Azul Zulu release 11.50 |
|
Apply only when loading untrusted code. No impact on Command Enterprise, since it runs only trusted code, installed on its hosting server without loading anything from the network. |
Azul Zulu release 11.52 |
|
Apply only when loading untrusted code. No impact on Command Enterprise, since it runs only trusted code, installed on its hosting server without loading anything from the network. |
|
Apply to data loaded over a network API. No impact on Command Enterprise, since related to components or protocols not used by it. |
|
Apply to data loaded over a network API. Low or medium risk vulnerabilities closed with Command Enterprise 2.18. |
Azul Zulu release 11.54 |
|
Apply to data loaded over a network API. No impact on Command Enterprise, since related to components or protocols not used by it. |
|
Apply to data loaded over a network API. Low or medium risk vulnerabilities closed with Command Enterprise 2.18. |
Azul Zulu release 11.56 |
|
Applies to data loaded over a network API. No impact on Command Enterprise, since related to components or protocols not used by it. |
|
Applies only if the zlib library is used outside the Azul Zulu Java environment. No impact on Command Enterprise, since it doesn’t provide access to this library outside the Azul Zulu Java environment. |
|
Applies to data loaded over a network API. No impact on Command Enterprise, since it uses the API only with trusted data. |
|
Apply to data loaded over a network API. Low or medium risk vulnerabilities closed with Command Enterprise 2.18. |
Azul Zulu release 11.58 |
|
Applies to data loaded over a network API. No impact on Command Enterprise, since related to components or protocols not used by it. |
|
Apply to data loaded over a network API. No impact on Command Enterprise. |
Azul Zulu release 11.60 |
|
Apply only when loading untrusted code. No impact on Command Enterprise, since it runs only trusted code, installed on its hosting server without loading anything from the network. |
|
Applies to data loaded over a network API. No impact on Command Enterprise, since related to components or protocols not used by it. |
|
Apply to data loaded over a network API. Low or medium risk vulnerabilities, closed with Command Enterprise 2.18. |
Azul Zulu release 11.62 |
|
Apply only when loading untrusted code. No impact on Command Enterprise, since it runs only trusted code, installed on its hosting server without loading anything from the network. |
Azul Zulu release 11.64 |
|
Applies only when loading untrusted code. No impact on Command Enterprise. |
|
Applies to data loaded over a network API. No impact on Command Enterprise, since related to components or protocols not used by it. |
|
Applies to data received or sent over a half-duplex TLS session. No impact on Command Enterprise, since it receives or sends sensitive data only on authenticated full-duplex TLS sessions. |
|
Apply to data loaded over a network API. Low or medium risk vulnerabilities, closed with Command Enterprise 2.18. |
Azul Zulu release 11.66 (used since Command Enterprise 2.18) |
|
Apply only when loading untrusted code. No impact on Command Enterprise, since it runs only trusted code, installed on its hosting server without loading anything from the network. |
|
Apply to data loaded over a network API. No impact on Command Enterprise, since related to components or protocols not used by it. |
|
Apply to data loaded over a network API. Low risk vulnerabilities, closed with Command Enterprise 2.18. |
Azul Zulu release 11.68 |
|
Apply only when loading untrusted code. No impact on Command Enterprise, since it runs only trusted code, installed on its hosting server without loading anything from the network. |
Azul Zulu release 11.70 |
|
Apply only when loading untrusted code. No impact on Command Enterprise, since it runs only trusted code, installed on its hosting server without loading anything from the network. |
|
Applies to data loaded over a network API. No impact on Command Enterprise, since related to components or protocols not used by it. |
|
Apply to data loaded over a network API. No impact on Command Enterprise, since it uses the API only with trusted data. |
Azul Zulu release 11.72 |
|
Apply only when loading untrusted code. No impact on Command Enterprise, since it runs only trusted code, installed on its hosting server without loading anything from the network. |
|
Apply to data loaded over a network API. No impact on Command Enterprise, since it uses the API only with trusted data. |
Azul Zulu release 11.74 |
|
Applies only when loading untrusted code. No impact on Command Enterprise. |
|
Apply only when loading untrusted code. Likely no impact on Command Enterprise, since it runs only trusted code installed on its hosting server without loading anything from the network. In any case this is a low risk vulnerability, that will be resolved updating Azul Java in a future release. |
|
|
Apply to data loaded over a network API. Likely no impact on Command Enterprise, since it uses the API only with trusted data. In any case there are a medium or low risk vulnerability, that will be resolved updating Azul Java in a future release. |