.6.0.0-62.1.11.11.90.55.amzn1
  • H
CVE-2013-2429

<1:1.6.0.0-61.1.11.11.53.amzn1
  • H
CVE-2013-2422

<1:1.6.0.0-61.1.11.11.53.amzn1
  • H
CVE-2013-2430

<1:1.6.0.0-61.1.11.11.53.amzn1
  • H
CVE-2013-2431

<1:1.6.0.0-61.1.11.11.53.amzn1
  • H
CVE-2013-2421

<1:1.6.0.0-61.1.11.11.53.amzn1
  • H
CVE-2013-2420

<1:1.6.0.0-61.1.11.11.53.amzn1
  • H
CVE-2013-2415

<1:1.6.0.0-61.1.11.11.53.amzn1
  • H
CVE-2013-2417

<1:1.6.0.0-61.1.11.11.53.amzn1
  • H
CVE-2013-2426

<1:1.6.0.0-61.1.11.11.53.amzn1
  • H
CVE-2013-2384

<1:1.6.0.0-61.1.11.11.53.amzn1
  • H
CVE-2013-2383

<1:1.6.0.0-61.1.11.11.53.amzn1
  • H
CVE-2013-2419

<1:1.6.0.0-61.1.11.11.53.amzn1
  • H
CVE-2013-1569

<1:1.6.0.0-61.1.11.11.53.amzn1
  • H
CVE-2013-1557

<1:1.6.0.0-61.1.11.11.53.amzn1
  • H
CVE-2013-1558

<1:1.6.0.0-61.1.11.11.53.amzn1
  • H
CVE-2013-1537

<1:1.6.0.0-61.1.11.11.53.amzn1
  • H
CVE-2013-2424

<1:1.6.0.0-61.1.11.11.53.amzn1
  • H
Arbitrary Code Injection

<1:1.6.0.0-61.1.11.11.53.amzn1
  • H
CVE-2013-1518

<1:1.6.0.0-61.1.11.11.53.amzn1
  • H
Arbitrary Code Injection

<1:1.6.0.0-61.1.11.11.53.amzn1
  • H
CVE-2013-0809

<1:1.6.0.0-57.1.11.9.52.amzn1
  • H
Out-of-Bounds

<1:1.6.0.0-57.1.11.9.52.amzn1
  • H
CVE-2013-1486

<1:1.6.0.0-56.1.11.8.51.amzn1
  • H
Cryptographic Issues

<1:1.6.0.0-56.1.11.8.51.amzn1
  • H
CVE-2013-1478

<1:1.6.0.0-54.1.11.6.48.amzn1
  • H
CVE-2013-0443

<1:1.6.0.0-54.1.11.6.48.amzn1
  • H
CVE-2013-0442

<1:1.6.0.0-54.1.11.6.48.amzn1
  • H
CVE-2013-0432

<1:1.6.0.0-54.1.11.6.48.amzn1
  • H
CVE-2013-0435

<1:1.6.0.0-54.1.11.6.48.amzn1
  • H
CVE-2013-0427

<1:1.6.0.0-54.1.11.6.48.amzn1
  • H
CVE-2013-0424

<1:1.6.0.0-54.1.11.6.48.amzn1
  • H
CVE-2013-0440

<1:1.6.0.0-54.1.11.6.48.amzn1
  • H
CVE-2012-5086

<1:1.6.0.0-53.1.11.5.47.amzn1
  • H
CVE-2012-5085

<1:1.6.0.0-53.1.11.5.47.amzn1
  • H
CVE-2012-5081

<1:1.6.0.0-53.1.11.5.47.amzn1
  • H
CVE-2012-5077

<1:1.6.0.0-53.1.11.5.47.amzn1
  • H
CVE-2012-5068

<1:1.6.0.0-53.1.11.5.47.amzn1
  • H
CVE-2012-5079

<1:1.6.0.0-53.1.11.5.47.amzn1
  • H
CVE-2012-4416

<1:1.6.0.0-53.1.11.5.47.amzn1
  • H
CVE-2012-5075

<1:1.6.0.0-53.1.11.5.47.amzn1
  • H
CVE-2012-3216

<1:1.6.0.0-53.1.11.5.47.amzn1
  • H
CVE-2012-1682

<1:1.6.0.0-52.1.11.4.46.amzn1
  • H
CVE-2012-0547

<1:1.6.0.0-52.1.11.4.46.amzn1
  • H
CVE-2012-1724

<1:1.6.0.0-52.1.11.3.45.amzn1
  • H
CVE-2012-1718

<1:1.6.0.0-52.1.11.3.45.amzn1
  • H
CVE-2012-1713

<1:1.6.0.0-52.1.11.3.45.amzn1
  • H
CVE-2012-1711

<1:1.6.0.0-52.1.11.3.45.amzn1
  • H
CVE-2012-1717

<1:1.6.0.0-52.1.11.3.45.amzn1
  • H
CVE-2012-1723

<1:1.6.0.0-52.1.11.3.45.amzn1
  • H
CVE-2012-1716

<1:1.6.0.0-52.1.11.3.45.amzn1
  • C
CVE-2012-0502

<1:1.6.0.0-52.1.10.6.41.amzn1
  • C
CVE-2012-0497

<1:1.6.0.0-52.1.10.6.41.amzn1
  • C
Improper Input Validation

<1:1.6.0.0-52.1.10.6.41.amzn1
  • C
CVE-2012-0505

<1:1.6.0.0-52.1.10.6.41.amzn1
  • C
CVE-2012-0501

<1:1.6.0.0-52.1.10.6.41.amzn1
  • C
CVE-2012-0506

<1:1.6.0.0-52.1.10.6.41.amzn1
  • C
CVE-2012-0503

<1:1.6.0.0-52.1.10.6.41.amzn1
  • C
CVE-2011-3563

<1:1.6.0.0-52.1.10.6.41.amzn1
  • C
CVE-2011-3571

<1:1.6.0.0-52.1.10.6.41.amzn1
  • C
CVE-2011-3558

<1:1.6.0.0-52.1.9.10.40.amzn1
  • C
CVE-2011-3560

<1:1.6.0.0-52.1.9.10.40.amzn1
  • C
CVE-2011-3554

<1:1.6.0.0-52.1.9.10.40.amzn1
  • C
CVE-2011-3553

<1:1.6.0.0-52.1.9.10.40.amzn1
  • C
CVE-2011-3556

<1:1.6.0.0-52.1.9.10.40.amzn1
  • C
CVE-2011-3552

<1:1.6.0.0-52.1.9.10.40.amzn1
  • C
CVE-2011-3557

<1:1.6.0.0-52.1.9.10.40.amzn1
  • C
CVE-2011-3551

<1:1.6.0.0-52.1.9.10.40.amzn1
  • C
CVE-2011-3521

<1:1.6.0.0-52.1.9.10.40.amzn1
  • C
CVE-2011-3544

<1:1.6.0.0-52.1.9.10.40.amzn1
  • C
CVE-2011-3548

<1:1.6.0.0-52.1.9.10.40.amzn1
  • C
CVE-2011-3547

<1:1.6.0.0-52.1.9.10.40.amzn1
  • C
Improper Input Validation

<1:1.6.0.0-52.1.9.10.40.amzn1