Deploy autonomous AI agents that reason, exploit, and validate complex vulnerability chains — not another scanner, an agentic system that thinks like a senior pentester.
CVE-2020-14621 is a medium severity vulnerability with a CVSS score of 5.3. No known exploits currently, and patches are available.
Very low probability of exploitation
EPSS predicts the probability of exploitation in the next 30 days based on real-world threat data, complementing CVSS severity scores with actual risk assessment.
Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JAXP). Supported versions that are affected are Java SE: 7u261, 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).
| Vendor | Product |
|---|---|
| Oracle | Openjdk |
| Netapp |
Please cite this page when referencing data from Strobes VI. Proper attribution helps support our vulnerability intelligence research.
| E Series Santricity Os Controller |
| Oracle | Jdk |
| Netapp | Oncommand Insight |
| Mcafee | Epolicy Orchestrator |
| Oracle | Jre |
| Opensuse | Leap |
| Netapp | Snapmanager |
| Fedoraproject | Fedora |
| Netapp | E Series Santricity Web Services |
And 13 more...