mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-09 16:05:11 +00:00
859 lines
34 KiB
JSON
859 lines
34 KiB
JSON
{
|
|
"id": "CVE-2021-2341",
|
|
"sourceIdentifier": "secalert_us@oracle.com",
|
|
"published": "2021-07-21T15:15:17.927",
|
|
"lastModified": "2025-05-27T16:47:32.957",
|
|
"vulnStatus": "Analyzed",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Networking). Supported versions that are affected are Java SE: 7u301, 8u291, 11.0.11, 16.0.1; Oracle GraalVM Enterprise Edition: 20.3.2 and 21.1.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N)."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Una vulnerabilidad en el producto Java SE, Oracle GraalVM Enterprise Edition de Oracle Java SE (componente: Networking). Las versiones compatibles que est\u00e1n afectadas son Java SE: 7u301, 8u291, 11.0.11, 16.0.1; Oracle GraalVM Enterprise Edition: 20.3.2 y 21.1.0. Una vulnerabilidad dif\u00edcil de explotar permite a un atacante no autenticado con acceso a la red por medio de m\u00faltiples protocolos comprometer a Java SE, Oracle GraalVM Enterprise Edition. Los ataques con \u00e9xito requieren una interacci\u00f3n humana de una persona diferente del atacante. Los ataques con \u00e9xito de esta vulnerabilidad pueden resultar en un acceso de lectura no autorizado a un subconjunto de datos accesibles de Java SE, Oracle GraalVM Enterprise Edition. Nota: Esta vulnerabilidad se aplica a las implementaciones de Java, generalmente en clientes que ejecutan aplicaciones Java Web Start dentro del sandbox o applets de Java dentro del sandbox, que cargan y ejecutan c\u00f3digo no confiable (por ejemplo, c\u00f3digo que proviene de Internet) y conf\u00edan en el sandbox de Java para la seguridad. Esta vulnerabilidad no se aplica a las implementaciones de Java, com\u00fanmente en servidores, que cargan y ejecutan solo c\u00f3digo confiable (por ejemplo, c\u00f3digo instalado por un administrador). CVSS 3.1 Puntuaci\u00f3n Base 3.1 (Impactos en la Confidencialidad). Vector CVSS: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N)"
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "secalert_us@oracle.com",
|
|
"type": "Secondary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N",
|
|
"baseScore": 3.1,
|
|
"baseSeverity": "LOW",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "HIGH",
|
|
"privilegesRequired": "NONE",
|
|
"userInteraction": "REQUIRED",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "LOW",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "NONE"
|
|
},
|
|
"exploitabilityScore": 1.6,
|
|
"impactScore": 1.4
|
|
}
|
|
],
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
|
|
"baseScore": 4.3,
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "MEDIUM",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "PARTIAL",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "NONE"
|
|
},
|
|
"baseSeverity": "MEDIUM",
|
|
"exploitabilityScore": 8.6,
|
|
"impactScore": 2.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": true
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "NVD-CWE-noinfo"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:openjdk:7:-:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E78B7C5A-FA51-41E4-AAB0-C6DED2EFCF4C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:openjdk:7:update1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "02011EDC-20A7-4A16-A592-7C76E0037997"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:openjdk:7:update10:*:*:*:*:*:*",
|
|
"matchCriteriaId": "AC6D4652-1226-4C60-BEDF-01EBF8AC0849"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:openjdk:7:update101:*:*:*:*:*:*",
|
|
"matchCriteriaId": "3C1F9ED7-7D93-41F4-9130-15BA734420AC"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:openjdk:7:update11:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1CF9CDF1-95D3-4125-A73F-396D2280FC4E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:openjdk:7:update111:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A13266DC-F8D9-4F30-987F-65BBEAF8D3A8"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:openjdk:7:update121:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C28388AB-CFC9-4749-A90F-383F5B905EA9"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:openjdk:7:update13:*:*:*:*:*:*",
|
|
"matchCriteriaId": "DA1B00F9-A81C-48B7-8DAA-F394DDF323F3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:openjdk:7:update131:*:*:*:*:*:*",
|
|
"matchCriteriaId": "CA7AD457-6CE6-4925-8D94-A907B40233D9"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:openjdk:7:update141:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A6F3FDD1-7CAC-4B84-ABB7-64E9D3FBD708"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:openjdk:7:update15:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5480E5AD-DB46-474A-9B57-84ED088A75FA"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:openjdk:7:update151:*:*:*:*:*:*",
|
|
"matchCriteriaId": "881A4AE9-6012-4E91-98BE-0A352CC20703"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:openjdk:7:update161:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7E1E1079-57D9-473B-A017-964F4745F329"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:openjdk:7:update17:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B8D6446E-2915-4F12-87BE-E7420BC2626E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:openjdk:7:update171:*:*:*:*:*:*",
|
|
"matchCriteriaId": "564EDCE3-16E6-401D-8A43-032D1F8875E1"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:openjdk:7:update181:*:*:*:*:*:*",
|
|
"matchCriteriaId": "08278802-D31B-488A-BA6A-EBC816DF883A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:openjdk:7:update191:*:*:*:*:*:*",
|
|
"matchCriteriaId": "72BDA05A-C8BD-472E-8465-EE1F3E5D8CF6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:openjdk:7:update2:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7BBB0969-565E-43E2-B067-A10AAA5F1958"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:openjdk:7:update201:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D78BE95D-6270-469A-8035-FCDDB398F952"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:openjdk:7:update21:*:*:*:*:*:*",
|
|
"matchCriteriaId": "88C24F40-3150-4584-93D9-8307DE04EEE9"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:openjdk:7:update211:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E0FC5A03-FF11-4787-BBF1-3ACF93A21F2D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:openjdk:7:update221:*:*:*:*:*:*",
|
|
"matchCriteriaId": "19626B36-62FC-4497-A2E1-7D6CD9839B19"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:openjdk:7:update231:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5713AEBD-35F6-44E8-A0CC-A42830D7AE20"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:openjdk:7:update241:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8BE0C04B-440E-4B35-ACC8-6264514F764C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:openjdk:7:update25:*:*:*:*:*:*",
|
|
"matchCriteriaId": "555EC2A6-0475-48ED-AE0C-B306714A9333"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:openjdk:7:update251:*:*:*:*:*:*",
|
|
"matchCriteriaId": "EC1CF2AD-3F7A-4EF3-BD41-117A21553A9F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:openjdk:7:update261:*:*:*:*:*:*",
|
|
"matchCriteriaId": "02C55E2E-AEDE-455C-B128-168C918B5D97"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:openjdk:7:update271:*:*:*:*:*:*",
|
|
"matchCriteriaId": "81831D37-6597-441B-87DE-38F7191BEA42"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:openjdk:7:update281:*:*:*:*:*:*",
|
|
"matchCriteriaId": "EEA1594D-0AB5-436D-9E60-C26EE2175753"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:openjdk:7:update291:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B868FA41-C71B-491C-880B-484740B30C72"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:openjdk:7:update3:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C242D3BE-9114-4A9E-BB78-45754C7CC450"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:openjdk:7:update301:*:*:*:*:*:*",
|
|
"matchCriteriaId": "95954182-9541-4181-9647-B17FA5A79F9F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:openjdk:8:-:*:*:*:*:*:*",
|
|
"matchCriteriaId": "70892D06-6E75-4425-BBF0-4B684EC62A1C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:openjdk:8:milestone1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7A165D71-71CC-4E6A-AA4F-FF8DB5B9A5AB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:openjdk:8:milestone2:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7417B2BB-9AC2-4AF4-A828-C89A0735AD92"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:openjdk:8:milestone3:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6A0A57B5-6F88-4288-9CDE-F6613FE068D2"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:openjdk:8:milestone4:*:*:*:*:*:*",
|
|
"matchCriteriaId": "67ED8559-C348-4932-B7CE-CB96976A30EC"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:openjdk:8:milestone5:*:*:*:*:*:*",
|
|
"matchCriteriaId": "40AC3D91-263F-4345-9FAA-0E573EA64590"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:openjdk:8:milestone6:*:*:*:*:*:*",
|
|
"matchCriteriaId": "DD92AFA9-81F8-48D4-B79A-E7F066F69A99"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:openjdk:8:milestone7:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2C4B2F24-A730-4818-90C8-A2D90C081F03"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:openjdk:8:milestone8:*:*:*:*:*:*",
|
|
"matchCriteriaId": "464087F2-C285-4574-957E-CE0663F07DE0"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:openjdk:8:milestone9:*:*:*:*:*:*",
|
|
"matchCriteriaId": "3E9BB880-A4F6-4887-8BB9-47AA298753D5"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:openjdk:8:update101:*:*:*:*:*:*",
|
|
"matchCriteriaId": "18DCFF53-B298-4534-AB5C-8A5EF59C616F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:openjdk:8:update102:*:*:*:*:*:*",
|
|
"matchCriteriaId": "083419F8-FDDF-4E36-88F8-857DB317C1D1"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:openjdk:8:update11:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D7A74F65-57E8-4C9A-BA96-5EF401504F13"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:openjdk:8:update111:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0D0B90FC-57B6-4315-9B29-3C36E58B2CF5"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:openjdk:8:update112:*:*:*:*:*:*",
|
|
"matchCriteriaId": "07812576-3C35-404C-A7D7-9BE9E3D76E00"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:openjdk:8:update121:*:*:*:*:*:*",
|
|
"matchCriteriaId": "00C52B1C-5447-4282-9667-9EBE0720B423"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:openjdk:8:update131:*:*:*:*:*:*",
|
|
"matchCriteriaId": "92BB9EB0-0C12-4E77-89EE-FB77097841B8"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:openjdk:8:update141:*:*:*:*:*:*",
|
|
"matchCriteriaId": "FF9D5DCE-2E8F-42B9-9038-AEA7E8C8CFFD"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:openjdk:8:update151:*:*:*:*:*:*",
|
|
"matchCriteriaId": "ABC0E7BB-F8B7-4369-9910-71240E4073A3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:openjdk:8:update152:*:*:*:*:*:*",
|
|
"matchCriteriaId": "551B2640-8CEC-4C24-AF8B-7A7CEF864D9D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:openjdk:8:update161:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0AE30779-48FB-451E-8CE1-F469F93B8772"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:openjdk:8:update162:*:*:*:*:*:*",
|
|
"matchCriteriaId": "60590FDE-7156-4314-A012-AA38BD2ADDC9"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:openjdk:8:update171:*:*:*:*:*:*",
|
|
"matchCriteriaId": "BE51AD3A-8331-4E8F-9DB1-7A0051731DFB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:openjdk:8:update172:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F24F6122-2256-41B6-9033-794C6424ED99"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:openjdk:8:update181:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0EAFA79E-8C7A-48CF-8868-11378FE4B26F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:openjdk:8:update191:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D1D6F19F-59B5-4BB6-AD35-013384025970"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:openjdk:8:update192:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E7BA97BC-3ADA-465A-835B-6C3C5F416B56"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:openjdk:8:update20:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B71F77A4-B7EB-47A1-AAFD-431A7D040B86"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:openjdk:8:update201:*:*:*:*:*:*",
|
|
"matchCriteriaId": "91D6BEA9-5943-44A4-946D-CEAA9BA99376"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:openjdk:8:update202:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C079A3E0-44EB-4B9C-B4FC-B7621D165C3B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:openjdk:8:update211:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2CB74086-14B8-4237-8357-E0C6B5BB8313"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:openjdk:8:update212:*:*:*:*:*:*",
|
|
"matchCriteriaId": "3ABED20A-7C34-4E86-9AFB-F4DC9ECBB3A9"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:openjdk:8:update221:*:*:*:*:*:*",
|
|
"matchCriteriaId": "00C2B9C9-1177-4DA6-96CE-55F37F383F99"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:openjdk:8:update222:*:*:*:*:*:*",
|
|
"matchCriteriaId": "435CF189-0BD8-40DF-A0DC-99862CDEAF8A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:openjdk:8:update231:*:*:*:*:*:*",
|
|
"matchCriteriaId": "12A3F367-33AD-47C3-BFDC-871A17E72C94"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:openjdk:8:update232:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A18F994F-72CA-4AF5-A7D1-9F5AEA286D85"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:openjdk:8:update241:*:*:*:*:*:*",
|
|
"matchCriteriaId": "78261932-7373-4F16-91E0-1A72ADBEBC3E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:openjdk:8:update242:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9BD90D3D-9B3A-4101-9A8A-5090F0A9719F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:openjdk:8:update25:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B38C0276-0EBD-4E0B-BFCF-4DDECACE04E2"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:openjdk:8:update252:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F5A40B8A-D428-4008-9F21-AF21394C51D1"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:openjdk:8:update262:*:*:*:*:*:*",
|
|
"matchCriteriaId": "FEC5B777-01E1-45EE-AF95-C3BD1F098B2F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:openjdk:8:update271:*:*:*:*:*:*",
|
|
"matchCriteriaId": "3B504718-5DCE-43B4-B19A-C6B6E7444BD3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:openjdk:8:update281:*:*:*:*:*:*",
|
|
"matchCriteriaId": "3102AA10-99A8-49A9-867E-7EEC56865680"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:openjdk:8:update282:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5A55CBC7-A7B2-4B89-8AB5-ED30DBE6814E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:openjdk:8:update291:*:*:*:*:*:*",
|
|
"matchCriteriaId": "15BA8A26-2CDA-442B-A549-6BE92DCCD205"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:openjdk:8:update292:*:*:*:*:*:*",
|
|
"matchCriteriaId": "71F08D72-37B5-49C2-B8C9-ECF0C9C435D4"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:openjdk:11:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "465CFA59-8E94-415A-ACF0-E678826813BE"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:openjdk:11.0.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "85BDC28A-484B-4D14-8D68-890450DCE3F6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:openjdk:11.0.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "635DEFDD-4840-48C6-AB1C-ADAFF4A1E50C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:openjdk:11.0.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "40A221DB-1684-4C87-B576-0969FE13E1AA"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:openjdk:11.0.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "DE6A1B86-3688-4A13-AB37-DBD0DA323202"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:openjdk:11.0.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "17E0085B-4748-4F79-BEF6-CD9C3D2E6FE1"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:openjdk:11.0.6:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "3C4DAA76-EAA9-4C85-A92A-181EA49F3270"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:openjdk:11.0.7:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "19FC2907-1712-4E81-AC35-E3A15BF27606"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:openjdk:11.0.8:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "140F8ECC-F5DB-474E-ADA4-99EC9FBA45EE"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:openjdk:11.0.9:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C7A1C3EA-BBF2-4A3F-BACE-D4A5CF9E9B88"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:openjdk:11.0.10:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A001F5EC-B534-424E-A8E7-FD4B1DD94BB1"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:openjdk:11.0.11:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6DF5E492-5C34-4ABB-9934-8C4CF29EE097"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:openjdk:13:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "FD3A4AFB-8D76-4B16-A306-2A10F23E51EA"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:openjdk:13.0.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1704C904-6E0A-4972-BC94-326D8BC6315A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:openjdk:13.0.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "35FA24D1-8BDA-4DD4-A74C-C041C44A1455"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:openjdk:13.0.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "790FD30A-CE27-4A1E-A753-BE0A6B17B262"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:openjdk:13.0.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "254B5086-305E-4A19-8845-02BF7B8AA3F7"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:openjdk:13.0.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D418243D-BE1E-4E43-915A-57208E9C38CE"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:openjdk:13.0.6:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "DAA80ACA-8243-4E7E-98D7-594DDA75FBF6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:openjdk:13.0.7:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "12E2041A-65AB-4BFD-BDB7-2CA4711FDE2D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:openjdk:15:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "65118341-0005-405D-B688-A3D98FD97A76"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:openjdk:15.0.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D8BB14B2-CA52-4439-A156-56C4CFF2F73A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:openjdk:15.0.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0ADD6CAB-B69C-418A-817A-4AC02FA02FD4"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:openjdk:15.0.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "EE9026AD-DD0C-47F3-BE28-6C8A88D199C0"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:openjdk:16:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "DCFB65CD-98D5-4024-86CF-130D70DC5A5F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:openjdk:16.0.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "24023B81-2034-4CDB-9116-D8D006FD600B"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:graalvm:20.3.2:*:*:*:enterprise:*:*:*",
|
|
"matchCriteriaId": "C21EB1C3-3251-4B99-9D5F-E4E089E2EC62"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:graalvm:21.1.0:*:*:*:enterprise:*:*:*",
|
|
"matchCriteriaId": "CA0CBB5F-6CA5-4DFC-97A3-05643F8885DB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:jdk:1.7.0:update301:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6B0DA102-863A-43BC-8F61-5ED10DAFDC2F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:jdk:1.8.0:update291:*:*:*:*:*:*",
|
|
"matchCriteriaId": "791E436C-516A-423D-98A1-0F446C5027AB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:jdk:11.0.11:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4C0C71DD-48B0-4BB6-8A6E-A43E3161B825"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:jdk:16.0.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "10601225-3E13-45DC-A9E3-029AD286000C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:jre:1.7.0:update301:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0C88DC87-94BB-4DFD-A662-740E93AF95FE"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:jre:1.8.0:update291:*:*:*:*:*:*",
|
|
"matchCriteriaId": "34D8ED6C-86C3-4EFB-B94A-C7E4BE4D003F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:jre:11.0.11:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7029CB86-1358-478A-9062-0ECB77B8AAAE"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:jre:16.0.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "506059B3-3E98-4999-83A9-8AC6B0009820"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E460AA51-FCDA-46B9-AE97-E6676AA5E194"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A930E247-0B43-43CB-98FF-6CE7B8189835"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://lists.debian.org/debian-lts-announce/2021/08/msg00011.html",
|
|
"source": "secalert_us@oracle.com",
|
|
"tags": [
|
|
"Mailing List",
|
|
"Third Party Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A4TTUHVQF2MGUTP6GTCXLZS4GXK3XUWC/",
|
|
"source": "secalert_us@oracle.com",
|
|
"tags": [
|
|
"Third Party Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N57OFX5EJKHHDW4WAOBZFWA5CL4VIIK5/",
|
|
"source": "secalert_us@oracle.com",
|
|
"tags": [
|
|
"Third Party Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PJJ75FHSUZGWPV4UJTSMQHWLOQ77LHTG/",
|
|
"source": "secalert_us@oracle.com",
|
|
"tags": [
|
|
"Third Party Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VTRQIXB52KIXUAO6JBYUKYWXST2NKNAK/",
|
|
"source": "secalert_us@oracle.com",
|
|
"tags": [
|
|
"Third Party Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://security.gentoo.org/glsa/202209-05",
|
|
"source": "secalert_us@oracle.com",
|
|
"tags": [
|
|
"Third Party Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://security.netapp.com/advisory/ntap-20210723-0002/",
|
|
"source": "secalert_us@oracle.com",
|
|
"tags": [
|
|
"Third Party Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://www.debian.org/security/2021/dsa-4946",
|
|
"source": "secalert_us@oracle.com",
|
|
"tags": [
|
|
"Third Party Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://www.oracle.com/security-alerts/cpujul2021.html",
|
|
"source": "secalert_us@oracle.com",
|
|
"tags": [
|
|
"Patch",
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://www.oracle.com/security-alerts/cpuoct2021.html",
|
|
"source": "secalert_us@oracle.com",
|
|
"tags": [
|
|
"Patch",
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://lists.debian.org/debian-lts-announce/2021/08/msg00011.html",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Mailing List",
|
|
"Third Party Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A4TTUHVQF2MGUTP6GTCXLZS4GXK3XUWC/",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Third Party Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N57OFX5EJKHHDW4WAOBZFWA5CL4VIIK5/",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Third Party Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PJJ75FHSUZGWPV4UJTSMQHWLOQ77LHTG/",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Third Party Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VTRQIXB52KIXUAO6JBYUKYWXST2NKNAK/",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Third Party Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://security.gentoo.org/glsa/202209-05",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Third Party Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://security.netapp.com/advisory/ntap-20210723-0002/",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Third Party Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://www.debian.org/security/2021/dsa-4946",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Third Party Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://www.oracle.com/security-alerts/cpujul2021.html",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Patch",
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://www.oracle.com/security-alerts/cpuoct2021.html",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Patch",
|
|
"Vendor Advisory"
|
|
]
|
|
}
|
|
]
|
|
} |