Vulnerability in Oracle Java SE and Oracle GraalVM Enterprise Edition products allowing unauthorized read access via multiple protocol
Reporter | Title | Published | Views | Family All 199 |
---|---|---|---|---|
![]() | CVE-2022-21296 | 18 Jan 202221:53 | – | redhatcve |
![]() | CVE-2022-21296 | 19 Jan 202200:00 | – | ubuntucve |
![]() | CVE-2022-21296 | 19 Jan 202212:15 | – | debiancve |
![]() | CVE-2022-21296 | 19 Jan 202212:15 | – | osv |
![]() | Moderate: java-1.8.0-openjdk security and bug fix update | 27 Jan 202213:47 | – | osv |
![]() | RHSA-2022:0304 Red Hat Security Advisory: java-1.8.0-openjdk security update | 16 Sep 202406:50 | – | osv |
![]() | RHSA-2022:0312 Red Hat Security Advisory: java-1.8.0-openjdk security update | 16 Sep 202406:50 | – | osv |
![]() | RHSA-2022:0307 Red Hat Security Advisory: java-1.8.0-openjdk security and bug fix update | 16 Sep 202406:50 | – | osv |
![]() | RHSA-2022:0305 Red Hat Security Advisory: java-1.8.0-openjdk security update | 16 Sep 202406:49 | – | osv |
![]() | Moderate: java-1.8.0-openjdk security and bug fix update | 27 Jan 202213:47 | – | osv |
OS | OS Version | Architecture | Package | Package Version | Filename |
---|---|---|---|---|---|
Alpine | edge-community | noarch | openjdk11 | 11.0.14_p9-r0 | UNKNOWN |
Alpine | edge-community | noarch | openjdk17 | 17.0.2_p8-r0 | UNKNOWN |
Alpine | edge-community | noarch | openjdk8 | 8.322.06-r0 | UNKNOWN |
Alpine | 3.14-community | noarch | openjdk11 | 11.0.14_p9-r0 | UNKNOWN |
Alpine | 3.15-community | noarch | openjdk11 | 11.0.14_p9-r0 | UNKNOWN |
Alpine | 3.15-community | noarch | openjdk15 | 15.0.7_p4-r0 | UNKNOWN |
Alpine | 3.15-community | noarch | openjdk17 | 17.0.2_p8-r0 | UNKNOWN |
Alpine | 3.15-community | noarch | openjdk8 | 8.322.06-r0 | UNKNOWN |
Alpine | 3.16-community | noarch | openjdk11 | 11.0.14_p9-r0 | UNKNOWN |
Alpine | 3.16-community | noarch | openjdk13 | 13.0.10_p5-r0 | UNKNOWN |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo