java-1_8_0-openjdk vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the java-1_8_0-openjdk package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
CVE-2023-22081

<1.8.0.392-150000.3.85.1
  • M
CVE-2023-22067

<1.8.0.392-150000.3.85.1
  • H
Cryptographic Issues

<1.8.0.392-150000.3.85.1
  • L
CVE-2023-22049

<1.8.0.382-150000.3.82.1
  • L
CVE-2023-22045

<1.8.0.382-150000.3.82.1
  • L
CVE-2023-21968

<1.8.0.372-150000.3.79.1
  • M
CVE-2023-21967

<1.8.0.372-150000.3.79.1
  • M
CVE-2023-21954

<1.8.0.372-150000.3.79.1
  • M
CVE-2023-21939

<1.8.0.372-150000.3.79.1
  • L
CVE-2023-21938

<1.8.0.372-150000.3.79.1
  • L
CVE-2023-21937

<1.8.0.372-150000.3.79.1
  • H
CVE-2023-21930

<1.8.0.372-150000.3.79.1
  • L
CVE-2023-21843

<1.8.0.362-150000.3.76.1
  • M
CVE-2023-21830

<1.8.0.362-150000.3.76.1
  • M
CVE-2022-21628

<1.8.0.352-150000.3.73.1
  • M
CVE-2022-21626

<1.8.0.352-150000.3.73.1
  • L
CVE-2022-21624

<1.8.0.352-150000.3.73.1
  • L
CVE-2022-21619

<1.8.0.352-150000.3.73.1
  • H
Incorrect Conversion between Numeric Types

<1.8.0.345-150000.3.70.1
  • M
CVE-2022-21541

<1.8.0.345-150000.3.70.1
  • M
CVE-2022-21540

<1.8.0.345-150000.3.70.1
  • M
CVE-2022-21496

<1.8.0.332-150000.3.67.1
  • H
CVE-2022-21476

<1.8.0.332-150000.3.67.1
  • L
CVE-2022-21443

<1.8.0.332-150000.3.67.1
  • M
CVE-2022-21434

<1.8.0.332-150000.3.67.1
  • M
CVE-2022-21426

<1.8.0.332-150000.3.67.1
  • M
Information Exposure

<1.8.0.212-3.19.1
  • M
Resource Exhaustion

<1.8.0.212-3.19.1
  • L
CVE-2019-2698

<1.8.0.212-3.19.1
  • M
CVE-2019-2684

<1.8.0.212-3.19.1
  • L
Use After Free

<1.8.0.222-3.24.2
  • L
CVE-2019-2842

<1.8.0.222-3.24.2
  • M
CVE-2019-2816

<1.8.0.222-3.24.2
  • L
CVE-2019-2786

<1.8.0.222-3.24.2
  • M
CVE-2019-2769

<1.8.0.222-3.24.2
  • L
CVE-2019-2766

<1.8.0.222-3.24.2
  • M
CVE-2019-2762

<1.8.0.222-3.24.2
  • M
CVE-2019-2745

<1.8.0.222-3.24.2
  • M
CVE-2019-2999

<1.8.0.232-3.27.1
  • M
CVE-2019-2992

<1.8.0.232-3.27.1
  • M
CVE-2019-2989

<1.8.0.232-3.27.1
  • M
CVE-2019-2987

<1.8.0.232-3.27.1
  • M
CVE-2019-2988

<1.8.0.232-3.27.1
  • M
CVE-2019-2983

<1.8.0.232-3.27.1
  • M
CVE-2019-2981

<1.8.0.232-3.27.1
  • M
CVE-2019-2978

<1.8.0.232-3.27.1
  • M
CVE-2019-2975

<1.8.0.232-3.27.1
  • M
CVE-2019-2973

<1.8.0.232-3.27.1
  • M
CVE-2019-2962

<1.8.0.232-3.27.1
  • M
CVE-2019-2964

<1.8.0.232-3.27.1
  • M
CVE-2019-2958

<1.8.0.232-3.27.1
  • M
CVE-2019-2949

<1.8.0.232-3.27.1
  • M
CVE-2019-2945

<1.8.0.232-3.27.1
  • M
CVE-2019-2933

<1.8.0.232-3.27.1
  • M
CVE-2019-2894

<1.8.0.232-3.27.1
  • L
CVE-2020-2659

<1.8.0.242-3.30.2
  • H
Deserialization of Untrusted Data

<1.8.0.242-3.30.2
  • M
CVE-2020-2654

<1.8.0.242-3.30.2
  • M
CVE-2020-2601

<1.8.0.242-3.30.2
  • M
CVE-2020-2593

<1.8.0.242-3.30.2
  • M
CVE-2020-2590

<1.8.0.242-3.30.2
  • M
Improper Handling of Exceptional Conditions

<1.8.0.242-3.30.2
  • H
CVE-2020-2830

<1.8.0.252-3.35.3
  • H
CVE-2020-2803

<1.8.0.252-3.35.3
  • H
CVE-2020-2754

<1.8.0.252-3.35.3
  • H
CVE-2020-2800

<1.8.0.252-3.35.3
  • H
CVE-2020-2781

<1.8.0.252-3.35.3
  • H
CVE-2020-2773

<1.8.0.252-3.35.3
  • H
CVE-2020-2805

<1.8.0.252-3.35.3
  • H
Deserialization of Untrusted Data

<1.8.0.252-3.35.3
  • H
Deserialization of Untrusted Data

<1.8.0.252-3.35.3
  • H
CVE-2020-2755

<1.8.0.252-3.35.3
  • H
CVE-2020-14621

<1.8.0.272-3.42.1
  • M
CVE-2020-14803

<1.8.0.272-3.42.1
  • M
CVE-2020-14797

<1.8.0.272-3.42.1
  • M
CVE-2020-14798

<1.8.0.272-3.42.1
  • M
CVE-2020-14792

<1.8.0.272-3.42.1
  • M
CVE-2020-14796

<1.8.0.272-3.42.1
  • M
CVE-2020-14781

<1.8.0.272-3.42.1
  • M
CVE-2020-14782

<1.8.0.272-3.42.1
  • M
CVE-2020-14779

<1.8.0.272-3.42.1
  • H
CVE-2020-14583

<1.8.0.272-3.42.1
  • H
CVE-2020-14593

<1.8.0.272-3.42.1
  • H
CVE-2020-14581

<1.8.0.272-3.42.1
  • H
CVE-2020-14579

<1.8.0.272-3.42.1
  • H
CVE-2020-14577

<1.8.0.272-3.42.1
  • H
CVE-2020-14578

<1.8.0.272-3.42.1
  • H
CVE-2020-14556

<1.8.0.272-3.42.1
  • L
SUSE-SU-2020:3591-1

<1.8.0.275-3.45.1
  • M
CVE-2020-14803

<1.8.0.282-3.48.1
  • M
CVE-2021-2163

<1.8.0.292-3.52.1
  • H
CVE-2021-2388

<1.8.0.302-3.55.2
  • M
CVE-2021-2369

<1.8.0.302-3.55.2
  • L
CVE-2021-2341

<1.8.0.302-3.55.2
  • M
CVE-2021-2161

<1.8.0.302-3.55.2
  • L
CVE-2021-35603

<1.8.0.312-3.58.2
  • L
CVE-2021-35588

<1.8.0.312-3.58.2
  • M
CVE-2021-35586

<1.8.0.312-3.58.2
  • M
CVE-2021-35578

<1.8.0.312-3.58.2
  • M
CVE-2021-35567

<1.8.0.312-3.58.2
  • M
CVE-2021-35565

<1.8.0.312-3.58.2
  • M
CVE-2021-35564

<1.8.0.312-3.58.2
  • M
CVE-2021-35561

<1.8.0.312-3.58.2
  • M
CVE-2021-35559

<1.8.0.312-3.58.2
  • M
CVE-2021-35556

<1.8.0.312-3.58.2
  • M
CVE-2021-35550

<1.8.0.312-3.58.2
  • M
CVE-2022-21365

<1.8.0.322-3.64.2
  • M
CVE-2022-21360

<1.8.0.322-3.64.2
  • M
CVE-2022-21349

<1.8.0.322-3.64.2
  • M
CVE-2022-21341

<1.8.0.322-3.64.2
  • M
CVE-2022-21340

<1.8.0.322-3.64.2
  • M
CVE-2022-21305

<1.8.0.322-3.64.2
  • M
CVE-2022-21299

<1.8.0.322-3.64.2
  • M
CVE-2022-21296

<1.8.0.322-3.64.2
  • M
CVE-2022-21294

<1.8.0.322-3.64.2
  • M
CVE-2022-21293

<1.8.0.322-3.64.2
  • M
CVE-2022-21283

<1.8.0.322-3.64.2
  • M
CVE-2022-21282

<1.8.0.322-3.64.2
  • L
CVE-2022-21248

<1.8.0.322-3.64.2