Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:deb/debian/openjdk-21@21.0.11%2B10-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11%2B10-1?distro=trixie
Vulnerabilities affecting this package (0)
Vulnerability Summary Fixed by
This package is not known to be affected by vulnerabilities.
Vulnerabilities fixed by this package (47)
Vulnerability Summary Aliases
VCID-11vj-5zz4-6fe7 openjdk: Enhance Buffered Image handling (Oracle CPU 2025-04) CVE-2025-30698
VCID-13t7-vubq-8kae openjdk: Enhance certificate handling (Oracle CPU 2025-10) CVE-2025-53057
VCID-1gha-995s-7qdg Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JAXP). Supported versions that are affected are Oracle Java SE: 8u481, 8u481-b50, 8u481-perf, 11.0.30, 17.0.18, 21.0.10, 25.0.2, 26; Oracle GraalVM for JDK: 17.0.18 and 21.0.10; Oracle GraalVM Enterprise Edition: 21.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N). CVE-2026-22016
VCID-2tju-1r8k-sbf9 OpenJDK: C2 compilation fails with "Exceeded _node_regs array" (8317507) CVE-2024-21094
VCID-3tav-ffar-hfhb Multiple vulnerabilities have been found in IcedTea, the worst of which could result in arbitrary code execution. CVE-2023-21843
VCID-4snj-etwf-eqe8 openjdk: Improve HttpServer Request handling (Oracle CPU 2026-01) CVE-2026-21933
VCID-57sd-8y93-qqhu Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Networking). Supported versions that are affected are Oracle Java SE: 8u481-perf, 11.0.30, 17.0.18, 21.0.10, 25.0.2, 26; Oracle GraalVM for JDK: 17.0.18 and 21.0.10; Oracle GraalVM Enterprise Edition: 21.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 7.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). CVE-2026-34282
VCID-5et1-ytak-xqh7 OpenJDK: Excessive symbol length can lead to infinite loop (8319859) CVE-2024-21138
VCID-6196-gvhx-ruh8 Multiple vulnerabilities have been discovered in OpenJDK, the worst of which could lead to remote code execution. CVE-2024-21235
VCID-6fce-bys3-kkgm openjdk: OpenJDK: Update LibPNG (Oracle CPU 2026-04) CVE-2026-22020
VCID-6r1k-8y1c-q7fm Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Security). Supported versions that are affected are Oracle Java SE: 8u481, 8u481-b50, 8u481-perf, 11.0.30, 17.0.18, 21.0.10, 25.0.2, 26; Oracle GraalVM for JDK: 17.0.18 and 21.0.10; Oracle GraalVM Enterprise Edition: 21.3.17. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition executes to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 2.9 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N). CVE-2026-22007
VCID-76rb-sg3r-bqce OpenJDK: potential UTF8 size overflow (8314794) CVE-2024-21131
VCID-8cup-qnc8-wudx Multiple vulnerabilities have been discovered in OpenJDK, the worst of which could lead to remote code execution. CVE-2024-20952
VCID-9n5v-4daz-eyc2 Multiple vulnerabilities have been discovered in OpenJDK, the worst of which could lead to remote code execution. CVE-2024-21217
VCID-9urr-3gt2-mfhe OpenJDK: long Exception message leading to crash (8319851) CVE-2024-21011
VCID-a282-ksr4-j3cu Multiple vulnerabilities have been discovered in OpenJDK, the worst of which could lead to remote code execution. CVE-2023-22081
VCID-a3xk-3wya-s3gm Multiple vulnerabilities have been found in IcedTea, the worst of which could result in arbitrary code execution. CVE-2023-21835
VCID-apsn-z1br-3bdy openjdk: Enhance Certificate Checking (Oracle CPU 2026-01) CVE-2026-21945
VCID-b32x-4pu4-jkh4 openjdk: Better Glyph drawing (Oracle CPU 2025-07) CVE-2025-30749
VCID-duy9-6f1p-vqah openjdk: Enhance Handling of URIs (Oracle CPU 2026-01) CVE-2026-21932
VCID-e6dm-6767-9kdk openjdk: Improve HTTP client header handling (Oracle CPU 2025-07) CVE-2025-50059
VCID-ecr4-rqud-gyhf Multiple vulnerabilities have been found in IcedTea, the worst of which could result in arbitrary code execution. CVE-2023-21830
VCID-fau4-ajny-nfbd Multiple vulnerabilities have been discovered in OpenJDK, the worst of which could lead to remote code execution. CVE-2024-20921
VCID-fwk5-wqvn-4qaz Multiple vulnerabilities have been discovered in OpenJDK, the worst of which could lead to remote code execution. CVE-2024-20926
VCID-gwnq-we51-3bey openjdk: Enhance String handling (Oracle CPU 2025-10) CVE-2025-61748
VCID-h7n1-qfs3-v3fw OpenJDK: HTTP/2 client improper reverse DNS lookup (8315708) CVE-2024-21012
VCID-jxgd-j4wr-tyb7 Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Security). Supported versions that are affected are Oracle Java SE: 8u481, 8u481-b50, 8u481-perf, 11.0.30, 17.0.18, 21.0.10, 25.0.2, 26; Oracle GraalVM for JDK: 17.0.18 and 21.0.10; Oracle GraalVM Enterprise Edition: 21.3.17. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition executes to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 2.9 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N). CVE-2026-34268
VCID-jztz-7cuw-t7ep Multiple vulnerabilities have been discovered in OpenJDK, the worst of which could lead to remote code execution. CVE-2024-20945
VCID-mt9c-tby1-wqe9 openjdk: Improve JMX connections (Oracle CPU 2026-01) CVE-2026-21925
VCID-n71d-tx76-vbbd OpenJDK: Out-of-bounds access in 2D image handling (8324559) CVE-2024-21145
VCID-nr6u-aysf-7kgk Multiple vulnerabilities have been discovered in OpenJDK, the worst of which could lead to remote code execution. CVE-2024-20919
VCID-ntga-y6cv-a3df openjdk: Enhance array handling (Oracle CPU 2025-01) CVE-2025-21502
VCID-nxx8-nehy-qyhg openjdk: Enhance Path Factories (Oracle CPU 2025-10) CVE-2025-53066
VCID-p9na-7jta-9yg4 openjdk: Enhance TLS protocol support (Oracle CPU 2025-07) CVE-2025-30754
VCID-rggy-f3va-mfay OpenJDK: RangeCheckElimination array index overflow (8323231) CVE-2024-21147
VCID-sz6r-65q1-q3bh Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JSSE). Supported versions that are affected are Oracle Java SE: 8u481, 8u481-b50, 8u481-perf, 11.0.30, 17.0.18, 21.0.10, 25.0.2, 26; Oracle GraalVM for JDK: 17.0.18 and 21.0.10; Oracle GraalVM Enterprise Edition: 21.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L). CVE-2026-22021
VCID-u81s-cs95-4yhx openjdk: Better TLS connection support (Oracle CPU 2025-04) CVE-2025-21587
VCID-vbw8-4j9f-eya5 openjdk: Glyph out-of-memory access and crash (Oracle CPU 2025-07) CVE-2025-50106
VCID-vpnc-yu7r-bqb6 Multiple vulnerabilities have been discovered in OpenJDK, the worst of which could lead to remote code execution. CVE-2024-21208
VCID-vuhe-re6z-8kax Multiple vulnerabilities have been discovered in OpenJDK, the worst of which could lead to remote code execution. CVE-2023-22025
VCID-wn4r-ugaa-5ydb Multiple vulnerabilities have been discovered in OpenJDK, the worst of which could lead to remote code execution. CVE-2024-20918
VCID-xte1-h9nn-4bbk Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 8u481, 8u481-b50, 8u481-perf, 11.0.30, 17.0.18, 21.0.10, 25.0.2, 26; Oracle GraalVM for JDK: 17.0.18 and 21.0.10; Oracle GraalVM Enterprise Edition: 21.3.17. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L). CVE-2026-22018
VCID-y8bc-k5qu-c7f5 openjdk: Improve compiler transformations (Oracle CPU 2025-04) CVE-2025-30691
VCID-z356-tw9t-q7bp Multiple vulnerabilities have been discovered in OpenJDK, the worst of which could lead to remote code execution. CVE-2024-21210
VCID-zdra-bzqn-4ug9 OpenJDK: integer overflow in C1 compiler address generation (8322122) CVE-2024-21068
VCID-zgpr-3zft-zqgt OpenJDK: Range Check Elimination (RCE) pre-loop limit overflow (8320548) CVE-2024-21140
VCID-zsun-4q6p-8fek Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JGSS). Supported versions that are affected are Oracle Java SE: 8u481, 8u481-b50, 8u481-perf, 11.0.30, 17.0.18, 21.0.10, 25.0.2, 26; Oracle GraalVM for JDK: 17.0.18 and 21.0.10; Oracle GraalVM Enterprise Edition: 21.3.17. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N). CVE-2026-22013

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-25T23:22:07.847265+00:00 Debian Importer Fixing VCID-57sd-8y93-qqhu https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-25T23:22:07.823329+00:00 Debian Importer Fixing VCID-jxgd-j4wr-tyb7 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-25T23:22:07.800242+00:00 Debian Importer Fixing VCID-sz6r-65q1-q3bh https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-25T23:22:07.770565+00:00 Debian Importer Fixing VCID-6fce-bys3-kkgm https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-25T23:22:07.742638+00:00 Debian Importer Fixing VCID-xte1-h9nn-4bbk https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-25T23:22:07.720723+00:00 Debian Importer Fixing VCID-1gha-995s-7qdg https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-25T23:22:07.698437+00:00 Debian Importer Fixing VCID-zsun-4q6p-8fek https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-25T23:22:07.676167+00:00 Debian Importer Fixing VCID-6r1k-8y1c-q7fm https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-25T23:22:07.648691+00:00 Debian Importer Fixing VCID-apsn-z1br-3bdy https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-25T23:22:07.618495+00:00 Debian Importer Fixing VCID-4snj-etwf-eqe8 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-25T23:22:07.587881+00:00 Debian Importer Fixing VCID-duy9-6f1p-vqah https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-25T23:22:07.557999+00:00 Debian Importer Fixing VCID-mt9c-tby1-wqe9 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-25T23:22:07.522489+00:00 Debian Importer Fixing VCID-gwnq-we51-3bey https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-25T23:22:07.487448+00:00 Debian Importer Fixing VCID-nxx8-nehy-qyhg https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-25T23:22:07.450048+00:00 Debian Importer Fixing VCID-13t7-vubq-8kae https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-25T23:22:07.420039+00:00 Debian Importer Fixing VCID-vbw8-4j9f-eya5 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-25T23:22:07.389824+00:00 Debian Importer Fixing VCID-e6dm-6767-9kdk https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-25T23:22:07.359426+00:00 Debian Importer Fixing VCID-p9na-7jta-9yg4 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-25T23:22:07.328487+00:00 Debian Importer Fixing VCID-b32x-4pu4-jkh4 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-25T23:22:07.294975+00:00 Debian Importer Fixing VCID-11vj-5zz4-6fe7 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-25T23:22:07.256465+00:00 Debian Importer Fixing VCID-y8bc-k5qu-c7f5 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-25T23:22:07.219120+00:00 Debian Importer Fixing VCID-u81s-cs95-4yhx https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-25T23:22:07.183288+00:00 Debian Importer Fixing VCID-ntga-y6cv-a3df https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-25T23:22:07.152511+00:00 Debian Importer Fixing VCID-6196-gvhx-ruh8 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-25T23:22:07.121917+00:00 Debian Importer Fixing VCID-9n5v-4daz-eyc2 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-25T23:22:07.091486+00:00 Debian Importer Fixing VCID-z356-tw9t-q7bp https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-25T23:22:07.060044+00:00 Debian Importer Fixing VCID-vpnc-yu7r-bqb6 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-25T23:22:07.028278+00:00 Debian Importer Fixing VCID-rggy-f3va-mfay https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-25T23:22:06.996742+00:00 Debian Importer Fixing VCID-n71d-tx76-vbbd https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-25T23:22:06.963657+00:00 Debian Importer Fixing VCID-zgpr-3zft-zqgt https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-25T23:22:06.928689+00:00 Debian Importer Fixing VCID-5et1-ytak-xqh7 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-25T23:22:06.894843+00:00 Debian Importer Fixing VCID-76rb-sg3r-bqce https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-25T23:22:06.864221+00:00 Debian Importer Fixing VCID-2tju-1r8k-sbf9 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-25T23:22:06.832967+00:00 Debian Importer Fixing VCID-zdra-bzqn-4ug9 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-25T23:22:06.803086+00:00 Debian Importer Fixing VCID-h7n1-qfs3-v3fw https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-25T23:22:06.772632+00:00 Debian Importer Fixing VCID-9urr-3gt2-mfhe https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-25T23:22:06.732000+00:00 Debian Importer Fixing VCID-8cup-qnc8-wudx https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-25T23:22:06.700592+00:00 Debian Importer Fixing VCID-jztz-7cuw-t7ep https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-25T23:22:06.668583+00:00 Debian Importer Fixing VCID-fwk5-wqvn-4qaz https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-25T23:22:06.637373+00:00 Debian Importer Fixing VCID-fau4-ajny-nfbd https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-25T23:22:06.606908+00:00 Debian Importer Fixing VCID-nr6u-aysf-7kgk https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-25T23:22:06.575990+00:00 Debian Importer Fixing VCID-wn4r-ugaa-5ydb https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-25T23:22:06.544284+00:00 Debian Importer Fixing VCID-a282-ksr4-j3cu https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-25T23:22:06.514213+00:00 Debian Importer Fixing VCID-vuhe-re6z-8kax https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-25T23:22:06.484341+00:00 Debian Importer Fixing VCID-3tav-ffar-hfhb https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-25T23:22:06.453536+00:00 Debian Importer Fixing VCID-a3xk-3wya-s3gm https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-25T23:22:06.423229+00:00 Debian Importer Fixing VCID-ecr4-rqud-gyhf https://security-tracker.debian.org/tracker/data/json 38.4.0