Shodan
Maps
Images
Monitor
Developer
More...
Dashboard
View Api Docs
Vulnerabilities
By Date
Known Exploited
Advanced Search
Vulnerable Software
Vendors
Products
Vulnerability Details CVE-2023-30441
IBM Runtime Environment, Java Technology Edition IBMJCEPlus and JSSE 8.0.7.0 through 8.0.7.11 components could expose sensitive information using a combination of flaws and configurations. IBM X-Force ID: 253188.
Exploit prediction scoring system (EPSS) score
EPSS Score
0.0
EPSS Ranking
8.8%
CVSS Severity
CVSS v3 Score
7.5
References
https://exchange.xforce.ibmcloud.com/vulnerabilities/253188
https://www.ibm.com/support/pages/node/6985011
https://www.ibm.com/support/pages/node/6986617
https://www.ibm.com/support/pages/node/6986637
https://www.ibm.com/support/pages/node/6987167
https://exchange.xforce.ibmcloud.com/vulnerabilities/253188
https://www.ibm.com/support/pages/node/6985011
https://www.ibm.com/support/pages/node/6986617
https://www.ibm.com/support/pages/node/6986637
https://www.ibm.com/support/pages/node/6987167
Products affected by CVE-2023-30441
Ibm
»
Infosphere Information Server
»
Version:
11.7
cpe:2.3:a:ibm:infosphere_information_server:11.7
Ibm
»
Java
»
Version:
8.0.7.0
cpe:2.3:a:ibm:java:8.0.7.0
Ibm
»
Java
»
Version:
8.0.7.11
cpe:2.3:a:ibm:java:8.0.7.11
Ibm
»
Websphere Application Server
»
Version:
N/A
cpe:2.3:a:ibm:websphere_application_server:-
Ibm
»
Websphere Application Server
»
Version:
8.5.0.0
cpe:2.3:a:ibm:websphere_application_server:8.5.0.0
Ibm
»
Websphere Application Server
»
Version:
8.5.5.16
cpe:2.3:a:ibm:websphere_application_server:8.5.5.16
Ibm
»
Websphere Application Server
»
Version:
8.5.5.22
cpe:2.3:a:ibm:websphere_application_server:8.5.5.22
Ibm
»
Websphere Application Server
»
Version:
9.0.0.0
cpe:2.3:a:ibm:websphere_application_server:9.0.0.0
Ibm
»
Z/transaction Processing Facility
»
Version:
1.1
cpe:2.3:a:ibm:z/transaction_processing_facility:1.1
Products
Monitor
Search Engine
Developer API
Maps
Bulk Data
Images
Snippets
Pricing
Membership
API Subscriptions
Enterprise
Contact Us
support@shodan.io
Shodan ® - All rights reserved