Search for vulnerabilities
Vulnerability details: VCID-np2w-zymb-aaab
Vulnerability ID VCID-np2w-zymb-aaab
Aliases CVE-2023-21930
Summary Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JSSE). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via TLS to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data as well as unauthorized access to critical data or complete access to all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 7.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N).
Status Published
Exploitability 0.5
Weighted Severity 6.7
Risk 3.4
Affected and Fixed Packages Package Details
Weaknesses (1)
System Score Found at
cvssv3 7.4 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21930.json
epss 0.00049 https://api.first.org/data/v1/epss?cve=CVE-2023-21930
epss 0.00049 https://api.first.org/data/v1/epss?cve=CVE-2023-21930
epss 0.00049 https://api.first.org/data/v1/epss?cve=CVE-2023-21930
epss 0.00049 https://api.first.org/data/v1/epss?cve=CVE-2023-21930
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2023-21930
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2023-21930
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2023-21930
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2023-21930
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2023-21930
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2023-21930
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2023-21930
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2023-21930
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2023-21930
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2023-21930
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2023-21930
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2023-21930
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2023-21930
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2023-21930
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2023-21930
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2023-21930
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2023-21930
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2023-21930
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2023-21930
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2023-21930
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2023-21930
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2023-21930
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2023-21930
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2023-21930
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2023-21930
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2023-21930
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2023-21930
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2023-21930
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2023-21930
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2023-21930
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2023-21930
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2023-21930
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2023-21930
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2023-21930
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2023-21930
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2023-21930
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2023-21930
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2023-21930
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2023-21930
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2023-21930
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2023-21930
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2023-21930
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2023-21930
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2023-21930
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2023-21930
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2023-21930
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2023-21930
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2023-21930
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2023-21930
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2023-21930
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2023-21930
epss 0.00134 https://api.first.org/data/v1/epss?cve=CVE-2023-21930
epss 0.00134 https://api.first.org/data/v1/epss?cve=CVE-2023-21930
epss 0.00134 https://api.first.org/data/v1/epss?cve=CVE-2023-21930
epss 0.00134 https://api.first.org/data/v1/epss?cve=CVE-2023-21930
epss 0.00134 https://api.first.org/data/v1/epss?cve=CVE-2023-21930
epss 0.00134 https://api.first.org/data/v1/epss?cve=CVE-2023-21930
epss 0.00134 https://api.first.org/data/v1/epss?cve=CVE-2023-21930
epss 0.00134 https://api.first.org/data/v1/epss?cve=CVE-2023-21930
epss 0.00134 https://api.first.org/data/v1/epss?cve=CVE-2023-21930
epss 0.00134 https://api.first.org/data/v1/epss?cve=CVE-2023-21930
epss 0.00134 https://api.first.org/data/v1/epss?cve=CVE-2023-21930
epss 0.00134 https://api.first.org/data/v1/epss?cve=CVE-2023-21930
epss 0.00134 https://api.first.org/data/v1/epss?cve=CVE-2023-21930
epss 0.00134 https://api.first.org/data/v1/epss?cve=CVE-2023-21930
epss 0.00134 https://api.first.org/data/v1/epss?cve=CVE-2023-21930
epss 0.00134 https://api.first.org/data/v1/epss?cve=CVE-2023-21930
epss 0.00135 https://api.first.org/data/v1/epss?cve=CVE-2023-21930
epss 0.00137 https://api.first.org/data/v1/epss?cve=CVE-2023-21930
epss 0.00137 https://api.first.org/data/v1/epss?cve=CVE-2023-21930
epss 0.00137 https://api.first.org/data/v1/epss?cve=CVE-2023-21930
epss 0.00137 https://api.first.org/data/v1/epss?cve=CVE-2023-21930
epss 0.00137 https://api.first.org/data/v1/epss?cve=CVE-2023-21930
epss 0.00137 https://api.first.org/data/v1/epss?cve=CVE-2023-21930
epss 0.00137 https://api.first.org/data/v1/epss?cve=CVE-2023-21930
epss 0.00137 https://api.first.org/data/v1/epss?cve=CVE-2023-21930
epss 0.00137 https://api.first.org/data/v1/epss?cve=CVE-2023-21930
epss 0.00137 https://api.first.org/data/v1/epss?cve=CVE-2023-21930
epss 0.00137 https://api.first.org/data/v1/epss?cve=CVE-2023-21930
epss 0.00137 https://api.first.org/data/v1/epss?cve=CVE-2023-21930
epss 0.00692 https://api.first.org/data/v1/epss?cve=CVE-2023-21930
cvssv3.1 7.4 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
cvssv3 7.4 https://nvd.nist.gov/vuln/detail/CVE-2023-21930
cvssv3.1 7.5 https://www.couchbase.com/alerts/
Reference id Reference type URL
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21930.json
https://api.first.org/data/v1/epss?cve=CVE-2023-21930
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21930
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21937
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21938
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21939
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21954
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21967
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21968
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22006
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22036
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22041
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22045
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22049
https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
https://lists.debian.org/debian-lts-announce/2023/09/msg00018.html
https://security.netapp.com/advisory/ntap-20230427-0008/
https://security.netapp.com/advisory/ntap-20240621-0006/
https://www.couchbase.com/alerts/
https://www.debian.org/security/2023/dsa-5430
https://www.debian.org/security/2023/dsa-5478
https://www.oracle.com/security-alerts/cpuapr2023.html
1035957 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1035957
2187435 https://bugzilla.redhat.com/show_bug.cgi?id=2187435
cpe:2.3:a:netapp:7-mode_transition_tool:-:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:7-mode_transition_tool:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:brocade_san_navigator:-:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:brocade_san_navigator:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:cloud_insights_acquisition_unit:-:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_insights_acquisition_unit:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:cloud_insights_storage_workload_security_agent:-:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_insights_storage_workload_security_agent:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
cpe:2.3:a:oracle:graalvm:20.3.9:*:*:*:enterprise:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:20.3.9:*:*:*:enterprise:*:*:*
cpe:2.3:a:oracle:graalvm:21.3.5:*:*:*:enterprise:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:21.3.5:*:*:*:enterprise:*:*:*
cpe:2.3:a:oracle:graalvm:22.3.1:*:*:*:enterprise:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:22.3.1:*:*:*:enterprise:*:*:*
cpe:2.3:a:oracle:jdk:11.0.18:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:11.0.18:*:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:17.0.6:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:17.0.6:*:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.8.0:update361:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update361:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:20:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:20:*:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:11.0.18:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:11.0.18:*:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:17.0.6:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:17.0.6:*:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.8.0:update361:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update361:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:20:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:20:*:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:*:*:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:20:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:20:*:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:-:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:-:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:milestone1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:milestone1:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:milestone2:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:milestone2:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:milestone3:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:milestone3:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:milestone4:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:milestone4:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:milestone5:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:milestone5:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:milestone6:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:milestone6:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:milestone7:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:milestone7:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:milestone8:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:milestone8:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:milestone9:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:milestone9:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update101:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update101:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update102:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update102:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update11:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update11:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update111:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update111:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update112:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update112:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update121:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update121:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update131:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update131:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update141:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update141:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update151:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update151:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update152:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update152:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update161:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update161:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update162:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update162:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update171:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update171:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update172:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update172:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update181:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update181:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update191:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update191:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update192:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update192:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update20:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update20:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update201:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update201:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update202:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update202:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update211:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update211:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update212:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update212:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update221:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update221:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update222:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update222:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update231:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update231:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update232:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update232:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update241:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update241:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update242:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update242:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update25:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update25:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update252:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update252:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update262:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update262:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update271:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update271:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update281:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update281:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update282:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update282:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update291:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update291:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update301:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update301:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update302:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update302:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update31:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update31:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update312:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update312:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update322:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update322:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update332:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update332:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update342:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update342:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update352:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update352:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update362:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update362:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update40:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update40:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update45:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update45:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update5:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update5:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update51:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update51:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update60:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update60:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update65:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update65:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update66:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update66:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update71:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update71:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update72:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update72:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update73:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update73:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update74:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update74:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update77:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update77:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update91:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update91:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update92:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update92:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*
CVE-2023-21930 https://nvd.nist.gov/vuln/detail/CVE-2023-21930
RHSA-2023:1875 https://access.redhat.com/errata/RHSA-2023:1875
RHSA-2023:1877 https://access.redhat.com/errata/RHSA-2023:1877
RHSA-2023:1878 https://access.redhat.com/errata/RHSA-2023:1878
RHSA-2023:1879 https://access.redhat.com/errata/RHSA-2023:1879
RHSA-2023:1880 https://access.redhat.com/errata/RHSA-2023:1880
RHSA-2023:1882 https://access.redhat.com/errata/RHSA-2023:1882
RHSA-2023:1883 https://access.redhat.com/errata/RHSA-2023:1883
RHSA-2023:1884 https://access.redhat.com/errata/RHSA-2023:1884
RHSA-2023:1885 https://access.redhat.com/errata/RHSA-2023:1885
RHSA-2023:1889 https://access.redhat.com/errata/RHSA-2023:1889
RHSA-2023:1890 https://access.redhat.com/errata/RHSA-2023:1890
RHSA-2023:1891 https://access.redhat.com/errata/RHSA-2023:1891
RHSA-2023:1892 https://access.redhat.com/errata/RHSA-2023:1892
RHSA-2023:1895 https://access.redhat.com/errata/RHSA-2023:1895
RHSA-2023:1898 https://access.redhat.com/errata/RHSA-2023:1898
RHSA-2023:1899 https://access.redhat.com/errata/RHSA-2023:1899
RHSA-2023:1900 https://access.redhat.com/errata/RHSA-2023:1900
RHSA-2023:1903 https://access.redhat.com/errata/RHSA-2023:1903
RHSA-2023:1904 https://access.redhat.com/errata/RHSA-2023:1904
RHSA-2023:1905 https://access.redhat.com/errata/RHSA-2023:1905
RHSA-2023:1906 https://access.redhat.com/errata/RHSA-2023:1906
RHSA-2023:1907 https://access.redhat.com/errata/RHSA-2023:1907
RHSA-2023:1908 https://access.redhat.com/errata/RHSA-2023:1908
RHSA-2023:1909 https://access.redhat.com/errata/RHSA-2023:1909
RHSA-2023:1910 https://access.redhat.com/errata/RHSA-2023:1910
RHSA-2023:1911 https://access.redhat.com/errata/RHSA-2023:1911
RHSA-2023:1912 https://access.redhat.com/errata/RHSA-2023:1912
RHSA-2023:4103 https://access.redhat.com/errata/RHSA-2023:4103
RHSA-2023:4160 https://access.redhat.com/errata/RHSA-2023:4160
USN-6077-1 https://usn.ubuntu.com/6077-1/
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21930.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2023-21930
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Found at https://www.couchbase.com/alerts/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.20159
EPSS Score 0.00049
Published At Dec. 17, 2024, midnight
Date Actor Action Source VulnerableCode Version
There are no relevant records.