Search for vulnerabilities
Vulnerability details: VCID-ky57-vt2p-aaaq
Vulnerability ID VCID-ky57-vt2p-aaaq
Aliases CVE-2023-21938
Summary Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.8, 21.3.4 and 22.3.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).
Status Published
Exploitability 0.5
Weighted Severity 3.8
Risk 1.9
Affected and Fixed Packages Package Details
Weaknesses (1)
System Score Found at
cvssv3 3.7 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21938.json
epss 0.00049 https://api.first.org/data/v1/epss?cve=CVE-2023-21938
epss 0.00049 https://api.first.org/data/v1/epss?cve=CVE-2023-21938
epss 0.00049 https://api.first.org/data/v1/epss?cve=CVE-2023-21938
epss 0.00049 https://api.first.org/data/v1/epss?cve=CVE-2023-21938
epss 0.00083 https://api.first.org/data/v1/epss?cve=CVE-2023-21938
epss 0.00083 https://api.first.org/data/v1/epss?cve=CVE-2023-21938
epss 0.00083 https://api.first.org/data/v1/epss?cve=CVE-2023-21938
epss 0.00083 https://api.first.org/data/v1/epss?cve=CVE-2023-21938
epss 0.00083 https://api.first.org/data/v1/epss?cve=CVE-2023-21938
epss 0.00083 https://api.first.org/data/v1/epss?cve=CVE-2023-21938
epss 0.00083 https://api.first.org/data/v1/epss?cve=CVE-2023-21938
epss 0.00083 https://api.first.org/data/v1/epss?cve=CVE-2023-21938
epss 0.00083 https://api.first.org/data/v1/epss?cve=CVE-2023-21938
epss 0.00083 https://api.first.org/data/v1/epss?cve=CVE-2023-21938
epss 0.00083 https://api.first.org/data/v1/epss?cve=CVE-2023-21938
epss 0.00083 https://api.first.org/data/v1/epss?cve=CVE-2023-21938
epss 0.00095 https://api.first.org/data/v1/epss?cve=CVE-2023-21938
epss 0.00095 https://api.first.org/data/v1/epss?cve=CVE-2023-21938
epss 0.00095 https://api.first.org/data/v1/epss?cve=CVE-2023-21938
epss 0.00095 https://api.first.org/data/v1/epss?cve=CVE-2023-21938
epss 0.00095 https://api.first.org/data/v1/epss?cve=CVE-2023-21938
epss 0.00095 https://api.first.org/data/v1/epss?cve=CVE-2023-21938
epss 0.00095 https://api.first.org/data/v1/epss?cve=CVE-2023-21938
epss 0.00095 https://api.first.org/data/v1/epss?cve=CVE-2023-21938
epss 0.00095 https://api.first.org/data/v1/epss?cve=CVE-2023-21938
epss 0.00095 https://api.first.org/data/v1/epss?cve=CVE-2023-21938
epss 0.00095 https://api.first.org/data/v1/epss?cve=CVE-2023-21938
epss 0.00095 https://api.first.org/data/v1/epss?cve=CVE-2023-21938
epss 0.00095 https://api.first.org/data/v1/epss?cve=CVE-2023-21938
epss 0.00095 https://api.first.org/data/v1/epss?cve=CVE-2023-21938
epss 0.00095 https://api.first.org/data/v1/epss?cve=CVE-2023-21938
epss 0.00095 https://api.first.org/data/v1/epss?cve=CVE-2023-21938
epss 0.00095 https://api.first.org/data/v1/epss?cve=CVE-2023-21938
epss 0.00095 https://api.first.org/data/v1/epss?cve=CVE-2023-21938
epss 0.00095 https://api.first.org/data/v1/epss?cve=CVE-2023-21938
epss 0.00095 https://api.first.org/data/v1/epss?cve=CVE-2023-21938
epss 0.00095 https://api.first.org/data/v1/epss?cve=CVE-2023-21938
epss 0.00095 https://api.first.org/data/v1/epss?cve=CVE-2023-21938
epss 0.00095 https://api.first.org/data/v1/epss?cve=CVE-2023-21938
epss 0.00095 https://api.first.org/data/v1/epss?cve=CVE-2023-21938
epss 0.00095 https://api.first.org/data/v1/epss?cve=CVE-2023-21938
epss 0.00095 https://api.first.org/data/v1/epss?cve=CVE-2023-21938
epss 0.00095 https://api.first.org/data/v1/epss?cve=CVE-2023-21938
epss 0.00095 https://api.first.org/data/v1/epss?cve=CVE-2023-21938
epss 0.00095 https://api.first.org/data/v1/epss?cve=CVE-2023-21938
epss 0.00095 https://api.first.org/data/v1/epss?cve=CVE-2023-21938
epss 0.00095 https://api.first.org/data/v1/epss?cve=CVE-2023-21938
epss 0.00095 https://api.first.org/data/v1/epss?cve=CVE-2023-21938
epss 0.00095 https://api.first.org/data/v1/epss?cve=CVE-2023-21938
epss 0.00095 https://api.first.org/data/v1/epss?cve=CVE-2023-21938
epss 0.00095 https://api.first.org/data/v1/epss?cve=CVE-2023-21938
epss 0.00095 https://api.first.org/data/v1/epss?cve=CVE-2023-21938
epss 0.00095 https://api.first.org/data/v1/epss?cve=CVE-2023-21938
epss 0.00095 https://api.first.org/data/v1/epss?cve=CVE-2023-21938
epss 0.00095 https://api.first.org/data/v1/epss?cve=CVE-2023-21938
epss 0.00095 https://api.first.org/data/v1/epss?cve=CVE-2023-21938
epss 0.00095 https://api.first.org/data/v1/epss?cve=CVE-2023-21938
epss 0.00095 https://api.first.org/data/v1/epss?cve=CVE-2023-21938
epss 0.00095 https://api.first.org/data/v1/epss?cve=CVE-2023-21938
epss 0.00095 https://api.first.org/data/v1/epss?cve=CVE-2023-21938
epss 0.00095 https://api.first.org/data/v1/epss?cve=CVE-2023-21938
epss 0.00095 https://api.first.org/data/v1/epss?cve=CVE-2023-21938
epss 0.00095 https://api.first.org/data/v1/epss?cve=CVE-2023-21938
epss 0.00095 https://api.first.org/data/v1/epss?cve=CVE-2023-21938
epss 0.00095 https://api.first.org/data/v1/epss?cve=CVE-2023-21938
epss 0.00095 https://api.first.org/data/v1/epss?cve=CVE-2023-21938
epss 0.00095 https://api.first.org/data/v1/epss?cve=CVE-2023-21938
epss 0.00095 https://api.first.org/data/v1/epss?cve=CVE-2023-21938
epss 0.00095 https://api.first.org/data/v1/epss?cve=CVE-2023-21938
epss 0.00095 https://api.first.org/data/v1/epss?cve=CVE-2023-21938
epss 0.00095 https://api.first.org/data/v1/epss?cve=CVE-2023-21938
epss 0.00095 https://api.first.org/data/v1/epss?cve=CVE-2023-21938
epss 0.00095 https://api.first.org/data/v1/epss?cve=CVE-2023-21938
epss 0.00095 https://api.first.org/data/v1/epss?cve=CVE-2023-21938
epss 0.00095 https://api.first.org/data/v1/epss?cve=CVE-2023-21938
epss 0.00095 https://api.first.org/data/v1/epss?cve=CVE-2023-21938
epss 0.00095 https://api.first.org/data/v1/epss?cve=CVE-2023-21938
epss 0.00095 https://api.first.org/data/v1/epss?cve=CVE-2023-21938
epss 0.00095 https://api.first.org/data/v1/epss?cve=CVE-2023-21938
epss 0.00095 https://api.first.org/data/v1/epss?cve=CVE-2023-21938
epss 0.00512 https://api.first.org/data/v1/epss?cve=CVE-2023-21938
cvssv3.1 3.7 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
cvssv3 3.7 https://nvd.nist.gov/vuln/detail/CVE-2023-21938
cvssv3.1 7.5 https://www.couchbase.com/alerts/
Reference id Reference type URL
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21938.json
https://api.first.org/data/v1/epss?cve=CVE-2023-21938
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21930
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21937
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21938
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21939
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21954
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21967
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21968
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22006
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22036
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22041
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22045
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22049
https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
https://lists.debian.org/debian-lts-announce/2023/09/msg00018.html
https://security.netapp.com/advisory/ntap-20230427-0008/
https://security.netapp.com/advisory/ntap-20240621-0006/
https://www.couchbase.com/alerts/
https://www.debian.org/security/2023/dsa-5430
https://www.debian.org/security/2023/dsa-5478
https://www.oracle.com/security-alerts/cpuapr2023.html
1035957 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1035957
2187758 https://bugzilla.redhat.com/show_bug.cgi?id=2187758
cpe:2.3:a:netapp:7-mode_transition_tool:-:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:7-mode_transition_tool:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:brocade_san_navigator:-:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:brocade_san_navigator:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:cloud_insights_acquisition_unit:-:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_insights_acquisition_unit:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:cloud_insights_storage_workload_security_agent:-:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_insights_storage_workload_security_agent:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
cpe:2.3:a:oracle:graalvm:20.3.8:*:*:*:enterprise:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:20.3.8:*:*:*:enterprise:*:*:*
cpe:2.3:a:oracle:graalvm:21.3.4:*:*:*:enterprise:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:21.3.4:*:*:*:enterprise:*:*:*
cpe:2.3:a:oracle:graalvm:22.3.0:*:*:*:enterprise:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:22.3.0:*:*:*:enterprise:*:*:*
cpe:2.3:a:oracle:jdk:11.0.18:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:11.0.18:*:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:17.0.6:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:17.0.6:*:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.8.0:update361:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update361:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:20:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:20:*:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:11.0.18:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:11.0.18:*:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:17.0.6:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:17.0.6:*:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.8.0:update361:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update361:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:20:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:20:*:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:*:*:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:20:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:20:*:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:-:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:-:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:milestone1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:milestone1:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:milestone2:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:milestone2:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:milestone3:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:milestone3:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:milestone4:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:milestone4:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:milestone5:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:milestone5:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:milestone6:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:milestone6:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:milestone7:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:milestone7:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:milestone8:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:milestone8:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:milestone9:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:milestone9:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update101:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update101:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update102:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update102:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update11:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update11:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update111:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update111:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update112:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update112:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update121:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update121:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update131:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update131:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update141:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update141:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update151:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update151:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update152:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update152:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update161:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update161:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update162:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update162:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update171:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update171:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update172:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update172:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update181:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update181:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update191:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update191:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update192:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update192:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update20:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update20:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update201:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update201:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update202:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update202:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update211:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update211:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update212:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update212:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update221:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update221:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update222:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update222:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update231:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update231:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update232:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update232:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update241:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update241:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update242:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update242:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update25:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update25:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update252:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update252:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update262:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update262:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update271:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update271:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update281:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update281:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update282:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update282:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update291:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update291:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update301:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update301:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update302:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update302:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update31:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update31:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update312:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update312:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update322:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update322:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update332:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update332:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update342:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update342:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update352:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update352:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update362:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update362:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update40:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update40:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update45:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update45:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update5:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update5:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update51:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update51:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update60:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update60:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update65:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update65:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update66:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update66:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update71:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update71:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update72:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update72:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update73:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update73:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update74:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update74:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update77:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update77:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update91:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update91:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update92:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update92:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*
CVE-2023-21938 https://nvd.nist.gov/vuln/detail/CVE-2023-21938
RHSA-2023:1875 https://access.redhat.com/errata/RHSA-2023:1875
RHSA-2023:1877 https://access.redhat.com/errata/RHSA-2023:1877
RHSA-2023:1878 https://access.redhat.com/errata/RHSA-2023:1878
RHSA-2023:1879 https://access.redhat.com/errata/RHSA-2023:1879
RHSA-2023:1880 https://access.redhat.com/errata/RHSA-2023:1880
RHSA-2023:1882 https://access.redhat.com/errata/RHSA-2023:1882
RHSA-2023:1883 https://access.redhat.com/errata/RHSA-2023:1883
RHSA-2023:1884 https://access.redhat.com/errata/RHSA-2023:1884
RHSA-2023:1885 https://access.redhat.com/errata/RHSA-2023:1885
RHSA-2023:1889 https://access.redhat.com/errata/RHSA-2023:1889
RHSA-2023:1890 https://access.redhat.com/errata/RHSA-2023:1890
RHSA-2023:1891 https://access.redhat.com/errata/RHSA-2023:1891
RHSA-2023:1892 https://access.redhat.com/errata/RHSA-2023:1892
RHSA-2023:1895 https://access.redhat.com/errata/RHSA-2023:1895
RHSA-2023:1898 https://access.redhat.com/errata/RHSA-2023:1898
RHSA-2023:1899 https://access.redhat.com/errata/RHSA-2023:1899
RHSA-2023:1900 https://access.redhat.com/errata/RHSA-2023:1900
RHSA-2023:1903 https://access.redhat.com/errata/RHSA-2023:1903
RHSA-2023:1904 https://access.redhat.com/errata/RHSA-2023:1904
RHSA-2023:1905 https://access.redhat.com/errata/RHSA-2023:1905
RHSA-2023:1906 https://access.redhat.com/errata/RHSA-2023:1906
RHSA-2023:1907 https://access.redhat.com/errata/RHSA-2023:1907
RHSA-2023:1908 https://access.redhat.com/errata/RHSA-2023:1908
RHSA-2023:1909 https://access.redhat.com/errata/RHSA-2023:1909
RHSA-2023:1910 https://access.redhat.com/errata/RHSA-2023:1910
RHSA-2023:1911 https://access.redhat.com/errata/RHSA-2023:1911
RHSA-2023:1912 https://access.redhat.com/errata/RHSA-2023:1912
RHSA-2023:4103 https://access.redhat.com/errata/RHSA-2023:4103
RHSA-2023:4160 https://access.redhat.com/errata/RHSA-2023:4160
USN-6077-1 https://usn.ubuntu.com/6077-1/
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21938.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2023-21938
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Found at https://www.couchbase.com/alerts/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.20159
EPSS Score 0.00049
Published At Dec. 17, 2024, midnight
Date Actor Action Source VulnerableCode Version
There are no relevant records.