Lucene search

K
vulnrichmentOracleVULNRICHMENT:CVE-2024-21140
HistoryJul 16, 2024 - 10:39 p.m.

CVE-2024-21140

2024-07-1622:39:56
oracle
github.com
5
security vulnerability 2024

CVSS3

4.8

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N

AI Score

6.8

Confidence

Low

SSVC

Exploitation

none

Automatable

yes

Technical Impact

partial

CNA Affected

[
  {
    "vendor": "Oracle Corporation",
    "product": "Java SE JDK and JRE",
    "versions": [
      {
        "status": "affected",
        "version": "Oracle Java SE:8u411"
      },
      {
        "status": "affected",
        "version": "Oracle Java SE:8u411-perf"
      },
      {
        "status": "affected",
        "version": "Oracle Java SE:11.0.23"
      },
      {
        "status": "affected",
        "version": "Oracle Java SE:17.0.11"
      },
      {
        "status": "affected",
        "version": "Oracle Java SE:21.0.3"
      },
      {
        "status": "affected",
        "version": "Oracle Java SE:22.0.1"
      },
      {
        "status": "affected",
        "version": "Oracle GraalVM for JDK:17.0.11"
      },
      {
        "status": "affected",
        "version": "Oracle GraalVM for JDK:21.0.3"
      },
      {
        "status": "affected",
        "version": "Oracle GraalVM for JDK:22.0.1"
      },
      {
        "status": "affected",
        "version": "Oracle GraalVM Enterprise Edition:20.3.14"
      },
      {
        "status": "affected",
        "version": "Oracle GraalVM Enterprise Edition:21.3.10"
      }
    ]
  }
]

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:a:oracle:java_se:8u411:*:*:*:*:*:*:*"
    ],
    "vendor": "oracle",
    "product": "java_se",
    "versions": [
      {
        "status": "affected",
        "version": "8u411"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:a:oracle:java_se:8u411-perf:*:*:*:*:*:*:*"
    ],
    "vendor": "oracle",
    "product": "java_se",
    "versions": [
      {
        "status": "affected",
        "version": "8u411-perf"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:a:oracle:java_se:11.0.23:*:*:*:*:*:*:*"
    ],
    "vendor": "oracle",
    "product": "java_se",
    "versions": [
      {
        "status": "affected",
        "version": "11.0.23"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:a:oracle:java_se:17.0.11:*:*:*:*:*:*:*"
    ],
    "vendor": "oracle",
    "product": "java_se",
    "versions": [
      {
        "status": "affected",
        "version": "17.0.11"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:a:oracle:java_se:21.0.3:*:*:*:*:*:*:*"
    ],
    "vendor": "oracle",
    "product": "java_se",
    "versions": [
      {
        "status": "affected",
        "version": "21.0.3"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:a:oracle:java_se:22.0.1:*:*:*:*:*:*:*"
    ],
    "vendor": "oracle",
    "product": "java_se",
    "versions": [
      {
        "status": "affected",
        "version": "22.0.1"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:a:oracle:jdk:17.0.11:*:*:*:*:*:*:*"
    ],
    "vendor": "oracle",
    "product": "jdk",
    "versions": [
      {
        "status": "affected",
        "version": "17.0.11"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:a:oracle:jdk:21.0.3:*:*:*:*:*:*:*"
    ],
    "vendor": "oracle",
    "product": "jdk",
    "versions": [
      {
        "status": "affected",
        "version": "21.0.3"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:a:oracle:jdk:22.0.1:*:*:*:*:*:*:*"
    ],
    "vendor": "oracle",
    "product": "jdk",
    "versions": [
      {
        "status": "affected",
        "version": "22.0.1"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:a:oracle:jre:20.3.14:*:*:*:*:*:*:*"
    ],
    "vendor": "oracle",
    "product": "jre",
    "versions": [
      {
        "status": "affected",
        "version": "20.3.14"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:a:oracle:jre:21.3.10:*:*:*:*:*:*:*"
    ],
    "vendor": "oracle",
    "product": "jre",
    "versions": [
      {
        "status": "affected",
        "version": "21.3.10"
      }
    ],
    "defaultStatus": "unknown"
  }
]

CVSS3

4.8

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N

AI Score

6.8

Confidence

Low

SSVC

Exploitation

none

Automatable

yes

Technical Impact

partial