java-1.6.0-openjdk vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the java-1.6.0-openjdk package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
CVE-2016-5542

<1:1.6.0.41-1.13.13.1.el7_3
  • H
CVE-2016-5554

<1:1.6.0.41-1.13.13.1.el7_3
  • H
Information Exposure

<1:1.6.0.41-1.13.13.1.el7_3
  • H
Improper Access Control

<1:1.6.0.41-1.13.13.1.el7_3
  • H
Access Restriction Bypass

<1:1.6.0.41-1.13.13.1.el7_3
  • H
CVE-2016-3508

<1:1.6.0.40-1.13.12.5.el7_2
  • H
CVE-2016-3500

<1:1.6.0.40-1.13.12.5.el7_2
  • H
CVE-2016-3458

<1:1.6.0.40-1.13.12.5.el7_2
  • H
CVE-2016-3550

<1:1.6.0.40-1.13.12.5.el7_2
  • H
CVE-2016-3606

<1:1.6.0.40-1.13.12.5.el7_2
  • C
CVE-2016-3427

<1:1.6.0.39-1.13.11.0.el7_2
  • C
CVE-2016-3425

<1:1.6.0.39-1.13.11.0.el7_2
  • C
CVE-2016-0687

<1:1.6.0.39-1.13.11.0.el7_2
  • C
CVE-2016-0695

<1:1.6.0.39-1.13.11.0.el7_2
  • C
CVE-2016-0686

<1:1.6.0.39-1.13.11.0.el7_2
  • H
CVE-2016-0466

<1:1.6.0.38-1.13.10.0.el7_2
  • H
CVE-2016-0402

<1:1.6.0.38-1.13.10.0.el7_2
  • H
CVE-2016-0483

<1:1.6.0.38-1.13.10.0.el7_2
  • H
CVE-2016-0494

<1:1.6.0.38-1.13.10.0.el7_2
  • H
CVE-2016-0448

<1:1.6.0.38-1.13.10.0.el7_2
  • H
CVE-2015-4881

<1:1.6.0.37-1.13.9.4.el7_1
  • H
CVE-2015-4882

<1:1.6.0.37-1.13.9.4.el7_1
  • H
CVE-2015-4835

<1:1.6.0.37-1.13.9.4.el7_1
  • H
CVE-2015-4860

<1:1.6.0.37-1.13.9.4.el7_1
  • H
CVE-2015-4844

<1:1.6.0.37-1.13.9.4.el7_1
  • H
CVE-2015-4911

<1:1.6.0.37-1.13.9.4.el7_1
  • H
CVE-2015-4803

<1:1.6.0.37-1.13.9.4.el7_1
  • H
CVE-2015-4883

<1:1.6.0.37-1.13.9.4.el7_1
  • H
CVE-2015-4893

<1:1.6.0.37-1.13.9.4.el7_1
  • H
CVE-2015-4842

<1:1.6.0.37-1.13.9.4.el7_1
  • H
CVE-2015-4903

<1:1.6.0.37-1.13.9.4.el7_1
  • H
CVE-2015-4806

<1:1.6.0.37-1.13.9.4.el7_1
  • H
CVE-2015-4805

<1:1.6.0.37-1.13.9.4.el7_1
  • H
CVE-2015-4843

<1:1.6.0.37-1.13.9.4.el7_1
  • H
CVE-2015-4734

<1:1.6.0.37-1.13.9.4.el7_1
  • H
CVE-2015-4872

<1:1.6.0.37-1.13.9.4.el7_1
  • H
CVE-2015-2625

<1:1.6.0.36-1.13.8.1.el7_1
  • H
CVE-2015-2628

<1:1.6.0.36-1.13.8.1.el7_1
  • H
CVE-2015-4748

<1:1.6.0.36-1.13.8.1.el7_1
  • H
CVE-2015-4760

<1:1.6.0.36-1.13.8.1.el7_1
  • H
CVE-2015-4749

<1:1.6.0.36-1.13.8.1.el7_1
  • H
CVE-2015-2590

<1:1.6.0.36-1.13.8.1.el7_1
  • H
CVE-2015-4733

<1:1.6.0.36-1.13.8.1.el7_1
  • H
Use of a Broken or Risky Cryptographic Algorithm

<1:1.6.0.36-1.13.8.1.el7_1
  • H
CVE-2015-2601

<1:1.6.0.36-1.13.8.1.el7_1
  • H
CVE-2015-2621

<1:1.6.0.36-1.13.8.1.el7_1
  • H
CVE-2015-4732

<1:1.6.0.36-1.13.8.1.el7_1
  • H
CVE-2015-4731

<1:1.6.0.36-1.13.8.1.el7_1
  • H
CVE-2015-2632

<1:1.6.0.36-1.13.8.1.el7_1
  • H
Cryptographic Issues

<1:1.6.0.36-1.13.8.1.el7_1
  • H
CVE-2015-0460

<1:1.6.0.35-1.13.7.1.el7_1
  • H
CVE-2005-1080

<1:1.6.0.35-1.13.7.1.el7_1
  • H
CVE-2015-0480

<1:1.6.0.35-1.13.7.1.el7_1
  • H
CVE-2015-0478

<1:1.6.0.35-1.13.7.1.el7_1
  • H
CVE-2015-0488

<1:1.6.0.35-1.13.7.1.el7_1
  • H
CVE-2015-0477

<1:1.6.0.35-1.13.7.1.el7_1
  • H
CVE-2015-0469

<1:1.6.0.35-1.13.7.1.el7_1
  • H
CVE-2014-6587

<1:1.6.0.34-1.13.6.1.el7_0
  • H
CVE-2014-6591

<1:1.6.0.34-1.13.6.1.el7_0
  • H
CVE-2015-0395

<1:1.6.0.34-1.13.6.1.el7_0
  • H
CVE-2015-0383

<1:1.6.0.34-1.13.6.1.el7_0
  • H
CVE-2014-6585

<1:1.6.0.34-1.13.6.1.el7_0
  • H
CVE-2015-0412

<1:1.6.0.34-1.13.6.1.el7_0
  • H
CVE-2014-6601

<1:1.6.0.34-1.13.6.1.el7_0
  • H
CVE-2015-0410

<1:1.6.0.34-1.13.6.1.el7_0
  • H
CVE-2015-0408

<1:1.6.0.34-1.13.6.1.el7_0
  • H
Cryptographic Issues

<1:1.6.0.34-1.13.6.1.el7_0
  • H
CVE-2015-0407

<1:1.6.0.34-1.13.6.1.el7_0
  • H
CVE-2014-6593

<1:1.6.0.34-1.13.6.1.el7_0
  • H
CVE-2014-6511

<1:1.6.0.33-1.13.5.0.el7_0
  • H
CVE-2014-6531

<1:1.6.0.33-1.13.5.0.el7_0
  • H
CVE-2014-6512

<1:1.6.0.33-1.13.5.0.el7_0
  • H
CVE-2014-6519

<1:1.6.0.33-1.13.5.0.el7_0
  • H
CVE-2014-6517

<1:1.6.0.33-1.13.5.0.el7_0
  • H
CVE-2014-6504

<1:1.6.0.33-1.13.5.0.el7_0
  • H
CVE-2014-6457

<1:1.6.0.33-1.13.5.0.el7_0
  • H
CVE-2014-6506

<1:1.6.0.33-1.13.5.0.el7_0
  • H
CVE-2014-6558

<1:1.6.0.33-1.13.5.0.el7_0
  • H
CVE-2014-6502

<1:1.6.0.33-1.13.5.0.el7_0
  • H
CVE-2014-4262

<1:1.6.0.0-6.1.13.4.el7_0
  • H
CVE-2014-4252

<1:1.6.0.0-6.1.13.4.el7_0
  • H
CVE-2014-4266

<1:1.6.0.0-6.1.13.4.el7_0
  • H
CVE-2014-4218

<1:1.6.0.0-6.1.13.4.el7_0
  • H
CVE-2014-4216

<1:1.6.0.0-6.1.13.4.el7_0
  • H
CVE-2014-4219

<1:1.6.0.0-6.1.13.4.el7_0
  • H
CVE-2014-4244

<1:1.6.0.0-6.1.13.4.el7_0
  • H
CVE-2014-2490

<1:1.6.0.0-6.1.13.4.el7_0
  • H
CVE-2014-4263

<1:1.6.0.0-6.1.13.4.el7_0
  • H
CVE-2014-4209

<1:1.6.0.0-6.1.13.4.el7_0
  • H
CVE-2014-2397

<1:1.6.0.0-6.1.13.3.el7_0
  • H
CVE-2014-0452

<1:1.6.0.0-6.1.13.3.el7_0
  • H
CVE-2014-0446

<1:1.6.0.0-6.1.13.3.el7_0
  • H
CVE-2014-2423

<1:1.6.0.0-6.1.13.3.el7_0
  • H
CVE-2014-2414

<1:1.6.0.0-6.1.13.3.el7_0
  • H
CVE-2014-0453

<1:1.6.0.0-6.1.13.3.el7_0
  • H
CVE-2014-0457

<1:1.6.0.0-6.1.13.3.el7_0
  • H
CVE-2014-2427

<1:1.6.0.0-6.1.13.3.el7_0
  • H
CVE-2014-0429

<1:1.6.0.0-6.1.13.3.el7_0
  • H
CVE-2014-0460

<1:1.6.0.0-6.1.13.3.el7_0
  • H
CVE-2014-0451

<1:1.6.0.0-6.1.13.3.el7_0
  • H
CVE-2014-0458

<1:1.6.0.0-6.1.13.3.el7_0
  • H
CVE-2014-0461

<1:1.6.0.0-6.1.13.3.el7_0
  • H
CVE-2014-0456

<1:1.6.0.0-6.1.13.3.el7_0
  • H
CVE-2014-2403

<1:1.6.0.0-6.1.13.3.el7_0
  • H
CVE-2014-2398

<1:1.6.0.0-6.1.13.3.el7_0
  • H
Link Following

<1:1.6.0.0-6.1.13.3.el7_0
  • H
CVE-2014-2421

<1:1.6.0.0-6.1.13.3.el7_0
  • H
CVE-2014-2412

<1:1.6.0.0-6.1.13.3.el7_0