We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-21210



Assigneroracle
Reserved2023-12-07
Published2024-10-15
Updated2024-10-31

Description

Vulnerability in Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 8u421, 8u421-perf, 11.0.24, 17.0.12, 21.0.4 and 23. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE accessible data. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).



LOW: 3.7CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N

Product status

Oracle Java SE:8u421
affected

Oracle Java SE:8u421-perf
affected

Oracle Java SE:11.0.24
affected

Oracle Java SE:17.0.12
affected

Oracle Java SE:21.0.4
affected

Oracle Java SE:23
affected

References

https://www.oracle.com/security-alerts/cpuoct2024.html (Oracle Advisory) vendor-advisory

cve.org CVE-2024-21210

nvd.nist.gov CVE-2024-21210

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-21210
Subscribe to our newsletter to learn more about our work.