Staging Environment: Content and features may be unstable or change without notice.
Search for vulnerabilities
Vulnerability details: VCID-4snj-etwf-eqe8
Vulnerability ID VCID-4snj-etwf-eqe8
Aliases CVE-2026-21933
Summary openjdk: Improve HttpServer Request handling (Oracle CPU 2026-01)
Status Published
Exploitability 0.5
Weighted Severity 5.5
Risk 2.8
Affected and Fixed Packages Package Details
Weaknesses (1)
Reference id Reference type URL
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-21933.json
https://api.first.org/data/v1/epss?cve=CVE-2026-21933
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21933
https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
1126119 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1126119
2429926 https://bugzilla.redhat.com/show_bug.cgi?id=2429926
cpujan2026.html https://www.oracle.com/security-alerts/cpujan2026.html
RHSA-2026:0847 https://access.redhat.com/errata/RHSA-2026:0847
RHSA-2026:0848 https://access.redhat.com/errata/RHSA-2026:0848
RHSA-2026:0849 https://access.redhat.com/errata/RHSA-2026:0849
RHSA-2026:0895 https://access.redhat.com/errata/RHSA-2026:0895
RHSA-2026:0896 https://access.redhat.com/errata/RHSA-2026:0896
RHSA-2026:0897 https://access.redhat.com/errata/RHSA-2026:0897
RHSA-2026:0898 https://access.redhat.com/errata/RHSA-2026:0898
RHSA-2026:0899 https://access.redhat.com/errata/RHSA-2026:0899
RHSA-2026:0900 https://access.redhat.com/errata/RHSA-2026:0900
RHSA-2026:0901 https://access.redhat.com/errata/RHSA-2026:0901
RHSA-2026:0927 https://access.redhat.com/errata/RHSA-2026:0927
RHSA-2026:0928 https://access.redhat.com/errata/RHSA-2026:0928
RHSA-2026:0931 https://access.redhat.com/errata/RHSA-2026:0931
RHSA-2026:0932 https://access.redhat.com/errata/RHSA-2026:0932
RHSA-2026:0933 https://access.redhat.com/errata/RHSA-2026:0933
RHSA-2026:1606 https://access.redhat.com/errata/RHSA-2026:1606
RHSA-2026:4832 https://access.redhat.com/errata/RHSA-2026:4832
USN-7995-1 https://usn.ubuntu.com/7995-1/
USN-7996-1 https://usn.ubuntu.com/7996-1/
USN-7997-1 https://usn.ubuntu.com/7997-1/
USN-7998-1 https://usn.ubuntu.com/7998-1/
USN-8000-1 https://usn.ubuntu.com/8000-1/
USN-8001-1 https://usn.ubuntu.com/8001-1/
USN-8002-1 https://usn.ubuntu.com/8002-1/
USN-8003-1 https://usn.ubuntu.com/8003-1/
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-21933.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at https://www.oracle.com/security-alerts/cpujan2026.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-21T20:56:13Z/ Found at https://www.oracle.com/security-alerts/cpujan2026.html
Exploit Prediction Scoring System (EPSS)
Percentile 0.09035
EPSS Score 0.00032
Published At April 2, 2026, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2026-04-01T13:32:27.805427+00:00 RedHat Importer Import https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-21933.json 38.0.0